Itm622fp2 Admin
Itm622fp2 Admin
Administrator's Guide
SC32-9408-03
Administrator's Guide
SC32-9408-03
Note
Before using this information and the product it supports, read the information in Notices on page 389.
June 2010
This edition applies to version 6, release 2, modification 2, fix pack 2 of IBM Tivoli Monitoring (product number
5724-C04 ) and to all subsequent releases and modifications until otherwise indicated in new editions.
Copyright IBM Corporation 2005, 2010.
US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . vii
Tables . . . . . . . . . . . . . . . ix
About this guide . . . . . . . . . . . xi
Chapter 1. Introduction . . . . . . . . 1
New in this release . . . . . . . . . .
New in Version 6.2.2 Fix Pack 2 . . . . .
New in Version 6.2.2 Fix Pack 1 . . . . .
New in Version 6.2.2. . . . . . . . .
New in Version 6.2.1. . . . . . . . .
New in Version 6.2.0 . . . . . . . .
IBM Tivoli Monitoring family of products . .
Tivoli Management Services components . .
Tivoli Enterprise Portal client . . . . . .
Desktop, Browser, and Java Web Start clients
Historical data collection . . . . . . .
System administrator tasks . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
1
4
5
9
11
15
15
16
17
18
18
19
19
19
21
21
22
22
23
23
24
25
26
27
28
28
30
31
32
32
35
. 35
. 36
. 41
. 42
43
44
44
45
46
47
48
49
50
53
54
54
55
55
56
58
58
60
62
64
64
66
68
71
72
75
76
77
77
78
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
81
82
82
85
86
86
iii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
86
86
88
89
89
90
90
90
91
92
93
95
iv
. 121
.
.
.
.
124
125
126
126
. 126
. 127
127
128
129
131
131
133
134
134
136
137
139
139
141
142
143
144
144
145
146
146
149
151
155
155
157
160
167
170
171
172
172
175
180
185
190
192
197
.
.
.
.
.
.
.
.
.
.
.
.
.
.
197
199
207
208
213
213
216
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
221
223
224
225
226
227
227
228
232
233
234
235
. 236
255
255
257
261
267
268
269
270
273
274
278
278
280
283
285
287
287
289
293
293
294
295
295
295
298
299
299
300
301
303
303
306
307
308
309
312
312
313
314
315
317
318
320
321
327
328
329
330
330
330
333
335
336
337
337
338
339
340
. 343
. 344
. 345
. 345
. 346
. 347
Contents
vi
349
349
351
351
352
352
353
353
353
354
354
355
356
364
365
366
. . . . . . . 381
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
381
382
383
383
366
Glossary . . . . . . . . . . . . . 393
367
Index . . . . . . . . . . . . . . . 403
368
Figures
1.
2.
3.
4.
5.
6.
7.
.
.
.
.
. 367
. 368
.
.
.
.
. 369
. 369
vii
viii
Tables
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
238
238
238
239
239
239
241
242
245
245
246
246
247
247
248
249
250
251
266
267
304
317
323
323
350
350
373
374
376
ix
xi
xii
Chapter 1. Introduction
This chapter reviews the new features and enhancements to the Tivoli Enterprise
Portal interface and Tivoli Management Services administrative features, followed
by a list of the administrative tasks you can expect to perform.
For information on how to use the Version 6.2.2 Tivoli Enterprise Portal features,
please consult the integrated help (Help Contents and Index) or the IBM Tivoli
Monitoring Tivoli Enterprise Portal User's Guide.
Enterprise Monitoring Server and thereby prevent loss of such data, the
warehouse agents have been enhanced to allow them to run autonomously.
Run Warehouse Proxy agent without requiring registration with the
Tivoli Enterprise Monitoring Server
The Warehouse Proxy can be configured to run with no connection to the
hub monitoring server.
Monitoring agents can be configured to specify the location of their
Warehouse Proxy agent instance, bypassing any other methods of
obtaining its address. See the KHD-prefixed environment variables in
Control autonomy in Tivoli Enterprise Monitoring Agents on page 161.
Run Summarization and Pruning agent without requiring connection to
the Tivoli Enterprise Portal Server
In previous releases the summarization and pruning configuration settings
for attribute groups that have been configured for historical data collection
were stored on the Tivoli Enterprise Portal Server database in a table
named KDWHISTDATA. The summarization and pruning configuration
has been moved from the portal server to the Tivoli Data Warehouse
database in a table named WAREHOUSESUMPRUNE. After the portal
server and summarization and pruning agent have been upgraded to
Tivoli Monitoring V6.2.2 Fix Pack 2, the next time summarization and
pruning takes place and the portal server is restarted, the migration of the
summarization and pruning configuration occurs automatically.
See Configuring a Summarization and Pruning agent to run
autonomously in IBM Tivoli Monitoring Installation and Setup for a
complete description.
Tivoli Common Reporting V1.3
The current version of Tivoli Common Reporting is Version 1.3, which
introduces IBM Cognos Business Intelligence and Reporting Version 8.4
reports for the Tivoli Monitoring OS Agents and other monitoring
products. A set of predefined reports is provided on a separate eAssembly
media package for monitoring individual, multiple, and enterprise
resources. See Chapter 15, Tivoli Common Reporting, on page 327 and
the user's guide for your Tivoli Enterprise Monitoring Agent.
Filtered historical data collection
The Tivoli Monitoring Version 6.2.2 release included the added capability
of configuring multiple data collections for the same attribute groups with
different settings and managed system distributions. Also added was the
ability to create historical groups of historical collections that share the
same managed system distribution.
Now you can write filter criteria to specify the data to collect. The new
Filter tab in the Historical Collection Configuration editor has a formula
editor much like what you have in the Situation editor. Historical collection
of a data sample occurs only if the values in the data row fulfill the filter
criteria. For example, if the data sample has % Disk Write Time greater
than 50%, it is saved to short-term history; otherwise the sample is not
saved. See step 9 of Creating a historical collection in the Tivoli Enterprise
Portal User's Guide.
The command-line interface tacmd histcreatecollection and tacmd
histeditcollection commands have been updated to include the filter
option for adding a filter formula; the tacmd histviewcollection and tacmd
histlistcollections commands display any defined filter for a historical
collection; and tacmd histviewattributegroup has been updated to add the
-v verbose option to include the table name and attribute names in the
display. See IBM Tivoli Monitoring Command Reference.
Dynamic items for custom Navigator views
The Navigator Physical view is a discovered view and the Navigator
Logical view is a predefined, customizable view. You can also create
custom Navigator views for different logical hierarchies. Because custom
Navigator views are user-defined, these views are not updated in the Tivoli
Enterprise Portal when new managed systems come online. You must
manually add them using Navigator editor.
Now you can assign managed system groups to Navigator items as
Dynamic items tab of the Navigator item
dynamic members in the new
properties editor. As managed systems are added or removed from the
group, the constituent members change dynamically within this branch of
the Navigator. New managed systems that fit the filter criteria of the
managed system group are added automatically.
See Navigator item properties.
Define schedules for running situation overrides
In previous releases you could apply a predefined schedule, such as
Weekend, to specify when the situation expression override is run. You can
now create your own calendar-based schedule or hourly schedule for each
expression override that you create for a situation.
Also in previous releases, the only way to define a schedule for a situation
expression override was through the command-line interface tacmd
addCalendarEntry. As well as shared calendar-based schedules in the
Situation editor, you can define repeating hourly schedules that apply to
specific hourly time ranges.
See Creating a situation override.
The CLI tacmd setOverride, tacmd deleteOverride, tacmd
suggestBaseline, and tacmd acceptBaseline commands have been updated
to include the inlinecal option for specifying the inline (hourly) calendar
schedule. See IBM Tivoli Monitoring Command Reference.
Model Expression dialog for testing situation override scenarios
Tivoli Monitoring V6.2.2 introduced the expression modeling feature to
visually assist the situation author in establishing proper threshold values
based on historical data and statistical analysis (see Model Situation).
That same capability has now been added for situation expression
overrides.
This new visual modeling capability also integrates the ability to
dynamically build and associate daily schedules to expression overrides
using drag-and-drop gesturing. See Model Expression.
Monitored baselining for charts indicate situation override expressions
Add Monitored Baseline tool was added to the chart views in
The
Tivoli Monitoring V6.2.2 for you to visualize the attribute threshold values
from associated situations alongside the historical or real-time information
displayed. If expression overrides are associated with the situation, you
can now visualize them in the chart as well. You can optionally filter out
situation and expression overrides that are inactive based on the data
sample and time span being rendered in the view.
See Adding monitored baselines to a chart.
Chapter 1. Introduction
Browser mode:
Browser mode:
Add Monitored
10
11
configured to validate user IDs and passwords using either the local
system registry or a central LDAP authentication and authorization system.
Flexible scheduling of summarization and pruning
The Summarization and Pruning agent configuration window has been
enhanced to allow for flexible scheduling and to have the data warehouse
and warehouse aggregation logs trimmed automatically after a specified
number of days, months, or years.
The Defaults tab has been removed. Now, when you use the History
Collection Configuration window to configure historical data collection for
an attribute group, no summarization and pruning check boxes are selected
for you by default.
Null values in summarized historical data
You now see null in a table cell or chart point when values that were
identified as invalid were reported from a monitoring agent for a given
summarization period.
More frequent intervals for historical data collection
One-minute and five-minute intervals have been added to the Collection
Interval options, enabling you to save more frequently to the short-term
history files at the monitoring agent or monitoring server.
There are no longer pre-selected check boxes for summarization and
pruning when you configure historical data collection for an attribute
group.
Common and Tivoli Enterprise Monitoring Server attributes
The common attribute groups, Local Time and Universal Time, have a new
Time attribute for the time of the data sampling corrected for local time
zone and daylight saving time.
Two of the Tivoli Enterprise Monitoring Server attribute groups also have
new attributes: The Managed System Status attribute group adds a Reason
attribute for the two-character reason code, if one exists, for the managed
system status. The Situation Definition attribute group adds a new Last
Release attribute to identify the release of the product to associate with the
situation.
If your product was updated for this release of IBM Tivoli Monitoring,
check the New in this release section of the product user's guide for a list
of the new and updated attribute groups.
Some distributed products might require that you create new queries
before you can see the new attributes in the query or queries for that
attribute group or see no query for a new attribute group.
Seven event severities
The state of an event that opens for a true situation can be set to
informational, warning, or critical. Now you have four additional states to
choose from for associated situations, table view thresholds, and for
Unknown,
Harmless,
Minor, and
filtering an event console view:
Fatal.
Table view threshold icons
The table view has a feature that highlights the background of any cell
whose value exceeds a given threshold. Before this release, thresholding
was limited to three background colors to indicate an informational,
12
Chapter 1. Introduction
13
14
operator
The Value of expression function has a new comparison operator that
can be used in situations and in table view Filters and Thresholds to
highlight specific text values.
Browser view
The browser view now supports most types of web content, such as
JavaScript, Applets, and PDF files.
15
16
Chapter 1. Introduction
17
18
Browser client
Users start the browser client by entering the URL for the integral HTTP server on
the Tivoli Enterprise Portal Server.
The advantages of the browser client are:
v Easy deployment. The browser client is installed the first time users log on to
the URL for the Tivoli Enterprise Portal integral HTTP server.
v Software upgrades are automatic. When users log on, their browser client is
checked against the one at the Tivoli Enterprise Portal Server; if a newer version
is detected, it is downloaded from the server.
v Global parameter settings are set for all users connected to the same Tivoli
Enterprise Portal Server.
v Workspaces have identifying URLs that can be referenced in Web pages and
when launching from another Web-enabled application.
v Includes a banner that can be customized with your company logo and URL.
19
launched to open the control panel and specify these parameters. Otherwise, the
user-level deployment.properties file for the correct user ID will not be updated.
Procedure
1. Open the Java control panel:
Launch the IBM Control Panel for Java or the Java Control Panel.
v
Find the Java ControlPanel executable under your jre_install_dir and
v
launch it. Example: /opt/IBM/ibm-java2-i386-50/jre/bin/ControlPanel.
2. Click the Java tab.
3. In the Java Applet Runtime Settings area, click View.
4. If you have multiple Java versions, verify that you have the correct control
panel open by reading the Location column to confirm the Java Runtime and
that the JRE is in the correct path. For example, C:\Program
Files\IBM\Java50\jre\bin for IBM Java on Windows.
5. Click in the Java Runtime Parameters field and set the parameters:
-Xms128m -Xmx256m -Xverify:none
The -Xms128m specifies the starting size of the Java heap (128 MB) and
-Xmx256m specifies the maximum size. The -Xverify:none parameter disables
Java class verification, which can improve the startup time.
If you are using the IBM JRE on Linux, add the Djava.protocol.handler.pkgs
option:
-Xms128m -Xmx256m -Xverify:none
-Djava.protocol.handler.pkgs=sun.plugin.net.protocol
This option is required for the IBM JRE on Linux due to a problem with the
plug-in not caching jar files. If the parameter is left off, the Tivoli Enterprise
Portal applet jar files will not be cached, making subsequent start ups of the
applet slow.
6. Confirm that the Temporary Files settings are set to Unlimited:
a. Click the General tab.
b. Click Settings.
c. Select the maximum amount of disk space for storing temporary files: 1000
MB.
7. Clear the browser cache:
a. In the General tab, click Delete Files.
b. In the window that opens, select Downloaded Applets .
What to do next
You can now start the browser client and connect to the portal server.
Note: The Sun JRE does not always support the same maximum heap values as
the IBM JRE. The true maximum is calculated based on the resources available on
the particular computer being configured, and the algorithm that is involved is
different between the two JREs. The symptom of a memory problem is that the
applet fails to load in the browser and you receive an error message. To resolve
20
this problem, reduce the value of the maximum heap setting in the Java Control
panel in 32m or 64m increments until the error goes away. For example, if you
start with the recommended value of -Xmx256m try reducing it to -Xmx224m or
-Xmx192m. Eventually you will reach a value that is appropriate for your
computer.
Procedure
1. In Internet Explorer, select Tools Internet Options
2. Select the Security tab.
3. Click Internet if you are running Tivoli Enterprise Portal through the Internet;
or Intranet if you are running Tivoli Enterprise Portal through your intranet.
4. Change your security settings to Default Level
5. Click OK to save.
Procedure
1. In Internet Explorer, select Tools Internet Options
2. Select the Security tab.
3. Click Trusted Sites Sites, and enter the URL for Tivoli Enterprise Portal.
4. Clear the check box that checks for (https:) for all sites at this zone, click Add .
Choose the medium security level or lower for all sites in the Trusted Sites
zone.
Chapter 2. Preparing your Tivoli Enterprise Portal environment
21
Procedure
1. On the computer where you installed the Tivoli Enterprise Portal Server, open
the following file in an HTML editor or text editor:
Install_dir\cnb\bannerimage.html
2. Edit the HREF and IMG SRC tags for your organization's URL and logo
graphic file:
a. Replace the href + URL + placeholder with your organization's URL.
b. Replace the img src + URL + placeholder with the name of your
organization's logo GIF or JPG file.
c. Replace the alt + URL + placeholder with the text that should display
when the mouse pointer is over the image, such as the URL.
3. Save the file and exit the editor.
4. Copy the logo graphic to the Install_dir\cnb\ directory.
Results
Users now see your logo on the right-hand side of the banner the next time they
start browser mode.
22
Procedure
v Start the desktop client:
Click Start Programs IBM Tivoli Monitoring Tivoli Enterprise
Portal. When the logon window is displayed, enter your user ID and
password and click OK.
Enter ./itmcmd agent start cj at the command line.
23
If you want to run the desktop client on a system that already has a Tivoli
Management Services base component installed (such as a monitoring server or
the portal server), there is no need to install the IBM JRE. The correct version of
the IBM JRE is installed with the Tivoli Management Services component.
If you run the desktop client using Web Start instead of installing it from the
installation media, you must configure the JRE to enable tracing for the desktop
client.
Procedure
1. Start the browser on the computer to which you want to download the
installer.
2. Enter the following URL in the Address field of the browser, where
<TEPS_host_name> is the fully qualified host name of the computer where the
portal server is installed (for example, myteps.itmlab.company.com):
http://<TEPS_host_name>:1920///cnp/kdh/lib/java/ibm-java2.exe
24
12. On the Browser Registration window, select the browsers that you want the
IBM JRE to be associated with. These would normally be the browsers that
you want to use with the browser client.
13. Click Next.
14. Click Finish to complete the installation.
Procedure
1. Start the browser on the computer to which you want to download the
installer.
2. Enter the following URL in the Address field of the browser:
http://teps_hostname:1920///cnp/kdh/lib/java
/ibm-java2-i386-jre-5.0-7.0.i386.rpm
where teps_hostname is the fully qualified host name of the computer where the
portal server is installed (for example, myteps.itmlab.company.com).
3. When prompted, save the installer to disk.
4. Change to the directory where you saved the ibm-java2-i386-jre-5.07.0.i386.rpm file and launch the installer to start the installation program using
the following command:
rpm -ivh ibm-java2-i386-jre-5.0-7.0.i386.rpm
25
Procedure
1. Launch the IBM Control Panel for Java.
v On Windows, select Start > Control Panel, then double-click IBM Control
Panel for Java. You must switch to the Classic view to see and select the
Control Panel. Alternatively, you can launch the Control Panel by selecting
Start > Run > "C:\Program Files\IBM\Java50\jre\bin\javacpl.exe".
v On Linux, change to <install_dir>/jre/<platform>/bin and run Control
Panel: ./Control Panel
2. Select the Advanced tab.
3. Expand the Debugging node in the Settings tree and check Enable Tracing.
4. Click OK to save the setting and close the Java Control Panel.
Procedure
v Enter the URL of the portal server in a browser:
1. Start the browser on the computer where you want to use the desktop client.
2. Enter the following URL in the Address field of the browser, where
<TEPS_host_name> is the fully qualified host name of the computer where
the Tivoli Enterprise Portal Server is installed.
http://TEPS_host_name:1920///cnp/kdh/lib/tep.jnlp
26
<install_dir>/jre/<platform>/bin
./javaws http://<TEPS_host_name>:1920///cnp/kdh/lib/tep.jnlp)
Procedure
1. Right-click on the Windows desktop and select New > Shortcut from the
popup menu.
2. In the Create Shortcut window, type the following path or click Browse and
navigate to the executable as shown:
C:\Program Files\IBM\Java50\jre\bin\javaws.exe
3. Click Next and type a name for the shortcut in the Select a Title for the
Program window. For example:
ITM Web Start client
27
Procedure
1. On the computer where the desktop client is installed, start Manage Tivoli
Monitoring Services:
Select Start Programs IBM Tivoli Monitoring Manage Tivoli
v
Monitoring Services.
Change directory (cd) to Install_dir/bin and enter
v
./itmcmd manage.
2. Right-click Tivoli Enterprise Portal Desktop and click Create Instance. If
other instances of the Tivoli Enterprise Portal have been created, you see more
than one in the list. Create Instance is disabled for all but the original Tivoli
Enterprise Portal instance.
3. In the Tivoli Enterprise Portal window, enter a name to identify the instance
and click OK.
4. In the Configure Application Instance window, enter the host name of the
Tivoli Enterprise Portal Server that you want to connect to.
5. Click OK.
Results
The new Tivoli Enterprise Portal instance is added to the list.
What to do next
You can now start the instance at any time by double-clicking its entry.
If you no longer need a Tivoli Enterprise Portal instance, you can delete it:
right-clicking the entry and click Remove Instance.
28
Procedure
v
1. In the Manage Tivoli Monitoring Services window, right-click the Tivoli
Enterprise Portal Browser entry and click Reconfigure.
2. In the Configure Tivoli Enterprise Portal Browser window that opens,
double-click the cnp.browser.installdir parameter.
3. In the Edit Tivoli Enterprise Portal Browser Parm window that opens, enter
the path to the directory where the browser files should be installed, for
example, C:\\temp\\cnpBrowserFiles.
4. Select the In Use check box and click OK.
5. Click OK to save your changes.
v
1. Change to the directory where applet.html is located: Install_dir/
platform/cw, where platform is the current type of operating system.
2. Open applet.html in a text editor.
3. Find the line, <!--END OF PARAMS--> and add a new line above it.
4. On the new line, add this parameter where browser_install_dir is the path to
the directory where the browser files are installed.
document.writeln( <PARAM NAME= "cnp.browser.installdir"
VALUE="browser_install_dir"> )
What to do next
If you are using Internet Explorer, launch each instance of the Tivoli Enterprise
Portal client that you want.
If you are using the Firefox browser, you must create a separate profile for each
instance that you intend to start. The Mozilla support site has a topic on Managing
Profiles (http://support.mozilla.com/en-US/kb/Managing+Profiles) that you can
refer to for help with setting up profiles. After creating the profiles, launch each
instance with this command <full_path_to_firefox> -p <profile_name> -no-remote
29
Related reference
Portal client parameter list on page 36
Specifying the browser used for Launch Application and for online
help
If you are running the desktop client on Linux, or you want to view the online
help with some browser other than the default, specify to the portal server the
location of the browser you want to use.
Procedure
v
1. Launch Manage Tivoli Monitoring Services (Start > (All) Programs > IBM
Tivoli Monitoring > Manage Tivoli Monitoring Services).
2. In the Manage Tivoli Monitoring Services window, right-click the browser or
desktop client and select Reconfigure. The Configure the Tivoli Enterprise
Portal Browser window is displayed. (If you are configuring the desktop
client, the Configure Application Instance window is displayed.)
3. Scroll down in the list of variables until you see the kjr.browser.default
variable.
4. Double-click kjr.browser.default. The Edit Tivoli Enterprise Portal Browser
Parm window is displayed.
5. In the Value field, type the path and the application name of the alternative
browser application. For example, C:\Program Files\Mozilla
Firefox\firefox.exe
6. Click OK to close the editing window and save the change.
7. Click OK to close the reconfiguration window.
v
1. Go to the install_dir/bin/cnp.sh and edit the cnp.sh shell script.
2. Add your Web browser location to the last line of the file. In the example
below, the Web browser location is /opt/foo/bin/launcher.
-Dkjr.browser.default=/opt/foo/bin/launcher The line is very long and has
various options on it, including several other D options to define other
properties. It is very important to add the option in the correct place.
If the last line of your bin/cnp.sh originally looked like the following:
${JAVA_HOME}/bin/java -showversion -noverify -classpath ${CLASSPATH}
-Dkjr.trace.mode=LOCAL -Dkjr.trace.file=/opt/IBM/ITM/logs/kcjras1.log
-Dkjr.trace.params=ERROR -DORBtcpNoDelay=true -Dcnp.http.url.host=
-Dvbroker.agent.enableLocator=false
-Dhttp.proxyHost=
-Dhttp.proxyPort=candle.fw.pres.CMWApplet 2>& 1 >> ${LOGFILENAME}.log
To set the browser location to /opt/foo/bin/launcher, change the line to look like the
following:
${JAVA_HOME}/bin/java -showversion -noverify -classpath ${CLASSPATH}
-Dkjr.browser.default=/opt/foo/bin/launcher
-Dkjr.trace.mode=LOCAL -Dkjr.trace.file=/opt/IBM/ITM/logs/kcjras1.log
-Dkjr.trace.params=ERROR -DORBtcpNoDelay=true -Dcnp.http.url.host=
30
-Dvbroker.agent.enableLocator=false
-Dhttp.proxyHost=
-Dhttp.proxyPort=candle.fw.pres.CMWApplet 2>& 1 >> ${LOGFILENAME}.log
31
each to have its own Navigator item, with all systems of that type contained there,
you can add them to the osnames file in the portal server directory (for example,
C:\IBM\ITM\CNPS and /opt/IBM/ITM/config).
Procedure
1. Copy the kfwtipewas.properties file to the portal server directory:
From <itm_installdir>\CNPS\SQLLIB\ to <itm_installdir>\CNPS.
or
From <itm_installdir>/<platform>/cq/sqllib/ to
<itm_installdir>/<platform>/cq/.
2. Reconfigure the Tivoli Enterprise Portal Server.
What to do next
In the previous release you needed to have workspace administrator authority for
the user who wanted to see query-based views. As a Tivoli Enterprise Portal user
you are entitled to see certain workspaces in the portal that belong to a particular
monitored application based on your permissions. If you are entitled to see, say,
Linux workspaces in the portal, then those workspaces will be available in the
Tivoli Integrated Portal.
32
Figure 1. Tivoli Integrated Portal Web Services and the cross-product connections
33
34
Procedure
1. Start Manage Tivoli Monitoring Services. For the browser client and Web Start,
this is the computer where the portal server is installed; otherwise, it is where
the desktop client is installed.
Click Start Programs IBM Tivoli Monitoring Manage Tivoli
a.
Monitoring Services.
Change to the <itm_install_dir>/bin directory and enter:
b.
./itmcmd manage.
2. Right-click Tivoli Enterprise Portal Desktop or Tivoli Enterprise Portal
Browser, and click Reconfigure. The Configure Application Instance window is
displayed for the desktop client (also used for Java Web Start); the Configure
Tivoli Enterprise Portal Browser window is displayed for the browser client.
3. Double-click the parameter value you want to change.
4. To activate the parameter, type a value and select In Use in the Edit Tivoli
Enterprise Portal Parm window.
5. After you are finished editing the parameters, click OK to save your changes.
Your changes will take effect the next time users log on to the portal server.
Users already logged on will see no change until they exit, and log on again.
35
Related reference
Portal client parameter list
Memory cache in KB
32 MB
2048
64 MB
4096
128 MB
6144
256 MB
10240
512 MB
14336
1 GB
18432
2 GB
24576
4 GB
30720
8 GB and beyond
32768
cnp.agentdeploy.timeout
This is the time that should pass before the agent deploy request times out.
Default: 1800 seconds (30 minutes).
cnp.attachment.segment.maxsize
For transmission across the network, file attachments are broken into
segments then reassembled at the Tivoli Enterprise Portal Server. For
example, an 8 MB file is transmitted in eight segments of 1 MB. Adjust this
parameter for the segment size that best suits your environment. Enter the
maximum size in bytes, such as 250000 for 250 KB. Default: 1000000 (1
MB).
This parameter is also available as a portal server environment variable.
See Controlling the size of event attachments on page 47.
cnp.attachment.total.maxsize
Use this parameter to set the maximum size of each file attached to an
acknowledgement. Enter the maximum size in bytes, such as 2500000 for
2.5 MB. Default: 10000000 (10 MB).
This parameter is also available as a portal server environment variable.
See Controlling the size of event attachments on page 47.
cnp.authentication.skip_dns
Value: "N". This determines whether the server certificate validation tries to
resolve and match the host DNS name.
36
cnp.browser.installdir
The WebRenderer Java browser component is used for browser view
functionality in the Tivoli Enterprise Portal. The first time a user creates a
browser view, a subdirectory is created automatically on the user's
computer.
%HOMEPATH%\wr<WebRendererVersion>\.webrendererswing.
Example: C:\Documents and Settings\Administrator\wr4.2.14\
.webrendererswing
%HOME/wr<WebRendererVersion>/.webrendererswing
This subdirectory is where the browser jar files are extracted to and where
certificates and other WebRenderer artifacts are created for browser views.
Use this parameter to specify a different path for the browser view files to
be saved on user computers. A different path is required if users will be
running multiple instances of the portal client and possibly logging on to
different versions of the portal server.
cnp.commonevent.cache.timeout
Number of minutes to retain the cache for the common event console
when the user has switched to a workspace that does not contain the
common event console view (which means the cache is not being used). If
this time period ends before the cache is used again, the cache is cleared.
The cache is then rebuilt when it is needed by a common event console
view.
A value of -1 means always retain the cache, even when it is not being
used. A value of 0 means immediately clear the cache when the user has
switched to a workspace that does not contain the common event console
view. Default: 30.
cnp.databus.pageSize
In the portal user interface, the Properties editor has a field for adjusting
the page size for individual query-based views. This parameter sets the
number of rows to fetch in single logical page for all query-based views.
Default: 100 rows. Although there is no limit to what you can set here, the
larger the page size, the more memory required at the portal client and
server.
You might, for example, want to set a larger page size for the searching in
the table view over a larger number of rows. Or you might want fewer
pages to scroll through when interacting with views that retrieve a large
number of rows (or instances). You must make sure, however, that you
have sufficient resources on the portal client and server to handle the
additional data being packaged, transported, and ultimately rendered as a
result of increasing the page size value. Probably the best way to find the
right number here is to increase it gradually (such as increments of 100)
until response time across a good sampling of workspaces begins to suffer.
At that point, you might want to reduce the number by the last increment
(such as 100 rows fewer) as that will be close to the optimal value for the
environment.
Another setting that affects query-based view response time is
KFW_REPORT_NODE_LIMIT, which is a portal server environment
variable.
cnp.drag.sensitivity
Number of pixels the mouse must move before drag operation begins.
Default: 7.
37
cnp.encoding.codeset
String encoding code set identifier.
cnp.eventcon.autoresume.delay
The number of seconds to wait before automatically resuming updates to
the Situation Event Console and the Common Event Console after they
have been paused due to scrolling. Default: 60 seconds.
cnp.heartbeat.interval
Heartbeat ping interval between the portal client and server. An increase in
the interval means that the client will take longer to detect when the portal
server is offline. A shorter interval means the client will be notified sooner
but it also increases the traffic between client and server. Default: 30
seconds.
cnp.history.depth
Number of workspaces to maintain in the back / forward history
navigation stack. Default: 20.
cnp.http.proxy.password
Password used for proxy authentication using Browser view.
cnp.http.proxy.user
Userid used for proxy authentication using Browser view.
cnp.http.url.host
Desktop client and Java WebStart client only: URL host for IOR fetch.
cnp.http.url.path
Desktop client and Java WebStart client only: URL path for IOR fetch.
cnp.http.url.port
Desktop client and Java WebStart client only: URL port for IOR fetch.
cnp.http.url.protocol
Desktop client and Java WebStart client only: URL protocol for IOR fetch.
cnp.http.url.DataBus
Desktop client and Java WebStart client only: The URL for the cnps.ior
file, which is required for the portal server to locate the graphic view
images and style sheets. The default setting, which does not show, assumes
the integral HTTP server. If it has been disabled for some reason, you must
enter the URL for the integral HTTP server. See the IBM Tivoli Monitoring
Troubleshooting Guide for details. When this parameter is set, it overrides the
settings of the other cnp.http.url parameters for protocol, port, and path.
cnp.pipeline.factor
Databus to Server Pipeline monitoring factor (in Heartbeat cycles). Default:
2.
cnp.playsound.interval
Number of seconds before the same sound file can be played again. If
events open frequently, this setting provides sound pause. Default: 10
seconds.
cnp.publishurl.delay
Browser mode only: When you make a workspace switch, allows the user
interface rendering to complete before the browser initializes the new
applet and destroys the old applet. Default: 1 second.
Important: Modify this parameter only after consulting IBM Software
Support.
38
cnp.systemtray.offset
Tivoli Enterprise Portal factors in the Windows task bar at the bottom of
the screen when sizing menus and windows for display. Default: true.
cnp.terminal.cache.entries
Maximum number of active terminal emulator sessions. Default: 50.
cnp.terminal.host
Default terminal emulator host name.
cnp.terminal.port
Default terminal emulator port number. Default: 23.
cnp.terminal.script.entries
Maximum number of user terminal emulator scripts that can be saved.
Default: 256.
cnp.terminal.type
Default terminal emulator type. When specifying a terminal type, enclose
the terminal type within double quotes and enter one of these supported
names:
IBM
IBM
IBM
IBM
IBM
3270
3270
3270
3270
5250
(24x80)
(32x80)
(43x80)
(27x132)
(24x80)
VT100 (24x80)
cnp.view.change_remove.warning
Warning message when the user is about to change or remove a view.
Default: True. The message is displayed. Change the setting to False to
stop the message from being displayed.
cnp.workspace.switch.rate
The minimum amount of time that must pass before the workspace can be
replaced by the next one selected. Default: 1000 (1 second).
cnp.workspacerender.delay
Browser mode only: Workspace post render delay in milliseconds.
http:agent
Defines the name of the integral HTTP server. If it or its proxy requires a
different browser identity before it enables the browser view to access the
Internet, you can enter a one-word name for the browser. It can be any
name so long as it is not rejected by the proxy server. You normally do not
need to add an http name definition unless users get an error when they
attempt to access the Internet through a workspace browser view.
http.nonproxyhosts
When Enable HTTP Proxy Server Requests is selected, the servers in
this list bypass the proxy. Separate each server name with a vertical line
(|). See Enabling the HTTP proxy server on page 41.
http.proxyHost
Browser client: Used to specify the host name or IP address of the http
proxy server if one is used.
39
http.proxyPort
Browser client: Used with the http.proxyHost parameter to specify the
listening port number for the HTTP proxy server. Port 80 is the default for
third-party HTTP servers.
kjr.browser.default
This is the path and name of the browser application to use when
launching contextual help. To open the help with a specific browser or one
other than the default, enter the path and the application name, such as
C:\Program Files\Mozilla Firefox\firefox.exe.
kjr.trace.file
File name of RAS1 trace log if trace mode is LOCAL.
kjr.trace.mode
The RAS1 tracing option. Default: LOCAL.
kjr.trace.params
RAS1 trace options. Default: ERROR.
kjr.trace.qdepth
Sets the tracing thread queue depth to 15000 by default.
kjr.trace.thread
Determines whether trace calls are threaded. Default: true.
legacy_life cycle
With Sun Java versions 1.6.0_10 or higher, a new plug-in architecture was
introduced and established as the default plug-in. IBM Tivoli Monitoring
browser clients do not run with this new plug-in architecture. To use the
Sun 1.6.0_10 (or higher) JRE, set this parameter to true.You will also need
disable the next-generation Java plug-in on the computer where the browser
client is being run: Launch the Java Control Panel for the Sun JRE. In the
Advanced tab, expand the Java Plug-in branch. Clear the Enable the
next-generation Java Plug-in (requires browser restart) check box.
sun.java2d.noddraw
When the Tivoli Enterprise Portal is run as a client image in an emulation
environment that does not support the DirectDraw screen-writing function,
turn off the function by setting this variable to true in both the browser
and desktop clients. Otherwise, users encounter conditions of high CPU
usage because the Java process attempts to write to the screen. Default:
true.
user.language
Specifies the language code of the user's locale preference (de, en, es, fr, it,
ja, ko, pt, zh). As well as the language, the time, date, currency, and
number separator formats are converted for the locale. You can create
another instance of the desktop client and change this variable (and
user.region) to another locale. In this way, you can have two or more
instances of the desktop client running on the same computer, each in a
different language. If you specify an unsupported locale, the failover is to
en_US. Browser mode users can enter the text below directly into their
Java plug-in runtime parameters if they do not want to change these
environment variables or their operating system locale.
-Duser.language=xx
-Duser.region=XX
40
Procedure
1. Open a workspace that contains a browser view or add a browser view to the
current workspace.
2. In the browser view's address box, type: about:config
3. In the filter field that appears at the top of the page, enter the following to see
the network proxy fields: network.proxy
4. Out of the reduced set shown, the following three entries are of interest.
Double-click an entry or select it and press Enter to modify its values:
network.proxy.http
Enter the DNS identifier or the IP address of the proxy host to use for
the HTTP protocol.
network.proxy.http_port
Enter 80, the default port number, or a different number used by the
proxy host.
network.proxy.no_proxies_on
Append any fully qualified host names or IP addresses that should be
accessed without the proxy. For example, this setting bypasses the
proxy server for any files on your local system and on the portal server
(myteps.uk.ibm.com) that are accessed from the browser view:
localhost,127.0.0.1, myteps.uk.ibm.com.
41
Results
After you click OK on the property edit panel, the change is saved on the Tivoli
Enterprise Portal client.
Purpose of file
bin/cnp.sh
bin/cnp_instance.sh
platform/cj/original/cnp.sh_template
You can also set instance name, browser, and Tivoli Enterprise Portal Server
properties on Linux. Refer to the Command Reference for details.
To change the location of the Web browser you must change the above file or files
to include a new property by completing the following procedure:
Procedure
1. Go to the <itm_install_dir>/bin/cnp.sh and edit the cnp.sh shell script.
2. Add your Web browser location to the last line of the file. In the example
below, the Web browser location is /opt/foo/bin/launcher.
-Dkjr.browser.default=/opt/foo/bin/launcher
Important: The line is very long and has various options on it, including
several other D options to define other properties. It is very important to add
42
To set the browser location to /opt/foo/bin/launcher, change the line to look like
the following:
${JAVA_HOME}/bin/java -showversion -noverify -classpath ${CLASSPATH}
-Dkjr.browser.default=/opt/foo/bin/launcher
-Dkjr.trace.mode=LOCAL -Dkjr.trace.file=/opt/IBM/ITM/logs/kcjras1.log
-Dkjr.trace.params=ERROR -DORBtcpNoDelay=true -Dcnp.http.url.host=
-Dvbroker.agent.enableLocator=false
-Dhttp.proxyHost=
-Dhttp.proxyPort=candle.fw.pres.CMWApplet 2>& 1 >> ${LOGFILENAME}.log
Procedure
v
1. On the system where the Tivoli Enterprise Portal Server is installed, select
Start Programs IBM Tivoli Monitoring Manage Tivoli Monitoring
Services.
2. Right-click Tivoli Enterprise Portal Server, point to Advanced and select Edit
ENV File from the list.
3. If the Tivoli Enterprise Portal Server message displays, click OK to close it.
4. Add a new line: USE_EGG1_FLAG=1.
5. Click Save.
6. Click Yes to implement your changes and recycle the service.
v
1.
2.
3.
4.
43
What to do next
See Configuring the Tivoli Enterprise Monitoring Server on z/OS.
Procedure
1. Open the environment file on the computer where the portal server is installed:
From Manage Tivoli Monitoring Services (Start Programs IBM
v
Tivoli Monitoring Manage Tivoli Monitoring Services), right-click Tivoli
Enterprise Portal Server and click Advanced Edit ENV File to open the
kfwenv file.
Change to the Install_dir/config directory and open the
v
cq.ini file in a text editor.
2. Edit the file to enable (delete # at the beginning of the line), disable (type # at
the beginning of the line) or modify any of the environment variables.
3. Save kfwenv (Windows) or cq.ini (Linux and operating systems such as UNIX)
and exit the text editor.
4. Click Yes when a message asks if you want to recycle the service. Click No if
you prefer to have the changes you made take effect later by manually
recycling the portal server.
44
Related reference
Portal server environment variables
45
encryption methods used by the portal server should comply with the
Federal Information Processing Standard (FIPS) 1402 specification. If your
environment must conform to the FIPS 1402 standard, specify Y.
KFW_REPORT_NODE_LIMIT=200
When a workspace that contains a query-based view is opened or
refreshed, the view's query requests data from the managed systems that
are assigned to that Navigator item (unless you have edited the view's
query definition to assign specific managed systems or managed system
groups). The number of managed systems from which a query can retrieve
data can be up to 200. This limitation is provided to keep traffic and
resource usage of your managed environment at an acceptable level. You
can adjust the maximum number with this variable but keep in mind that
if you increase the maximum number of managed systems being queried,
the longer it can take to render the view.
Consider creating filtered queries, managed system groups, or custom
Navigator views with managed systems assignments on Navigator items
that limit the number of managed systems to retrieve data from. These
features are described in the Tivoli Enterprise Portal online help and user's
guide.
Another setting that affects query-based view response time is the
cnp.databus.pageSize client parameter.
KFW_REPORT_TERM_BREAK_POINT=86400
Adjust this setting to change the point, in seconds, where a historical
request selects from short-term or long-term history data. The default is for
short-term history data to be collected from now to 24 hours ago, and
long-term from 24 hours onward. Set to 0 to select only from long-term
history data.
Related tasks
Editing the portal server environment file on page 44
Related reference
Portal client parameter list on page 36
Procedure
1. Open the Tivoli Enterprise Portal Server environment file for editing:
In Manage Tivoli Monitoring Services, right-click Tivoli Enterprise
v
Portal Server and click Advanced Edit ENV File.
Change to the Install_dir/config directory and open
v
cq.ini in a text editor.
2. Locate and edit the TEPS database event pruning parameters as needed:
46
Procedure
v Edit the Tivoli Enterprise Portal environment file:
1. Start Manage Tivoli Monitoring Services:
Click Start Programs IBM Tivoli Monitoring Manage Tivoli
Monitoring Services.
Change to the <itm_install_dir>/bin directory and enter: ./itmcmd
manage.
2. Right-click Tivoli Enterprise Portal Desktop or Tivoli Enterprise Portal
Browser, and click Reconfigure. The Configure Application Instance window
is displayed for the desktop client (also used for Java Web Start); the
Configure Tivoli Enterprise Portal Browser window is displayed for the
browser client.
3. Double-click cnp.attachment.total.maxsize and enter the maximum size in
bytes for individual files that get attached to an event acknowledgemen
(such as 2500000 for 2.5 MB), and select In Use.
4. If you want to change the segment size (the default 1000000 is 1 MB, thus a 5
MB attachment would be transmitted in 5 x 1 MB segments), double-click
cnp.attachment.segment.maxsize and enter a new segment size in bytes, and
select In Use.
5. Click OK to save your changes. Your changes will take effect the next time a
user logs onto the portal server. Users already logged on will see no change
until they exit, then log on again.
v Edit the Tivoli Enterprise Portal Server environment file:
1. Open the Tivoli Enterprise Portal Server environment file for editing:
In Manage Tivoli Monitoring Services, right-click Tivoli Enterprise
Portal Server and click Advanced Edit ENV File .
Change to the Install_dir/config directory and open
cq.ini in a text editor.
Chapter 3. Editing the portal configuration settings
47
Procedure
1. Open the Tivoli Enterprise Portal Server environment file for editing:
In Manage Tivoli Monitoring Services, right-click Tivoli Enterprise
v
Portal Server and click Advanced Edit ENV File .
Change to the Install_dir/config directory and open
v
cq.ini in a text editor.
2. Locate KFW_AUTHORIZATION_MAX_INVALID_LOGIN=0 and specify a value between 0
and 15. The default value of 0 indicates that there is no limit to the number of
failed attempts a user can make before they are locked out.
3. Save and close the environment file.
4. Click Yes when a message asks if you want to recycle the service; or click No if
you prefer to have your changes take effect later by recycling the portal server.
Results
The next time a user attempts to log on to the portal server, the number of logon
attempts will be restricted by the value you set
KFW_AUTHORIZATION_MAX_INVALID_LOGIN to in the environment file.
What to do next
Security: Validate User
The invalid login setting is effective only when you have enabled security
through the hub monitoring server.
You must also enable the Login Lockout feature by
turning on the validation setting in the monitoring server configuration
file: KDS_VALIDATE_EXT="Y".
48
49
Procedure
1. Do one of the following to open the Tivoli Enterprise Portal Server
environment file on the computer where the portal server is installed:
v In Manage Tivoli Monitoring Services, right-click the Tivoli Enterprise Portal
Server and click Advanced > Edit ENV file.
v From the Windows command line, change to the <install_dir>\cnps
directory and open kfwenv in a text editor. (The default <install_dir> is
C:\IBM\ITM\.)
v From the Linux or UNIX command line, change to the <install_dir>/config
directory and open cq.ini in a text editor. (The default <install_dir> is
/opt/IBM/ITM.)
2. Save and close the environment file.
3. Recycle the portal server.
Results
FIPS is now enabled on the portal server.
What to do next
When in FIPS 140-2 mode, Tivoli Management Services components and Tivoli
Enterprise Monitoring Agents use one or more of these FIPS 140-2 approved
cryptographic providers: IBMJCEFIPS (certificate 497), IBMJSSEFIPS (certificate
50
409), and IBM Crypto for C (ICC (certificate 775) for cryptography. The certificates
are listed on the NIST Web site at http://csrc.nist.gov/groups/STM/cmvp/
documents/140-1/140val-all.htm.
All IP.SPIPE connections and SSL-enabled LDAP connections utilize TLS 1.0
protocol only. SSL must be enabled between the Tivoli Enterprise Portal client and
the Tivoli Enterprise Portal Server, and is described in the IBM Tivoli Monitoring
Installation and Setup Guide topic, Using SSL between the portal server and the
client. Failure to enable SSL might expose credentials.
Enable IP.SPIPE between all Tivoli Monitoring components to preserve integrity
and confidentiality of data using FIPS 140-2 compliant cryptography. Certificates
used in IP.SPIPE communication require NIST and FIPS prescribed cryptographic
strength. Chapter 4 describes in detail how to replace cryptographic certificates. If
your environment uses the the provided GSKit utilities, the '-fips' flag must be
included in all operations. Refer to your local security administrator or to the NIST
Web site for more details on FIPS 140-2 compliance.
51
52
Procedure
v
1. From the command prompt, run this script to get the IBM Java location:
Install_dir\InstallITM\GetJavaHome.bat
5.
v
1. From the console, run this script to get the IBM Java location:
Install_dir/bin/CandleGetJavaHome.sh
2. Export variable JAVA_HOME to point to the IBM Java path. For 64-bit, the
gsk7ikm has to be 64bit Java.
3. Check the path for a local GSKit by looking in this file:
Install_dir/config/gsKit.config
53
Procedure
1.
2.
3.
4.
5. Select Personal Certificate Requests from the pull-down list and click New.
6. Click New.
7. Type IBM_Tivoli_Monitoring_Certificate in the Key Label field.
8. Type a Common Name and Organization, and select a Country. For the
remaining fields, either accept the default values, or type or select new values.
9. At the bottom of the window, type a name for the file.
10. Click OK. A confirmation window is displayed, verifying that you have
created a request for a new digital certificate.
11. Click OK.
Results
The IBM Key Management window is displayed.
What to do next
Send the file to a CA to request a new digital certificate, or cut and paste the
request into the request forms on the CA's Web site.
54
Procedure
1. Create a CA key database.
2. Create the self-signed certificate.
3. Export the self-signed certificate.
4. Receive the self-signed certificate into the key databases on the portal server.
What to do next
When you receive the CA-signed certificate, you must delete the self-signed
certificate.
Procedure
1. If you have not already done so, start iKeyman.
Click Key Database File Open.
Select the keyfile.kdb database and click Open.
Type the password for the database and click OK.
Select Personal Certificates from the pull-down list.
Click Receive.
Click Data type and select the data type of the new digital certificate, such as
Base64-encoded ASCII data.
8. Type keyfile.sth for the Certificate file name and <itm_installdir>/
keyfiles as the Location for the new digital certificate.
9. Click OK.
10. Type IBM_Tivoli_Monitoring_Certificate for the new digital certificate and
click OK.
2.
3.
4.
5.
6.
7.
55
Procedure
1. If you have not already done so, start iKeyman.
2. Select Key Database File Stash File. An information window is displayed
telling you that the password was saved to a stash file.
3. Click OK.
56
57
Note: The ITMSSOEntry is the name of the portal server LDAP repository
if AD2000, AD2003, or IDS6 is selected during portal server configuration.
(See Using Manage Tivoli Monitoring Services to configure the portal
server for LDAP authentication on page 68 or Using the Linux or UNIX
command line to configure the portal server for LDAP authentication on
page 71.)
Migrating LDAP authentication from the hub to the portal server
If your hub monitoring server has already been configured to authenticate
users to an LDAP registry, and you now want to migrate to authentication
through the portal server using the same LDAP registry, you must change
the Distinguished Name that is set for the user ID in the Administer Users
window of the Tivoli Enterprise Portal.
Related concepts
User authentication through the portal server on page 64
User authentication through the hub monitoring server
If you intend to authenticate using the hub monitoring server, make sure that user
accounts for the Tivoli Enterprise Portal Server log-in IDs are set up in the
authenticating registry before authentication is enabled. At a minimum, add the
sysadmin user ID to the local registry on the hub computer, so that sysadmin can
log in after authentication has been enabled.
Note: On Windows, the installer creates a sysadmin user account in the Windows
registry and asks you to specify a password for that ID. The password is not
required unless password authentication is enabled.
58
Tip: The Windows installer does not set the "Password never expires" option when
it creates the sysadmin account. If you do not set this option, the password will
expire according to the security policy on the hub computer, and you will not be
able to log in to the portal server. Use the Windows Administrative Tools to ensure
that the "Password never expires" option is selected for the sysadmin user account.
Before you enable authentication, obtain the following information:
Procedure
v If you are using an external LDAP server for authentication, obtain the
information shown in this table from the LDAP administrator before configuring
user authentication.
Table 3. LDAP configuration parameters
Parameter
Description
LDAP User
Filter
The attributes used to map Tivoli Enterprise Portal user IDs to LDAP
log-in IDs. The attribute must contain the same name as the Tivoli
Enterprise Portal log-in ID. The portal user ID will usually become the
%v in the LDAP user filter. For example:
IBM Tivoli Directory Server: (&(mail=%[email protected])
(objectclass=inetOrgPerson))
Microsoft Windows Active Directory: (&(mail=%[email protected])
(objectclass=user))
Sun Java System Directory Server: (&(mail=%[email protected])
(objectclass=inetOrgPerson)
Not all LDAPs have the mail attribute for the person. For example, the
LDAP administrator might only set the common name, in which case the
filter would look like the following:
(&(cn=%v) (objectclass=inetOrgPerson))
The Tivoli Enterprise Portal administrator should verify exactly which
LDAP attribute must be used to search for the user. With Active Directory,
for example, the cn equals the Full Name of the Active Directory user,
and this must be exactly the same as the Tivoli Monitoring user, and
cannot have spaces (for example, "S Smith" must be "SSmith").
LDAP base
The LDAP base node in the LDAP repository that is used in searches for
users. For example:
IBM Tivoli Directory Server: dc=yourdomain,dc=yourco,dc=com
Microsoft Windows Active Directory: dc=yourdomain,dc=yourco,dc=com
Sun Java System Directory Server: dc=yourdomain,dc=yourco,dc=com
LDAP bind ID
The LDAP user ID for bind authentication, in LDAP notation. This LDAP
user ID must be authorized to search for LDAP users. This value can be
omitted if an anonymous user can search for LDAP users.
LDAP bind
password
The password for LDAP bind authentication. This value can be omitted if
an anonymous user can bind to your LDAP server. This value is
encrypted by the installer.
LDAP host
name
The LDAP server host name. This value can be omitted if your LDAP
server is on the same host as the Tivoli Enterprise Monitoring Server. (The
default is localhost.)
LDAP port
number
The LDAP server port number. This value can be omitted if your LDAP
server is listening on port 389.
v If you intend to use SSL communication between the hub monitoring server and
the LDAP server, obtain the information described in this table.
59
Table 4. SSL parameters for communication between hub and LDAP server
Parameter
Description
LDAP key
store file
The location of GSKit key store data base file. You can specify any
location. For example:
C:\IBM\ITM\keyfiles
LDAP key
store stash
LDAP key
store label
C:\IBM\ITM\keyfiles\keyfile.sth
IBM_Tivoli_Monitoring_Certificate
LDAP key
The password required to access the key store.
store password
Configuration procedure
Configure user authentication on the Windows-, Linux-, or UNIX-based hub
monitoring server.
For instructions to configure authentication on a hub monitoring server installed
on z/OS, seeIBM Tivoli Management Services on z/OS: Configuring the Tivoli Enterprise
Monitoring Server on z/OS. Authentication by an external LDAP registry is not
supported on a z/OS hub.
Procedure
1. Select Start Programs IBM Tivoli Monitoring Manage Tivoli Monitoring
Services
2. Right-click the hub monitoring server and select Reconfigure.
3. In the configuration window that displays, select Security: Validate User. The
option LDAP Security: Validate User with LDAP becomes available.
4. If you want to use LDAP for user authentication, check the Validate User with
LDAP option, then click OK to open the LDAP window. If you want to use the
local registry, skip to step 7.
5. Specify the required LDAP values as appropriate for your site.
6. If you want to use SSL to secure communications between the hub and the
LDAP server, check LDAP SSL Communications: Use SSL? and provide the
appropriate values. If required, provide a password for the keystore.
7. Click OK The Hub TEMS Configuration window is displayed.
8. Click OK to accept the current settings.
9. In the Manage Tivoli Monitoring Services window, restart the hub monitoring
server by right-clicking its name and selecting Start.
60
where install_dir is the installation directory for IBM Tivoli Monitoring, and
tems_name is the name of the hub monitoring server. The default installation
directory on Linux or UNIX is /opt/IBM/ITM. You will see the following
prompt:
Configuring TEMS...
2. Accept the defaults for the following prompts. The defaults should reflect the
selections made during installation.
3. When you see the prompt:
Security: Validate User?
CMS_Name
ip.pipe:elsrmt1[4441]
61
where install_dir is the installation directory for IBM Tivoli Monitoring. The
default installation directory on Linux or UNIX is /opt/IBM/ITM. The Manage
Tivoli Monitoring Services window is displayed.
2. Right-click the hub monitoring server and click Configure.
3. Click the Advanced Setting tab. Select Security: Validate User.
4. If you want to use LDAP to authenticate users instead of the system registry,
select LDAP user authentication.
5. Click OK. If you selected the LDAP option, the LDAP configuration panel is
displayed.
6. Specify the values, then click OK.
7. Click OK.
8. Restart the hub monitoring server, using one of the following methods:
v In the Manage Tivoli Monitoring Services window, right-click the hub
monitoring server and select Recycle.
v From the command line, enter:
./itmcmd server stop tems_name
./itmcmd server start tems_name
62
Corresponding parameter in
TEMS configuration file
Description
-h host
KGL_LDAP_HOST_NAME
-p port
KGL_LDAP_PORT
-D dn
KGL_LDAP_BIND_ID
KGL_LDAP_BIND_PASSWORD
KGL_LDAP_BASE
-K keyfile
-P key_pw
KGL_KEYRING_PASSWORD
decrypted value
KGL_KEYRING_LABEL
Filter
KGL_LDAP_USER_FILTER
ldap.itm62.com
389
LDAP base
ou=itm62users,o=itm62.com
"(mail=%[email protected])"
63
uid=12345678,ou=itm62users,o=itm62.com
objectClass=person
objectClass=organizationalPerson
...
[email protected]
...
ldap.itm62.com
636
LDAP bind ID
uid=1,ou=itm62users,o=itm62.com
itm62
LDAP base
ou=itm62users,o=itm62.com
C:\IBM\ITM\itm62keyfiles\keyfile.kdb
C:\IBM\ITM\itm62keyfiles\keyfile.sth
BM_Tivoli_Monitoring_Certificate
"(mail=%[email protected])"
64
sysadmin until after you have enabled authentication and are already
logged on to the Tivoli Enterprise Portal.
The default user name for the Tivoli Enterprise Portal Server extended
services (TEPS/e) administrator is wasadmin. If this UID was added to the
registry, have the user registry administrator either change the name or
remove the entry. In a federated repository, two entries with the same
name cause a conflict.
A best practice is to not add sysadmin to the LDAP repository. If the
LDAP server is unavailable you cannot log onto the Tivoli Enterprise
Portal using LDAP user accounts, but you can still log onto the portal
using sysadmin because it is mapped to the default Tivoli Monitoring
realm.
Set up Tivoli Enterprise Portal user accounts.
Add the user IDs that you intend to authenticate with an LDAP registry.
This can be done before or after the portal server has been configured for
LDAP authentication. After LDAP configuration, you must return to the
Administer Users window in the portal client to associate the user ID with
its distinguished name from the repository.
The sysadmin password
The Windows installer creates a sysadmin user account in the Windows
registry and prompts you to specify a password for that ID. The password
is not required unless password authentication is enabled.
The installer does not set the Password never expires option when it
creates the sysadmin account. If you do not set this option, the password
will expire according to the security policy on the hub Tivoli Enterprise
Monitoring Server and you will not be able to log in to the portal server.
Use the Windows Administrative Tools to ensure that the Password never
expires option is selected for the sysadmin user account.
LDAP configuration information
Obtain the information shown in the following table from the LDAP
administrator before configuring the portal server for LDAP user
authentication.
Table 6. LDAP configuration parameters
Parameter
Description
LDAP Type
One of the following types of LDAP servers can be defined to the portal
server using the Tivoli Management Services installation and
configuration utilities:
v Active Directory Server 2000
v Active Directory Server 2003
v Tivoli Directory Server 6.x
v Other
Other is specified if you are configuring a different LDAP server or need
to customize the LDAP configuration (or both). For example, if you are
using a federated user registry with a base distinguished name that is
different from the default o=ITMSSOEntry, select Other and specify the
distinguished name in the TEPS/e administration console. See TEPS/e
administration console on page 72.
65
Description
LDAP base
This is the LDAP base node in the LDAP repository that is used in
searches for users. For example:
IBM Tivoli Directory Server: dc=yourdomain,dc=yourco,dc=com
Microsoft Windows Active Directory: dc=yourdomain,dc=yourco,dc=com
Sun Java System Directory Server: dc=yourdomain,dc=yourco,dc=com
LDAP bind ID
This is the LDAP user ID for bind authentication, in LDAP notation, and
must be authorized to search for LDAP users. The bind ID can be omitted
if an anonymous user can search for LDAP users.
LDAP bind
password
This is the LDAP user password for LDAP bind authentication. This value
can be omitted if an anonymous user can bind to your LDAP server. This
value is encrypted by the installer.
LDAP port
number
This is the port number that the LDAP server is listening on. This value
can be omitted if the port is 389.
LDAP host
name
can be omitted if the LDAP server is on the same computer as the portal
server.
Description
Domain name
This is the Internet or Intranet domain for which SSO is configured. Only
applications available in this domain or its subdomains are enabled for
SSO. Example:
ibm.com
Realm name
This is a parameter shared across applications that are using the SSO
implementation and are configured for SSO within the specified domain.
Applications configured for the same domain name, but for a different
realm name will not work as a part of the same SSO infrastructure.
Example:
ibm_tivoli_sso
66
User logon
Users log onto one of the participating applications, have their user ID and
password authenticated, and then start another application from within the
original application to view related data or perform required actions
without having to re-enter their user ID and password.
Tivoli Enterprise Portal browser client
Using a browser client or Java Web Start client, you can start another
participating Tivoli Web application from the Tivoli Enterprise Portal by
using Launch Application or by typing the URL of the application into a
browser view.
You can start the Tivoli Enterprise Portal browser client from an
SSO-enabled Web application.
Note: If you are using SSO and you want to use the browser client on the
same computer as the Tivoli Enterprise Portal Server, you must reconfigure
the client to use the fully qualified name of the host computer.
Tivoli Enterprise Portal desktop client
Using the desktop client, you can start another application from a
workspace by using SSO. To do this, you must enter the URL of the
application in the address field of a browser view. However, you cannot
start the Tivoli Enterprise Portal from another application to the desktop
client.
SSO-enabled applications belong to the same security domain and realm
For SSO to be enabled, authentication must be configured through the
Tivoli Enterprise Portal Server for an external LDAP registry that is shared
by all participating Tivoli applications. All the participating applications
must be configured for SSO and must belong to the same security domain
and realm.
The domain is the Internet or Intranet domain for which SSO must be
configured. Only applications available in this domain or its subdomains
are enabled for the SSO.
The realm is a parameter shared across different applications that are using
the LTPA SSO implementation.
LTPA tokens
Authenticated credentials are shared among participating applications
using LTPA (Lightweight Third Party Authentication) tokens. An LTPA
token is encrypted data containing previously authenticated user
credentials. Participating SSO applications pass LTPA tokens using browser
cookies.
LTPA tokens are secure because they are created using secure
cryptography. The tokens are both encrypted and signed. The server
creating an LTPA token uses a set of cryptographic keys. The cryptographic
keys are used to encode the token, so that the encoded token traveling to
the user's browser cannot be decoded by someone who does not have the
cryptographic keys. The cryptographic keys also are used to validate the
token ensuring that the token integrity is verifiable and tampering can be
readily detected. When an SSO server receives an HTTP request and sees
that the LTPA token is included, the server verifies the token using its copy
of the shared cryptographic keys, and the information in the valid token
allows the server to recognize the logged-in user.
67
Procedure
1. Start Manage Tivoli Monitoring Services:
v
Click Start Programs IBM Tivoli Monitoring Manage Tivoli
Monitoring Services.
Where ITM_dir is the IBM Tivoli Monitoring installation
v
directory, change to the ITM_dir/bin directory and run ./itmcmd manage [-h
ITM_dir].
2. Right-click Tivoli Enterprise Portal Server:
Click Reconfigure, and click OK to accept the existing
v
configuration and go to the second TEP Server Configuration window.
68
v
Click Configure.
3. In the LDAP Security area, select Validate User with LDAP?. On Linux and
UNIX, the LDAP Security area is on the TEMS Connection tab.
4. Optional: If you want to add the export and import LTPA keys for SSO, select
Enable Single Sign On?.
list:
5. Select the LDAP type from the
v AD2000 for Active Directory Server 2000
v AD2003 for Active Directory Server 2003
v IDS6 for IBM Tivoli Directory Server Version 6.x.
v Other if your LDAP server is not one of those listed or you intend to
customize the LDAP configuration for the Active Directory Server or Tivoli
Directory Server. For example, you are using a federated user registry with
a base distinguished name that is different from the default o=ITMSSOEntry
or you are configuring SSL communications to the LDAP server. After
completing this procedure, start the TEPS/e administration console to
complete the LDAP server configuration. See TEPS/e administration
console on page 72.
Important: If you think you might need to edit the configuration of the
Active Directory Server or Tivoli Directory Server at a later time, such as to
configure SSL communications to the LDAP server, be sure to select Other
and use the TEPS/e administration console to configure the server (skip
step 6). Otherwise, any customization done in the console is lost the next
time you reconfigure the portal server.
6. If you selected AD2000, AD2003, or IDS6 as the LDAP type, complete the
other fields to specify the LDAP server:
a. LDAP base is the LDAP base node in the LDAP repository that is used in
searches for users.
b. LDAP bind ID is the LDAP user ID for bind authentication, in LDAP
notation, and must be authorized to search for LDAP users. The bind ID
can be omitted if an anonymous user can search for LDAP users.
c. LDAP bind password is the LDAP user password for LDAP bind
authentication. This value can be omitted if an anonymous user can bind
to your LDAP server. This value is encrypted by the installer.
d. LDAP port number that the LDAP server is listening on. This value can
be omitted if the port is 389.
e. LDAP host name, which can be omitted if the LDAP server is on the same
computer as the portal server. Default: localhost.
7. Click OK.
v If you selected Enable Single Sign On?, the Single Sign On dialog is
displayed with Realm name and Domain name fields and Import Keys
and Export Keys buttons.
v If you are not enabling single sign-on, click OK to close any other portal
server configuration dialogs.
8. For SSO, specify the realm and domain in the Single Sign On dialog:
a. Realm name is a parameter shared across applications that are using the
SSO implementation and are configured for SSO within the specified
domain. Applications configured for the same domain name, but for a
different realm name will not work as a part of the same SSO
infrastructure.
69
10.
11.
12.
13.
b. Type a name for the file that the LTPA keys should be placed in and click
Save.
c. In the Export keys window, type a password to use to encrypt the file, and
click OK. You see a console window while the file is created and
encrypted, and then you are returned to the Single Sign On window.
For applications participating in SSO, if you want to import keys used by
other applications to encrypt their LTPA tokens, click Import Keys and
complete the following steps:
a. In the Open window that is displayed, navigate to the directory where the
key file is located. The directory displayed initially, on Windows, is
ITM_dir\InstallITM; and on Linux and UNIX, it is the Root directory.
b. Type the name of the file that you want to import, and click Open. You
see a console window while the file is created and encrypted, and then
you are returned to the Single Sign On window. Repeat the import process
to import keys from additional participating servers.
c. Type the password required to decrypt the file, and click OK. You see a
console window while the file is created and encrypted, and then you are
returned to the Single Sign On window.
d. Repeat the import process to import keys from additional participating
servers.
Click OK.
If you are prompted to reconfigure the warehouse connection
information, answer No. After some processing of the configuration settings,
the Common Event Console Configuration window is displayed. Sometimes
this window does not open in the foreground and is hidden by other
windows. If processing seems to be taking longer than expected, minimize
other windows and look for the configuration window. When the Common
Event Console Configuration window is displayed, click OK.
If necessary, recycle the portal server by selecting Tivoli Enterprise Portal
Recycle or by stopping, then starting the portal server.
Server and clicking
What to do next
If you chose Other as the LDAP type, the LDAP configuration must be completed
in the TEPS/e administration console.
With the LDAP registry configured, you can map the Tivoli Enterprise Portal user
IDs to the LDAP distinguished names to complete the configuration You must log
on to the Tivoli Enterprise Portal with the sysadmin user ID or a user ID that has
the same administrative authority.
70
Related concepts
TEPS/e administration console on page 72
Procedure
1. Log on to the computer where the Tivoli Enterprise Portal Server is installed.
2. At the command line, change to the Install_dir/bin directory, where
Install_dir is the directory where you installed the product.
3. Run the following command to start configuring the Tivoli Enterprise Portal
Server: ./itmcmd config -A cq. The message Agent configuration started... is
displayed, followed by a prompt:
Edit "Common event console for IBM Tivoli Monitoring" settings?
[ 1=Yes, 2=No ] (default is: 1)
6. Accept the default values for this prompt and the prompts that follow it until
you see the following prompt. The default values reflect the selections made
during the original configuration.
LDAP Security: Validate User with LDAP ? (1=Yes, 2=No)(Default is: 2):
For LDAP type, choose Other if your LDAP server is not one of those listed
or you intend to customize the LDAP configuration for the Active Directory
Server or Tivoli Directory Server. For example, you are using a federated user
registry with a base distinguished name that is different from the default
o=ITMSSOEntry or you are configuring SSL communications to the LDAP
server. After completing this procedure, start the TEPS/e administration
console to complete the LDAP server configuration. See TEPS/e
administration console on page 72.
8. Continue to enter the values prompted for (see Table 6 on page 65):
LDAP base: o=IBM
LDAP bind ID: cn=root
LDAP bind password:
Re-type: LDAP bind password:
LDAP Port number(Default is: 389):
LDAP host name(Default is: localhost): itmxseries04
71
After the installer has completed the configuration, the following message is
displayed: Agent configuration completed...
10. Recycle the portal server.
./itmcmd agent stop cq
./itmcmd agent start cq
What to do next
If you enable single sign-on, ensure that the Tivoli Enterprise Portal administrator
exports the LTPA keys for exchange with other participating applications and
import the keys from those applications.
Procedure
1. Enable the TEPS/e administration console:
In the Manage Tivoli Monitoring Services window, highlight Tivoli
v
Enterprise Portal Server and select Advanced TEPS/e Administration
Enable TEPS/e Administration.
72
The TEPS/e administration console is now enabled for logon and will remain
enabled until the portal server is stopped.
2. If this is the first time you are enabling the console, you must set the
administration password:
In theManage Tivoli Monitoring Services window, highlight Tivoli
v
Enterprise Portal Server and select Advanced TEPS/e Administration
TEPS/e Administration Password.
From the scripts directory, enter the following command,
v
where <username> is wasadmin, and <password> is the new password:
updateTEPSEPass.sh <username> <password>
Results
The Integrated Solutions Console (TEPS/e administration console) window is
opened. Even after you log out of the administration console, it remains enabled
until the Tivoli Enterprise Portal Server is stopped.
What to do next
You can now configure an external LDAP server or verify the configuration.
SSL communication between the portal server and the LDAP server is configured
using the TEPS/e administration console. Consult the administrative console help
system for instructions.
If the TEPS/e administration console is running when the portal server is recycled,
you must log out and enable the console again to resynchronize with the portal
server.
Procedure
1. In the TEPS/e administration consolenavigation tree, click Security Secure
administration, applications, and infrastructure.
2. On the page that is displayed, ensure that Federated repositories is selected
as the realm definition, and click Configure.
3. Configure the federated repository:
a. Verify or enter the Realm Name value.
Chapter 5. Enabling user authentication
73
Results
Users logging into the portal server are now authenticated through the external
LDAP repository.
What to do next
You might also need to map the Tivoli Enterprise Portal user IDs to the LDAP
UIDs. See Mapping Tivoli Enterprise Portal user IDs to LDAP distinguished
names on page 75.
You must enable the administration console after a recycle of the portal server
before you can start the console again.
Important: Any customizations made within the TEPS/e administration console
are overwritten and cleared any time the portal server is reconfigured unless you
chose the LDAP type of Other during portal server configuration. When Other is
chosen, the repository information is handled by TEPS/e and is not affected by
Tivoli Management Services directly. See step 5 on page 69.
If your organization needs to use Tivoli Enterprise Portal IDs longer than 10
characters, download TEPS/e User Administration using Active Directory from the
Open Process Automation Library (OPAL) and follow the method to enable Active
Directory or other LDAP sources for the User ID mappings.
74
Procedure
1. Log on to the portal using sysadmin or another user account with full
administrative authority.
Administer Users.
2. Click
3. In the Administer Users window, right-click the row of the user ID to map and
Modify User.
select
4. In the Modify User dialog box, click Find to locate the LDAP distinguished
name to be associated with the Tivoli Enterprise Portal.
Example:UID=TEPUSER,O=SS.
Note: The default suffix for LDAP servers that are configured through the
Tivoli Enterprise Portal Server is o=ITMSSOEntry, which is created by the Tivoli
Enterprise Portal Server extended services. The ITMSSOEntry repository is not
created if the portal server was configured for LDAP authentication with an
LDAP type of Other.
If you want to use a federated user registry with a different DN suffix, you
must configure the portal server for an LDAP type of Other, and then
configure the LDAP server and the DN suffix through the TEPS/e
administration console.
5. Click OK to save the mapping and return to the Administer Users window.
6. Repeat steps 3 through 5 until you have mapped all the users that you want to
authenticate with the configured LDAP registry.
7. Click OK to exit the Administer Users window.
What to do next
After you have configured a user ID for single sign-on, if the user is not successful
at launching into the Tivoli Enterprise Portal, review the TEPS/e log for diagnostic
information. This is the SystemOut.log located on the computer where the portal
Install_dir\CNPSJ\profiles\ITMProfile\logs;
server is installed at
Install_dir/Platform/iw/profiles/ITMProfile/log.
Chapter 5. Enabling user authentication
75
Related reference
Tivoli Enterprise Portal distinguished names on page 77
Procedure
v From Manage Tivoli Monitoring Services window, complete the following
procedure to export keys:
1. Right-click the Tivoli Enterprise Portal Server and click Advanced TEPS/e
Administration Export keys.
2. Navigate to the directory where you want to create the file or change the file
type, or both. The directory displayed initially, on Windows, is
ITM_dir\InstallITM; and on Linux and UNIX, it is the Root directory.
3. Type a name for the file that the LTPA keys should be placed in and click
Save.
4. In the Export keys window, type a password to use to encrypt the file, and
click OK. You see a console window while the file is created and encrypted,
and then you are returned to the Single Sign On window.
v From Manage Tivoli Monitoring Services window, complete the following
procedure to import keys:
1. Right-click the Tivoli Enterprise Portal Server and click Advanced TEPS/e
Administration Import keys.
2. In the Open window that is displayed, navigate to the directory where the
key file is located. The directory displayed initially, on Windows, is
ITM_dir\InstallITM; and on Linux and UNIX, it is the Root directory.
3. Type the name of the file that you want to import, and click Open. You see a
console window while the file is created and encrypted, and then you are
returned to the Single Sign On window. Repeat the import process to import
keys from additional participating servers.
4. Type the password required to decrypt the file, and click OK. You see a
console window while the file is created and encrypted, and then you are
returned to the Single Sign On window.
5. Repeat the import process to import keys from additional participating
servers.
v From the AIX and Linux command line, to export keys, run ./exportKeys.sh
<filename> <password>. The script is installed to ITM_dir/platform/iw/scripts.
Examples: /opt/IBM/ITM/aix533/iw/scripts on AIX, /opt/IBM/ITM/li6263/iw/
scripts on Linux, and/opt/IBM/ITM/ls3263/iw/scripts on zLinux.
76
v From the AIX and Linux command line, to import keys, run ./importKeys.sh
<filename> <password>. The script is installed to ITM_dir/platform/iw/scripts.
Related tasks
Migrating authentication from the monitoring server to the portal server on page
78
Procedure
1. Launch the Manage Tivoli Monitoring Services utility.
2. Right-click the Tivoli Enterprise Portal Browser entry and click Reconfigure to
open the Configure Enterprise Portal Browser window.
3. In the Host field beneath TEP Server, type the fully-qualified name of the
computer. Example: myhost.mycompany.com
Related concepts
About single sign-on on page 66
77
Procedure
1. Disable Tivoli Enterprise Monitoring Server security validation:
Use the Manage Tivoli Monitoring Servicesutility to reconfigure the
v
hub monitoring server:
a. Right-click the Tivoli Enterprise Monitoring Server and click Reconfigure
.
b. On the Tivoli Enterprise Monitoring Server Configuration window,
disable Security: Validate User and click OK.
c. Click OK to accept the existing settings on the next window.
d. Restart the hub monitoring server.
From the command line:
v
a. Change to the /opt/IBM/ITM/bin directory (or the directory where you
installed Tivoli Management Services).
78
2.
3.
4.
5.
c. Press Enter to accept the existing values until you see the prompt for
Security: Validate User.
d. Enter NO to disable security.
e. Continue to press Enter until the configuration is complete.
f. Restart the hub monitoring server.
Rename the sysadmin UID in the LDAP registry (for example, sysadmin_tems).
Configure LDAP authentication to be through the portal server. Use the
Manage Tivoli Monitoring Services utility or the command line to configure the
portal server.
Start the Tivoli Enterprise Portal Server and log on to the Tivoli Enterprise
Portal as sysadmin.
Adjust all user mappings to LDAP user IDs:
Administer Users to open the Administer Users window.
a. Click
b. Right-click the row of the user ID to remap and click
Modify User.
c. Click Find to locate the LDAP distinguished name to be associated with the
portal server.
d. Select the distinguished name for the user. If you see multiple entries, select
the one with the correct LDAP suffix (parent entry). Examples:
UID=TIVOLIUSER,O=MYCOMPANY and uid=myname, dc=tivoli, dc=ibm, dc=us. If
you see an entry with one of these organization values, do not choose it:
O=DEFAULTWIMITMBASEDREALM is the default suffix for user IDs that
authenticate through the hub monitoring server; and
o=defaultWIMFileBasedRealm is the default for the TEPS/e user registry.
e. Click OK to save the mapping and return to the Administer Users window,
then continue to modify the DN for each user ID.
6. Before logging out of the Tivoli Enterprise Portal, have the LDAP administrator
rename the LDAP sysadmin account back to sysadmin, then map the Tivoli
Enterprise Portal sysadmin user account to the LDAP sysadmin DN.
7. Save your changes and log out of the Tivoli Enterprise Portal.
Results
At this point, the migration is complete.
What to do next
You can always reinstate authentication through the Tivoli Enterprise Monitoring
Server for users who want to use the Tivoli Web Services for sending SOAP
requests.
Related concepts
Chapter 5, Enabling user authentication, on page 57
User authentication through the portal server on page 64
User authentication through the hub monitoring server on page 58
Related tasks
Importing and exporting LTPA keys on page 76
79
80
Administer Users
Your user ID and the user groups you are a member of are profiled with a set of
permissions that determines which Tivoli Enterprise Portal features you are
authorized to see and use, a list of monitored applications you are authorized to
see, and a list of Navigator views (and the highest level within a view) you can
access.
Administer Users opens the Administer Users window. This is a
Clicking
two-paned window with Users and User Groups tabs in the top frame, and several
tabs in the bottom frame. This arrangement enables the administrator to manage
user profiles by individual user, by user groups, or a combination of the two. You
might create a user profile, then copy the profile for each additional user and
Copyright IBM Corp. 2005, 2010
81
change settings as needed (such as, for the Action feature, granting View
permission to one user and granting Modify permission to a different user). Or
you might create a user group with a particular profile and add users to the group.
Then you can modify the permissions once for a group and apply to all members
automatically.
Related tasks
Adding a user ID on page 86
Viewing and editing a user ID on page 88
Permissions
You can authorize the same set of functional permissions multiple users, user
group or each user ID at one time.
The following features are enabled or disabled individually for each user ID or
user group.
Action
View allows the user to see and run a take action command from the
available list of commands in the Take Action view and in the pop-up
menu for the Navigator item.
Modify allows the user to create and save Take Action commands.
When enabled,
Edit Action appears in the Navigator pop-up menu.
When issuing a take action command, you must be authorized on the
relevant system for the requested command. For example, to issue a TSO
command, your user ID must be both a valid TSO ID and a valid user ID
on the portal server. The user ID must be typed with the same letter casing
exactly as typed when logging on to the portal server (with the same letter
casing).
Agent Management
Manage allows the user to perform agent deployment throughout the
managed network. This includes installing a monitored product, keeping
the software revisions up-to-date, and removing an agent from the
managed network. This permission also requires Action - Modify to be
enabled.
Start/Stop allows the user to start a monitoring agent or to stop it
running.
82
Attach allows the user to attach a file (such as detailed notes) to the
situation event. This permission requires that the user also have the
Acknowledge and View permissions.
Close lets you close a pure event or an event that was open before a
Close Situation
situation was stopped manually. When it is enabled,
Event appears in the pop-up menu of the situation event flyover list, event
Navigator item, and situation event console view when the selected event
is a pure event or the situation has been stopped.
View enables you to see situation event indicators in the Navigator
when situations become true.
Acknowledge allows you to acknowledge a situation event. When this
permission is enabled, Acknowledge Event appears in the pop-up menu of
the situation event flyover list, event Navigator item, and situation event
console view.
Feature
Enable is dimmed because you cannot change it. The access to this
feature is determined by your organization's IBM Tivoli Monitoring license.
History
Configure allows the user to open the History Collection Configuration
window, configure history files and data rolloff, and start and stop data
collection for the different attribute groups. When this permission is
History Configuration appears in the main toolbar.
enabled,
Launch Application
Launch allows the user to invoke any of the launch definitions
available for the Navigator item, table view, chart view, or situation event
History Configuration
console view. When this permission is enabled,
appears in the main toolbar.
View allows the user to see the composition of the selected launch
definition.
Modify allows the user to create, edit and delete launch definitions.
Managed System Group
View allows the user to access the Object group editor for viewing
managed system groups. The user also needs Modify permission for the
Object group editor tools to be available.
Modify allows the user to open the Object group editor to create, edit,
and delete managed system groups.
Policy
View allows the user to open the Workflows window to see the policies
and their definitions. With View permission, the
Workflow Editor is
83
Modify allows the user to open the Workflow editor to create and edit
policies. With the Modify permission enabled,
New Policy is available
after the user selects a policy, as are the other editing tools:
Workflow,
Query
Edit
Delete Policy.
View allows the user to access the Query editor through the Properties
editor and select a query for the selected table or chart. With the View
permission enabled, the user can assign a query through the Query tab of
the Properties editor.
Modify allows the user to create, edit and delete queries in the Query
Query Editor is available
editor. With the Modify permission enabled,
from the main toolbar, as are the query editing tools.
Situation
View allows the user to see situations in the Situation editor, including
any expression overrides, and in the Manage Situations at Managed
Situation Editor is
System window. With the View permission enabled,
available in the main toolbar and in the Navigator item (except at the
platform level) pop-up menu.
Modify lets you create new situations and manage them. When the
Modify permission has been granted, the situation editing tools and
pop-up menu options are available in the Situation editor, as well as the
Override Formula button in the Distribution tab for qualifying situations.
Start/Stop lets you start or stop a situation and enable or disable a
situation override. When this permission is enabled,
Stop Situation are available in the situation event flyover list, situation
event console view, Situation editor pop-up menu, and the Manage
Enable Situation Overrides
Situations at Managed System window; and
Disable Situation Overrides are available in the Situation editor
and
pop-up menu.
Terminal Script
View allows the user to run or stop running a terminal emulator script
and to see scripts, but not to edit them. If View is disabled the user will be
able only to run or stop a script.
Modify allows the user to create or record new terminal emulator
scripts, edit, and delete them.
User Administration
If you are viewing your own user ID, you will see that View and Modify
are disabled; you cannot change your User Administration permissions.
Logon Permitted enables log on to the portal server with this user ID.
The administrator can clear the check box to deny a user access to the
portal. This option works in conjunction with the
KFW_AUTHORIZATION_MAX_INVALID_LOGIN (the default is 0,
unlimited attempts are allowed) parameter in the Tivoli Enterprise Portal
Server Environment Configuration file, kfwenv. When the value has been
set and the invalid attempts have been exceeded, the check box is cleared
automatically and the administrator must select the check box to reset the
logon attempt count. See the IBM Tivoli Monitoring Administrator's Guide for
details. Modify allows the editing of user IDs and removing them.
Administer Users is available in the
When this permission is enabled,
main toolbar and the tools are available in the Administer Users window.
84
Author Mode Eligible allows the user to enable or disable their Author
Mode permission under Workspace Administration (see next authority),
but not for any other user IDs.
View allows the user to open the Administer Users window and see
their user profile.
Administration Mode Eligible allows the user to enable or disable
their Administration Mode permission under Workspace Administration
(see next authority), but not for any other user IDs.
Workspace Administration
Workspace Author Mode allows the user to create and edit
workspaces, links, and terminal emulator scripts. If Workspace Author
Mode is disabled, the user cannot make any of these changes but can
continue monitoring and responding to alerts; the tools can still be seen,
but they are disabled.
Workspace Administration Mode is available only for the SYSADMIN
user ID and new IDs made from it in the Create Another User window.
When administration mode is enabled, changes you make to workspaces
affect all users who log on to the same portal server . When it is disabled,
workspace changes you make are not shared with other users. Be sure to
Do not allow modifications in the Workspace Properties
select
whenever you create or edit a workspace in administration mode.
Otherwise, if a user edits that workspace, you no longer own the
workspace and cannot override their changes.
WebSphere MQ Configuration Authorities
IBM Tivoli OMEGAMON XE for Messaging: WebSphere MQ Configuration
installations will see this folder.
View allows the user to see, but not change, your organization's
WebSphere MQ configuration in the Navigator Configuration view.
Modify allows the user to change your organization's WebSphere MQ
configuration or to schedule updates in the Configuration view.
Applications
Your user ID is set so you can see some or all the application types being
monitored. For example, one user might be able to see only mainframe
applications, while another can see only middleware, and another sees all
applications.
Allowed Applications
Shows the applications that you can access from Tivoli Enterprise Portal.
Available Applications
Shows the applications available for assignment to the selected user. If
<All Applications> is on the Allowed Applications list, then no other
entries can be added. You must move it back to Available Applications
before you can select a subset of applications to assign.
Select the applications you want to add, or select <All Applications>, and
move them to the Allowed Applications list. After selecting the first
application, you can use Ctrl+click to select other applications or
Shift+click to select all applications between the first selection and this one.
85
Navigator views
When a Navigator view is created, only the author is able to see the view, but it is
available for the administrator to assign to users. An assigned Navigator view
means the user can open it. For each assigned view, the user can be restricted to
see only a certain branch rather than the entire hierarchy.
Assigned Views
Shows the Navigator views the user is able to see and access. The first
Navigator view in this list is the default for the user; it displays
automatically whenever the user logs on. You can select any views to
right arrow to
which you do not want the user to have access, and click
move them to the Available Views list. Select the appropriate entries and
left arrow to move them to the Assigned Views. You can move a
click
Navigator view to the top of the list to make it the default by clicking the
up arrow.
Available Views
Shows the Navigator views not assigned to the user and available for
assignment. Select the Navigator views you want to add and move them to
left arrow. After selecting the first
the Assigned Views list by using the
view, you can use Ctrl+click to select other views or Shift+click to select all
views between the first selection and this one.
Assigned Root
Shows the Navigator view chosen in Assigned Views, with the user's
assigned Navigator root highlighted. The root is the top-most level of this
Navigator view that the user can access. The user can access this item and
all items below it, but no items parallel to or above it in the Navigator.
For example, you can assign UNIX Systems as the assigned root. The user
sees the UNIX Systems workspaces and those below, but is not able to see
the Enterprise workspaces or anything under Windows Systems.
Adding a user ID
Create a user ID for all users that should be able to log onto the Tivoli Enterprise
Portal Server. You can use the default user profile or copy the profile of an existing
user.
86
Procedure
1. Click
Administer Users.
2. Create a new user ID or create one from another:
Create New
v To create a new user ID with the default user profile, click
User.
v To create a new user ID from an existing one, select the profile that you want
Create Another User.
to use from the Users list and click
3. In the Create New User window, enter the user information:
v User ID: The logon name. The name must use ASCII characters, can be up to
10 characters, and can contain no spaces. The name is limited to eight
characters if user authentication is at the hub monitoring server and uses
RACF (resource access control facility) security for z/OS.
v User Name: The name of the user or job classification or both. This name can
include spaces and be up to 32 characters. The user name is displayed in
Users list.
v Distinguished Name: The unique identifier in the Lightweight Directory
Access Protocol (LDAP) repository for the name given in the User ID field.
Click Find to locate and insert the distinguished name, such as
UID=FRIDA,O=DEFAULTWIMITMBASEDREALM
v User Description: Optional description for the user. The text can include
spaces and punctuation.
4. Click OK to close the window and see the new user ID arranged alphabetically
in the Users list.
Permissions, select a function from the Authorities tree and
5. To change the
select or clear each option as appropriate for all functions with permissions that
you want to change.
6. To assign access privileges to applications (managed system types), click the
Applications tab, then select <All Applications> or the individual applications
the user should see, and click
to move them to the Allowed Applications
list. After selecting the first application, you can use Ctrl+click to select other
applications or Shift+click to select all applications between the first selection
and this one.
Navigator Views tab:
7. To assign Navigator views, click the
a. Select a Navigator view (or more with Ctrl + click and Shift + click) from
to move it to the Assigned Views.
the Available Views and click
to place the view that you want to be the default at the top of the
b. Use
list; use
and
to arrange the other Navigator views in the order that
list.
they should appear in the Navigator toolbar View
c. For the selected Navigator view, change the Assigned Root as needed.
8. When you are finished creating the user profile, save your changes with Apply
if you want to keep the Administer Users window open, or OK if you want to
close it.
Chapter 6. User administration
87
What to do next
The Logon window has a field for entering a password. If you want the user ID to
include a password, you must define the same user ID, including a password, to
your network domain user accounts or to the operating system where the hub
monitoring server is installed. Also, the monitoring server must be configured to
validate users, which is the default on the Windows-based hub monitoring server.
(In Manage Tivoli Monitoring Services, right-click Tivoli Enterprise Monitoring
Server and click Reconfigure.)
Related reference
Administer Users on page 81
Procedure
1. Click
Administer Users.
2. Do one of the following in the Users list:
v Click inside the Name or Description field to edit either of them.
v Double-click anywhere in a row to open the Modify User window for editing
any of the fields.
Modify User.
v Right-click the user profile you want to edit and click
3. Edit the User Name, Distinguished Name or User Description, then click OK.
Distinguished Name is required if user authentication is through the portal
server to an LDAP repository. You cannot change the one-word User ID other
than to change the letter casing. To edit the one-word User ID, delete the user
profile and create a new one.
v If you have not yet added the DN, click Find to locate the name that
matches the user ID.
If your monitored environment was previously configured for authentication
through the Tivoli Enterprise Monitoring Server and then reconfigured to
authenticate through the Tivoli Enterprise Portal Server, you might see two
entries for the name. Select the one where o=defaultWIMFileBasedRealm and
not O=DEFAULTWIMITMBASEDREALM.
Permissions, select a function from the Authorities tree and
4. To change the
select or clear each option as appropriate for all functions with permissions that
you want to change. You can change your own user permissions except Create
and Modify for User Administration
5. To assign access privileges to applications (managed system types), click the
Applications tab, select any applications you want to remove from the Allowed
Applications list and
move them to the Available Applications list; select
the applications you want to add from the Available Applications list (or select
move them to the Allowed Applications list.
<All Applications>), and
88
After selecting the first application, you can use Ctrl+click to select other
applications or Shift+click to select all applications between the first selection
and this one.
Navigator Views tab,
6. To change any Navigator view assignments, click the
then add or remove Navigator views from the Assigned Views list, and select
move the one to be the default to the top of the list. For each
and
Navigator view, change the Assigned Root as needed.
7. When you are finished editing the user profile, save your changes with Apply
if you want to keep the Administer Users window open, or OK if you want to
close it.
Results
The next time the user logs on, the permission changes will be in effect.
Related reference
Administer Users on page 81
Removing a user ID
You can remove a user ID as needed.
Procedure
1. Click
Administer Users.
2. Select the user ID that you want to delete. You can select additional user IDs
with Ctrl+click, or with Shift+click to select all user IDs between the first
selection and this one.
Remove Users to delete the selected user ID and profile from the list.
3. Click
4. When a message asks you to confirm the user ID removal, click Yes. The user
is permanently removed from the user ID list. If the user is currently signed on,
this does not affect their work session, but they will not be able to log on again.
Note: You cannot remove your user ID (the one you logged on with) or the
<Default User> ID.
Default user
The first user ID in the Users list is <Default User>.
To use this function, your user ID must have Modify permission for User
Administration.
Create
The Default User ID is used as the template ID for users created with
New User. Edit this user ID if you want to change any of the default settings. The
initial defaults enable all the functions listed under Tivoli Enterprise Portal
Authorities except User Administration Create and Modify. Any changes you make
to the <Default User> ID apply to users created from this point on; they do not
affect any existing user ID settings.
89
Procedure
1. Click
Administer Users. The Administer Users window is divided into two,
with Users and User Groups tabs at the top, and Permissions, Applications,
Navigator Views, and Member Of below.
Users list, then
2. To see the groups a user belongs to, select a name from the
Member Of tab. The groups the user belongs to are listed in the
click the
Assigned Members Of list.
User
3. To see the user IDs assigned to a group, select a name from the
Members tab. The users belonging to the group
Groups list, then click the
are in the Assigned Members list.
90
Procedure
1. Click
Administer Users to open the Administer Users window.
User Groups tab.
2. Click the
3. Do one of the following:
Create New Group.
v To create a new user group, click
v To copy an existing user group, select the group name from the list and
Create Another Group.
click
4. In the Create New Group or Create Another Group window, enter the
following user information:
a. Group ID: The group identifier. This name can be up to 10 characters and
can contain no spaces. The name is limited to eight characters if the hub
monitoring server uses RACF (resource access control facility) security for
z/OS.
b. Group Name: The name or job classification for the user group. This name
can include spaces..
c. Group Description: The text to describe the user group, such as their
responsibilities. The description can include spaces and punctuation.
5. Click OK to close the window and see the new user group arranged
alphabetically in the User Group list.
Members tab by selecting one or more
6. Add members to the group in the
to move to the
user IDs in the Available Members list and clicking
Assigned Members list.
Permissions for the group, select a function from the
7. To change the
Authorities tree and select or clear each option check box for all functions.
8. To assign access privileges to applications (managed system types) for the
Applications tab, then select <All Applications> or the
group, click the
to move them to the
individual applications the user should see, and click
Allowed Applications list. After selecting the first application, you can use
Ctrl+click to select other applications or Shift+click to select all applications
between the first selection and this one.
Navigator Views tab,
9. To assign Navigator views to the group, click the
then add or remove Navigator views from the Assigned Views list, and use
to place the default view at the top of the list. For each Navigator view,
change the Assigned Root as needed.
10. When you are finished creating the user group, save your changes with Apply
to keep the Administer Users window open, or OK to close it.
91
Procedure
1. Click
Administer Users to open the Administer Users window.
2. Click the
User Groups tab.
.
3. Right-click the user group to edit and click
4. Edit the Group Name and Group Description, then click OK. You cannot
change the one-word group ID. You must, instead, create another user group
from this one and give it a new name, then delete this one.
Permissions, select a function from the Authorities tree and
5. To change the
select or clear each option as appropriate for all functions with permissions that
should change.
6. To change the group access privileges to applications (managed system types),
Applications tab, select any applications you want to remove from
click the
; select the applications you want to
the Allowed Applications list and click
add from the Available Applications list (or select <All Applications>), and
. After selecting the first application, you can use Ctrl+click to select
click
other applications or Shift+click to select all applications between the first
selection and this one.
7. To change any Navigator view assignments for the group, click the
Navigator Views tab, then add or remove Navigator views from the Assigned
to place the one you want to be the default at the top of
Views list, and use
the list. For each Navigator view, change the Assigned Root as needed.
8. When you are finished editing the user group, save your changes with Apply
to keep the Administer Users window open, or OK to close it. The user group
changes are effective the next time each group member logs on.
Note: You can change the permissions, except Create and Modify for User
Administration, of any groups you are a member of.
Procedure
1. Click
Administer Users to open the Administer Users window.
User Groups tab.
2. Click the
Remove Selected
3. Select the user group to delete from the list and click
Group. You can select additional user IDs with Ctrl+click, or with Shift+click to
select all user groups between the first selection and this one.
92
4. When a message asks you to confirm the user group removal, click Yes. The
group is permanently removed from the user group list. Any members of this
user group who receive permissions from the group will not be affected until
they next log on to the portal server.
SYSADMIN logon ID
The Tivoli Enterprise Portal requires your logon ID whenever you start a work
session. Every ID must first have been registered on the portal server. You can log
onto the portal server with SYSADMIN and register other user IDs through the
Administer Users window. The initial user ID, SYSADMIN, has full access and
complete administrator authority. The system administrator registers additional
users and sets their access privileges and authority.
Default user
The first user ID in the list is <Default User> and is used as the template ID for
users created with Create New User. Edit this user ID if you want to change any of
the default settings. The initial defaults enable all the functions listed under Tivoli
Enterprise Portal Authorities, except the Modify permission for User
Administration. Any changes you make to <Default User> ID apply to users
created from this point on; they will not affect any existing user ID settings.
93
94
95
96
1. On the system where the monitoring server is installed, ensure that the
server is running in
Manage Tivoli Monitoring Services.
2. If the monitoring server is running, ensure that the user ID has been
Administer Users, then
defined in Tivoli Enterprise Portal: Click
find the ID in the Users list.
3. If the user has been defined, check if host level security was turned on
for the hub monitoring server and that the user ID has been authorized
to the host environment:
Manage Tivoli Monitoring Services, right-click Tivoli Enterprise
In
Monitoring Server, and click Reconfigure. If host level security has
been configured, the Security: Validate User box is selected.
If the monitoring server has been configured to Validate User, the user
ID for Tivoli Enterprise Portal must also be added to the network
domain user accounts or to the operating system where the monitoring
server is installed, including a password.
If non-ASCII characters were included in the user ID, they are not
saved with the user ID.
4. Try logging on to Tivoli Enterprise Portal with the user ID in question.
5. If you cannot log on to Tivoli Enterprise Portal and the monitoring
server is running properly, the problem might be with the Tivoli
Enterprise Portal Server. Try recycling the portal server. If the user is
still unable to log on, contact IBM Software Support.
This message is also displayed after a retry period of several minutes (the
Manage Tivoli
default is 10 minutes and can be changed through
Monitoring Services) where the status bar shows Validating user
credentials continuously. This can be a symptom that the monitoring
server is stopped.
97
98
99
somewhere in the hierarchy. This mechanism is not preferred because it does not
allow a rule to recognize the presence of Omegamon_Base in the event hierarchy.
As part of the generic mapping for these situations, the IBM Tivoli Monitoring
event forwarder assigns associated values for attributed defined in the event class
attributes when forwarding an event to the Tivoli Enterprise Console Event Server.
In addition to these event class attributes, values are assigned to the following
attributes inherited from the EVENT class, if available: source, hostname,
fqhostname, origin, sub_origin, adapter_host, origin, severity, and message
attributes that are inherited from the base EVENT class.
Table 8. Tivoli Enterprise Console event class attributes
Event class attributes
adapter_host
appl_label
cms_hostname
cms_port
fqhostname
hostname
integration_type
master_reset_flag
100
msg
origin
severity
situation_displayitem
situation_eventdata
Raw situation event data starting from the second event data
row, if any. Event data attributes are in key-value pair
format. The event data can be truncated because the event
integration facility (EIF) imposes a 2 KB size limit.
situation_group
situation_fullname
situation_name
situation_origin
situation_status
situation_time
situation_type
situation_thrunode
source
sub_origin
sub_source
101
The event class name of the Tivoli Enterprise Console event is derived from the
attribute group associated with the situation. It is a combination of ITM_ plus the
attribute group name associated with the situation. For example, a situation using
the NT_Process attribute group will generate a Tivoli Enterprise Console event
with class ITM_NT_Process.
Note: Some agents have very long attribute group names, which might cause the
generated event class name to exceed the limit imposed by the event server. In
these cases, the event class name will be a combination of ITM_ plus the table
name of the attribute group.
Additional event slot values are populated with situation attribute values from the
situation event data. The slot names are the attribute names after special character
processing.
For example, a situation using the Process_CPU attribute causes generation of a
slot process_cpu in the Tivoli Enterprise Console event. In case the attribute name
conflicts with the slot names in Tivoli Enterprise Console EVENT class or
Omegamon_Base class, the applname associated with the attribute group, for
example: knt_, is pre-pended to the attribute name to form the slot name.
For complex situations, the situation definition can involve more than one attribute
group. In this case, the Tivoli Enterprise Console event class used is derived from
the first attribute group encountered in the situation event data of the triggering
situation. The exception is when the first attribute group found is Local_Time or
Universal_Time; then it is passed over and the next different attribute group, if
any, will be used.
For example, if a situation is written for the NT_Process and NT_System attribute
groups, NT_Process being the first attribute group, the Tivoli Enterprise Console
event class ITM_NT_Process is used. Additional event slots are generated based on
the attributes of the attribute group selected.
Table 9. Special characters for attribute groups and names in Tivoli Enterprise Console
events generated from forwarded situation events.
Character:
Converts to:
<uppercase> (applies only to attribute name) <lowercase> (applies only to attribute name)
% percent sign
pct_
I/O
io
R/3
r3
/ forward slash
_per_
\ backward slash
_ (underscore)
<space>
_ (underscore)
_ (underscore)
( open parenthesis
) close parenthesis
_ (underscore)
< open pointed bracket
> close pointed bracket
Note: After special character processing, the leading and trailing underscore in the
final event class or slot name, if any, will be removed.
102
Warn or _Warning
WARNING
CRITICAL
UNKNOWN
Procedure
1. On the computer where the Hub Tivoli Enterprise Monitoring Server is
installed, open the KBBENV file:
Start Manage Tivoli Monitoring Services, right-click Tivoli
v
Enterprise Monitoring Server, and click Advanced Edit ENV file.
In a text editor, open the <install_dir>/config/
v
<tems_name>_ms_<address>.cfg file, where <tems_name> is the value supplied
during the monitoring server configuration, and <address> is the IP address
or fully qualified name of the computer.
2. Locate (or add) the KMS_OMTEC_GLOBALIZATION_LOC environment
variable and enter the desired language and country code, where xx is the
language and XX is the country code: de_DE, en_US, en_GB, es_ES, fr_FR,
it_IT, ja_JP, ko_KR, pt_BR, zh_CN, or zh_TW (such as pt_BR for Brazilian
Portuguese or zh_CN for Simplified Chinese).
KMS_OMTEC_GLOBALIZATION_LOC=xx_XX
103
104
situation_display_item: None
master_reset_flag: None
No Tivoli Enterprise Console event is forwarded.
acknowledge expired
integration_type: U
situation_status: F
situation_name: Name of the situation
situation_display_item: Value of the attribute that was selected as the
display item in the situation definition, if any.
master_reset_flag: None
Expiration that was specified in the acknowledge has expired.
resurface
integration_type: U
situation_status: E
situation_name: Name of situation
situation_display_item: Value of the attribute that was selected as the
display item in the situation definition, if any.
master_reset_flag: None
The acknowledgement was removed before it had expired and the
situation is still true.
hub start
integration_type: None
situation_status: N
situation_name: **'
situation_display_item: None
master_reset_flag: R
After the hub monitoring server is started, a master reset event is sent
with situation_status=N. Master reset causes the event server to close
all opened situation events from the hub monitoring server
(cms_hostname value).
hub restart
integration_type: None
situation_status: N
situation_name: **'
situation_display_item: None
master_reset_flag: R
After the hub monitoring server is started, a master reset event is sent
with situation_status=N. Master reset causes the event server to close
all opened situation events from the hub monitoring server
(cms_hostname value).
hub Standby failover
integration_type: None
situation_status: N
situation_name: **
situation_display_item: None
master_reset_flag: S
Chapter 7. Situation event integration with Tivoli Enterprise Console
105
After the hub monitoring server switch takes place, a hot standby
master reset event is sent with situation_status=N. Master reset causes
the event server to close all opened situation events from the hub
monitoring server. The name of the old primary hub is in the
situation_origin slot.
Note: The integration_type value is solely used by the Tivoli Enterprise Console
synchronization rule to improve its performance. It has no other meaning related
with the event.
To set this rules cache size, run the Tivoli Enterprise Console command:
wsetesvrcfg -c number_of_events
Note: For more information regarding these two commands, see the Event server
commands in the Tivoli Enterprise Console Command and Task Reference.
If the rules event cache become full, the Tivoli Enterprise Console rules engine
generates a TEC_Notice event, Rule Cache full: forced cleaning, indicating that
5 percent of the events from the cache were removed. Events are removed in order
by age, with the oldest events removed first allowing newer events to be
processed.
When the hub monitoring server forwards a status update for a situation event
previously forwarded to the Tivoli Enterprise Console Event Server, if the original
situation event is deleted from the rules event cache, then a
TEC_ITM_OM_Situation_Sync_Error event is generated to indicate that the
monitoring server and the event server are out of synchronization.
When using any Tivoli Enterprise Console viewer to acknowledge or close any
situation event, if the situation event has been deleted from the rules event cache,
the status change is not processed by the Tivoli Enterprise Console rules engine.
Also, the situation event update is not forwarded to the originating Tivoli
Enterprise Monitoring Server. This behavior results from theTivoli Enterprise
Console rules engine not processing any event status changes for any event not
contained in the rules event cache. In this case, the event status change is updated
only in the Tivoli Enterprise Console database.
106
Procedure
v Manually modify the configuration file for event synchronization (named
situpdate.conf by default and located in the and located in the
/etc/TME/TEC/OM_TEC directory on operating systems such as UNIX, and the
%SystemDrive%\Program Files\TME\TEC\OM_TEC\etc directory on
Windows), and then run the following command:
sitconfig.sh update <config_filename>
v Run the sitconfig.sh command directly, specifying only those settings that you
want to change. See IBM Tivoli Monitoring: Command Reference for the full syntax
of this command.
What to do next
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process from the
$BINDIR/TME/TEC/OM_TEC/bin directory with the stopSUF and startSUF commands.
where:
serverid=server
The fully qualified host name of the monitoring server.
userid=user
The user ID to access the computer where the monitoring server is
running.
107
password=password
The password to access the computer.
Repeat this command for each monitoring server that you want to add.
What to do next
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process from the
$BINDIR/TME/TEC/OM_TEC/bin directory with the stopSUF and startSUF commands
(.cmd file extension on Windows; .sh on operating systems such as UNIX).
Changing rule set parameters for the omegamon.rls rule set file
The omegamon.rls rule set file has parameters that you can edit, according to your
environment, to tune performance or to set your own customized values. Using
these parameters, you can write and customize Tivoli Enterprise Console rules.
During installation, you can choose the location of the rule base. Otherwise, you
can use the wrb -lscurrb -path to find the current rule base.
Here are some reasons why you might want to change the behavior of the rule:
v For the omegamon.rls file, omegamon_admin is the name of the rule set but you
can name your rule set after your administrator's name or some other value.
v Similarly, the sit_ack_expired_def_action rule set name is set to REJECT by default.
This setting means that whenever a situation event acknowledgement expires in
the Tivoli Enterprise Portal and the event becomes OPEN in the portal, the
Tivoli Enterprise Console event server rejects this action and re-acknowledges
the event in the portal. You have the option of accepting the change that was
initiated by the portal and changing the status in the Tivoli Enterprise Console
instead.
108
109
For more information regarding the wrb, wstopesvr, and wstartesvr commands,
see the Command and Task Reference at the IBM Tivoli Enterprise Console
information center.
Tuning considerations
Integration parameters supporting actions at the Tivoli Enterprise Console event
console that are reflected at the Tivoli Enterprise Portal event console provide good
response times with a reasonable system resource investment.
The tuning parameters to consider include:
v omsync_timeout in the omegamon.rls with a default of 3 seconds.
v PollingInterval in event synchronization with a default of 3 seconds.
v Tivoli Enterprise Console event console refresh interval with a default 60
seconds
v Tivoli Enterprise Portal event console refresh interval
Note: Shorter intervals result in the consumption of more system resources.
The delivery time of situation changes from the Tivoli Enterprise Console event
console to the Tivoli Enterprise Portal event console results from the
omsync_timeout and PollingInterval settings working in parallel. To improve the
response time, you can reduce these settings down to a minimum of 1 second. .
You can adjust the refresh interval for both consoles:
v For the Tivoli Enterprise Console, change the allowable range using the Tivoli
Enterprise Console event console Configuration. In the subsequent Event View
displays, adjust the preferences.
v For the Tivoli Enterprise Portal event console, click View > Refresh Every to
access the refresh intervals.
110
v Rules files:
The Tivoli Enterprise Console product rule language also supports the
inheritance nature of the Tivoli Enterprise Console class definitions. When a
predicate in the Tivoli Enterprise Console rule is looking for a particular class,
all classes that inherit from that particular class also satisfy the rule predicate.
In Tivoli Enterprise Console, the rule set files (*.rls files) are located in the actively
loaded rule base's TEC_RULES subdirectory. They provide the rule sets and are
deployed to the Tivoli Enterprise Console Server. Although the tool is closely
integrated with Tivoli Enterprise Console and uses the active rule base's
TEC_RULES subdirectory by default input, the tool is not dependent on this
subdirectory. The tool accepts as an alternative input any other directory that
contains the correct rule sets and to which the user has read privileges.
The Rules Check utility is included with IBM Tivoli Monitoring. This utility is
installed in the $BINDIR/TME/TEC/OM_TEC/bin directory as part of the Tivoli
Enterprise Console Event Synchronization installation. It does not require any
specific directory configuration if the required privileges for access to the input
and output files are granted.
To run the Rules Check command you must have:
v Read access to the *.rls and *.baroc files that are used as inputs.
v Write access to the output that is used to store the results of the check.
v Tivoli Enterprise Console administrator authority.
v When no cd and rd options are specified, the user issuing the command must
have the proper TME authorization, and verify the level of wrb subcommands
that are required.
To run the Rules Check utility and see sample output, refer to the Command
Reference.
111
Procedure
1. Open the om_tec.config file:
a.
In the Manage Tivoli Monitoring Services window, right-click
Tivoli Enterprise Monitoring Server and click Advanced Edit EIF
Configuration.
Open Install_dir/tables/host name/TECLIB/
b.
om_tec.config in a text editor.
2. Edit any of the event server configuration parameters for the event integration
facility.
112
Option
Description
ServerLocation=
ServerPort=
EventMaxSize=
RetryInterval=
getport_total_timeout_usec=
NO_UTF8_CONVERSION=
ConnectionMode=
BufferEvents=
Option
Description
BufEvtMaxSize=
BufEvtPath=
FilterMode=
Filter:
Results
The monitoring server uses the edited EIF configuration to forward event to the
receiver.
What to do next
If this is the first time that you have configured the EIF forwarding after a Tivoli
Management Services upgrade, you also must recycle the Tivoli Enterprise Portal
Server and users must restart the Tivoli Enterprise Portal. Otherwise, the EIF tab
will be missing from the Situation editor.
An alternative method for editing the EIF configuration is provided through the
Command Line Interface tacmd createEventDest. See IBM Tivoli Monitoring
Command Reference for a description.
Related reference
Tivoli Event Integration Facility Reference
Tivoli Monitoring Installation and Setup Guide
Tivoli Monitoring Command Reference
113
Procedure
1. In the Tivoli Enterprise Portal Navigator view, either right-click the Navigator
item that the situation is associated with and click
Situations or click
Situation Editor in the main toolbar.
2. Select the situation to forward.
EIF tab.
3. Click the
4. Select Forward Events to an EIF Receiver to specify that an EIF event is sent
for each event that opens for this situation.
5. Select the EIF Severity to apply to forwarded events for this situation. <Default
EIF Severity> uses the same severity that is used for the situation at this
Navigator item.
6. To assign other EIF receivers instead of or in addition to the <Default EIF
Receiver>, use one of the following steps:
v To add a destination, select it from the Available EIF Receivers list and
move to the Assigned list. (After selecting the first destination, you can
use Ctrl+click to select other destinations or Shift+click to select all
destinations between the first selection and this one.)
v To remove a destination, select it from the Assigned EIF Receivers list and
move to the Available list.
114
The Available EIF Receivers list shows all of the defined EIF destinations that
were defined through Manage Tivoli Monitoring Services or with the tacmd
createEventDest command. See the IBM Tivoli Monitoring Command Reference.
7. Save the situation definition with your changes by clicking Apply, to keep the
Situation editor open, or OK, to close the Situation editor.
Related reference
Tivoli Event Integration Facility Reference
Tivoli Monitoring Installation and Setup Guide
Tivoli Monitoring Command Reference
115
Customization window, which is available through the EIF tab of the Tivoli
Enterprise Portal Situation editor. Only the event classes belonging to the OS
agents are predefined and they are in an MCS Attribute Service jar file. When a
new type of agent is added into the Tivoli Management Services infrastructure or a
new event class is added, you must generate a new MCS XML file and point the
Tivoli Enterprise Portal Server to the new XML file before the new event classes
will appear in the Event class name list.
To generate a new MCS XML file, use the Tivoli Enterprise Console Event
Definition Generator (TEDGEN) tool supplied in the TECLIB directory on the
computer where the monitoring server or portal server is installed or on the Tools
DVD from the event server installation media. The computer on which you
generate the MCS XML file must have the necessary BAROC files, which are
located in the TECLIB directory. The exception is on a Linux- or UNIX-based portal
server if the Install TEMS support for remote seeding option was not selected
during installation (see the install.sh instruction).
Note: The definitions in MCS XML file supersede those defined in the shipped
MCS Attribute Services jar file (they are not merged). To obtain a MCS XML file
that contains both the event classes definitions of the OS agents as well as the new
agent, be sure all the BAROC definitions for the OS agents and new agent are
loaded at the Tivoli Enterprise Console event server or are all in the same directory
(depending on the options used when running the TEDGEN tool, see next) before
running the TEDGEN utility to generate the MCS XML file.
Procedure
1. Complete one of the following steps to run the TEDGEN command:
v On the computer where the hub monitoring server or portal server is located,
install the TEDGEN utility from the tools DVD that comes with the event
server installation media (see the README.txt file). Then create a new XML
file:
tedgen -itmDir Install_dir\{CMS|CNPS}
\TECLIB -id server_id -xmlPath output_xml_file_path
If you are generating the MCS XML file on the portal server, the
BAROC files are not present by default and you must install them by
running the install.sh script on the portal server computer and
selecting the Install TEMS support for remote seeding option. This
action places the BAROC files on the portal server under the
Install_dir/tables/cicatrsq/TECLIB directory.
tedgen -itmDir
Install_dir/tables/{tems_name|cicatrsq}/
TECLIB -id server_id -xmlPath output_xml_file_path
Example
In the following example, the hub monitoring server named mytems
116
has the BAROC files in the TECLIB directory. The output file goes to
the same directory and is named tems.xml.
tedgen -itmDir C:\IBM\ITM\CMS\TECLIB -id mytems -xmlPath tems.xml
v On the computer where the Tivoli Enterprise Console event server is located,
install the TEDGEN utility from the Tools DVD that comes with the event
server installation media. Then create a new XML file:
a. Issue the wrb -imprbclass command to import the BAROC file that is
installed with a newly added agent, and OS agents if they are not already
installed:
wrb -imprbclass class_file [ -encoding encoding ]
[-before class_file | -after class_file] [-force] rule_base
Example
In the following example, the XML file named tec.xml is generated
from the current rulebase on the Tivoli Enterprise Console event
server named mytec.
tedgen -id mytec -xmlPath tec.xml
2. Copy the newly generated XML file to the computer where the Tivoli
Enterprise Portal Server is installed.
3. Edit the portal server environment file to specify the path to the XML file:
In the Manage Tivoli Monitoring Services window, right-click
a.
Tivoli Enterprise Portal Server and click Advanced Edit ENV File to
open the kfwenv file in the text editor.
Open Install_dir/config/cq.ini in a text editor.
b. Locate the KFW_MCS_XML_FILES environment variable and type = (equal
sign) followed by the path to the XML file.
c. Save and close the environment file.
117
Procedure
1. Ensure that the Universal Agent attribute files are on the hub:
v Temporarily connect the Universal Agent to the hub monitoring server to
enable uploading of the attribute files. After successful connection, the
Universal Agent can be reconfigured to connect to the remote monitoring
server.
v Manually move the Universal Agent attribute files from the remote
monitoring server to the hub. Attribute file location:
Install_dir\CMS\ATTRLIB
Install_dir/ tables/tems_name/ATTRLIB.
v Recycle the hub monitoring server.
2. Obtain the required BAROC files for the Universal Agent application
a. Search for and download the BAROC File Generator from the Tivoli Open
Process Automation Library at http://www-01.ibm.com/software/
brandcatalog/portal/opal.
b. Run the BAROC generator, providing the ODI file for Universal Agent
application as input. ODI file location (requires that the Universal Agent has
successfully connected to the monitoring server) on the computer where the
Tivoli Enterprise Portal Server is installed:
Install_dir\cnps
Install_dir/platform/cq/bin
The format of the ODI filename is xxxodinn, where xxx is the application
name specified agent and nn is the version number.
c. After generating the BAROC file, move it to the event server, then compile
and load it.
118
If you want to use the NetView console through the Tivoli Enterprise Console view
in the Tivoli Enterprise Portal, you must configure the NVWC_HOME variable in
the shell script that launches the Tivoli Enterprise Portal client, to point to the
installation directory of NetView Web Console.
To set the NVWC_HOME variable, complete the following procedure:
Procedure
v
v
<itm_install_dir>\cnp\cnp.bat
or
<itm_install_dir>/bin/cnp.sh
What to do next
The NetView Web Console must be installed on the computer where the Tivoli
Enterprise Portal client is running to launch the NetView console from Tivoli
Enterprise Console view.
See the Tivoli Enterprise Console product documentation for more detailed
information about using the NetView console.
119
120
121
As part of the generic mapping for these situations, the IBM Tivoli Monitoring
event forwarder assigns associated values for each of the event class attributes
when forwarding an event to OMNIbus. In addition to these event class attributes,
values are assigned to the host name, origin, severity, and message attributes that
are inherited from the base EVENT class.
Table 11. Tivoli Netcool/OMNIbus ObjectServer attributes
122
Attributes
appl_label
cms_hostname
cms_port
fqhostname
Hostname
integration_type
master_reset_flag
msg
origin
severity
situation_displayitem
situation_eventdata
situation_group
situation_fullname
situation_name
situation_origin
situation_status
situation_time
situation_type
situation_thrunode
source
sub_origin
sub_source
The Tivoli Netcool/OMNIbus EIF probe maps the attributes of the situation event
into ObjectServer attributes, which are defined in the alerts.status table of the
ObjectServer.
Table 12. Mapping of situation attributes to OMNIbus attributes
Situation attribute
OMNIbus attribute
situation_name + situation_origin
+situation_displayitem + event_class
situation_name + situation_origin +
situation_displayitem + event_class +
ITMResolution
situation_name
AlertKey
situation_origin
Node
situation_origin
NodeAlias
source
Agent
default
situation_displayitem
ITMDisplayItem
situation_status
ITMStatus
situation_thrunode
ITMThruNode
situation_time
ITMTime
situation_type
ITMSitType
situation_eventdata
ITMEventData
cms_hostname
ITMHostname
master_reset_flag
ITMResetFlag
integration_type
ITMIntType
event_class
AlertGroup
msg
Summary
Manager
6601
Class
123
OMNIbus attribute
severity
Severity
FATAL / 60 = Critical
CRITICAL / 50 = Critical
MINOR / 40 = Minor
WARNING / 30 = Warning
UNKNOWN / 10 = Indeterminate
getdate
LastOccurrence/FirstOccurrence
date
TECDate
repeat_count
TECRepeatCount
fqhostname
TECFQHostname
hostname
TECHostname
cms_port
ITMPort
situation_fullname
ITMSitFullName
situation_group
ITMSitGroup
appl_label
ITMApplLabel
124
Converts to:
<uppercase> (applies only to attribute name) <lowercase> (applies only to attribute name)
% percent sign
pct_
I/O
io
/ forward slash
_per_
\ backward slash
_ (underscore)
<space>
_ (underscore)
_ (underscore)
( open parenthesis
) close parenthesis
_ (underscore)
< open pointed bracket
> close pointed bracket
125
All strings and timestamp types are mapped to STRING types, and all integer
types are mapped to INTEGER in the event class definition. No default values are
assigned to the attribute slots. Attributes that have a specified non-zero
scale/precision value are mapped to the string type of REAL.
Note: If you are mapping from an attribute to a slot and the resulting slot name
has a trailing underscore, the trailing underscore is removed in the final slot name,
which never has a trailing underscore.
Procedure
1. On the computer where the Hub Tivoli Enterprise Monitoring Server is
installed, open the KBBENV file:
Start Manage Tivoli Monitoring Services, right-click Tivoli
v
Enterprise Monitoring Server, and click Advanced Edit ENV file.
In a text editor, open the <install_dir>/config/
v
<tems_name>_ms_<address>.cfg file, where <tems_name> is the value supplied
during the monitoring server configuration, and <address> is the IP address
or fully qualified name of the computer.
2. Locate (or add) the KMS_OMTEC_GLOBALIZATION_LOC environment
variable and enter the desired language and country code, where xx is the
language and XX is the country code: de_DE, en_US, en_GB, es_ES, fr_FR,
it_IT, ja_JP, ko_KR, pt_BR, zh_CN, or zh_TW (such as pt_BR for Brazilian
Portuguese or zh_CN for Simplified Chinese).
KMS_OMTEC_GLOBALIZATION_LOC=xx_XX
126
Procedure
v Manually modify the configuration file for event synchronization (named
situpdate.conf by default and located in <event_sync_installdir>/etc and then
run: sitconfig.sh update <config_filename>
v Run the sitconfig.sh command directly, specifying only those settings that you
want to change. See IBM Tivoli Monitoring: Command Referencefor the full syntax
of this command.
What to do next
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process from the
<event_sync_installdir>/bin directory with stopSUF.sh and startSUF.sh.
where:
serverid=server
The fully qualified host name of the monitoring server.
userid=user
The user ID to access the computer where the monitoring server is
running.
password=password
The password to access the computer.
Repeat this command for each monitoring server that you want to add.
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process from the
<event_sync_installdir>/bin directory: On Windows systems, run the
stopSUF.cmd and startSUF.cmd commands; on operating systems such as UNIX,
run the stopSUF.sh and stopSUF.sh commands.
127
128
or
$OMNIHOME/bin/nco_sql -user <username>
-password <password>
-server <server_name>
< <path_to_file>/itm_proc.sql
Procedure
1. Open the om_tec.config file:
a.
In the Manage Tivoli Monitoring Services window, right-click
Tivoli Enterprise Monitoring Server and click Advanced Edit EIF
Configuration.
Open Install_dir/tables/host name/TECLIB/
b.
om_tec.config in a text editor.
2. Edit any of the event server configuration parameters for the event integration
facility.
Option
Description
ServerLocation=
ServerPort=
129
Option
Description
EventMaxSize=
RetryInterval=
getport_total_timeout_usec=
NO_UTF8_CONVERSION=
ConnectionMode=
BufferEvents=
BufEvtMaxSize=
BufEvtPath=
FilterMode=
Filter:
What to do next
If this is the first time that you have configured the EIF forwarding after a Tivoli
Management Services upgrade, you also must recycle the Tivoli Enterprise Portal
Server and users must restart the Tivoli Enterprise Portal. Otherwise, the EIF tab
will be missing from the Situation editor.
130
An alternative method for editing the EIF configuration is provided through the
Command Line Interface command, tacmd createEventDest.
Procedure
1. In the Tivoli Enterprise Portal Navigator view, either right-click the Navigator
Situations or click
item that the situation is associated with and click
Situation Editor in the main toolbar.
2. Select the situation to forward.
EIF tab.
3. Click the
4. Select Forward Events to an EIF Receiver to specify that an EIF event is sent
for each event that opens for this situation.
5. Select the EIF Severity to apply to forwarded events for this situation. <Default
EIF Severity> uses the same severity that is used for the situation at this
Navigator item.
6. To assign other EIF receivers instead of or in addition to the <Default EIF
Receiver>, use one of the following steps:
v To add a destination, select it from the Available EIF Receivers list and
move to the Assigned list. (After selecting the first destination, you can
use Ctrl+click to select other destinations or Shift+click to select all
destinations between the first selection and this one.)
v To remove a destination, select it from the Assigned EIF Receivers list and
move to the Available list.
The Available EIF Receivers list shows all of the defined EIF destinations that
were defined through Manage Tivoli Monitoring Services or with the tacmd
createEventDest command. See the IBM Tivoli Monitoring Command Reference.
7. Save the situation definition with your changes by clicking Apply, to keep the
Situation editor open, or OK, to close the Situation editor.
131
are included in all forwarded events, such as situation_name; event slots are those
specific to the situation. The following syntax rules apply when setting event slots:
v For an event slot, use the fully qualified attribute name
($Attribute_Table.Attribute_Name$)
v For a common slot, use the variable name that is not fully qualified (no .
periods) unless it is the situation symbol
v For a situation formula, use $formula$
These characters are not supported: < less than, > greater than, " quote, ' single
quote, and & ampersand. This column is available only if no value is selected in
the Mapped attribute column.
See the topic on Forwarding the event to an EIF receiver in the IBM Tivoli
Monitoring Tivoli Enterprise Portal User's Guide.
132
Procedure
v
1. Select Start Programs IBM Tivoli Monitoring Manage Tivoli
Monitoring Services.
2. In the Manage Tivoli Monitoring Services window, right-click Tivoli
Enterprise Portal Server.
3. In the menu, click Reconfigure.
Copyright IBM Corp. 2005, 2010
133
Results
The portal server stops and, after a moment, the Common Event Console
Configuration window opens with the following tabs:
v ITM Connector
v TEC Connector
v OMNIbus Connector
v Names of Extra Columns
134
135
If this value is set to -1 and the connector loses its connection, the
connector attempts to reconnect indefinitely.
Information for extra table columns
The common event console includes five extra table columns that you can
customize. In the remaining fields on this TEC Connector page, you can
define the Tivoli Enterprise Console attribute type and attribute name that
identify the attribute that is to be mapped to each of these customizable
columns.
For the attribute type, you can choose one of the following values:
v Base, which means that the attribute is from the Tivoli Enterprise
Console base attribute table.
v Extended, which means that the attribute is from the Tivoli Enterprise
Console extended attribute table.
136
137
1.
In the Origin column for each row that is a Tivoli Enterprise Console event, the
common event console displays the value of the origin attribute.
Attribute
Attribute
Attribute
Attribute
Attribute
Field
Field
Field
Field
Field
138
139
140
141
Procedure
1. In the Navigator physical view, right-click the
system-level item for the
computer where you want to install the monitoring agent. In this example, the
computers named ORANGE, PEAR, CABBAGE, and ONION are available.
Enterprise
Linux Systems
ORANGE
PEAR
Windows Systems
CABBAGE
ONION
Add Managed System to open the Select a Monitoring Agent window.
2. Click
The agents shown in this list are those available for the operating system on
which this computer runs. The two-digit version number is followed by a
two-digit release number and a modification number of up to five digits.
3. Highlight the name of the monitoring agent to install and click OK. The New
Managed System Configuration window opens with an Agent tab. Any other
tabbed pages are specific to the agent. Move the mouse pointer over a field to
see hover help.
4. Complete the fields to configure the agent, clicking Next and Back to move
among the tabbed pages.
5. On the Agent page, establish the operating system user ID under which the
agent will run on the managed system. Windows: Either accept the default to
start the managed system with your user ID (you can also select the check box
to Allow service to interact with desktop to enable remote control) or select
Use this account and fill in the user name and password under which the
agent will run.
Non-Windows: Enter the Username under which the agent will run and the
Group name.
6. Click Finish to complete the managed system configuration. If any of the
information provided is invalid, you will receive an error message and be
returned to the configuration window. Check your entries and edit as
appropriate to configure correctly. Installation and setup begins and might take
several minutes to complete depending on your Tivoli monitoring
configuration, the location of the managed system, and the type of monitoring
agent.
Apply
7. After the managed system has been added to the enterprise, click
Pending Updates in the Navigator view toolbar. The new managed system
Universal Database) is displayed below the system Navigator item.
(such as
142
Procedure
1. Right-click the
Navigator item for the agent you want to configure or
upgrade.
Configure to open the Configure Managed System window. Any
2. Click
tabbed pages besides Agent are specific to the agent. Move the mouse pointer
over a field to see hover help.
3. Edit the fields to configure the agent, clicking Next and Back to move among
the tabbed pages.
4. On the Agent page, establish the user ID that will be used to maintain the
agent:
Windows:
Use local system account to use your Tivoli
Accept the default
Allow service to
Enterprise Portal user ID. You can also select
interact with desktop to enable remote control. Or select
Use this
account and fill in the user name and password under which the agent
will be controlled.
Non-Windows:
Enter the Username under which the agent will run and the Group
name.
5. Click Finish to complete the managed system configuration. If any of the
information provided is invalid, you will receive an error message and be
returned to the configuration window. Check your entries and edit as
appropriate to configure correctly.
Procedure
v To start a monitoring agent from the Tivoli Enterprise Portal
1. In the Navigator Physical view, right-click the Navigator item of the offline
agent.
Start. The request to start the monitoring agent is sent to the
2. Click
monitoring server to which it is connected. Depending on your monitoring
configuration, it might take a few moments before the agent starts running
Chapter 10. Maintaining monitoring agents
143
and to see the Navigator item enabled. If the monitoring agent does not start
and you get an error message, the computer might be unavailable.
v To stop a monitoring agent from the Tivoli Enterprise Portal
agent to stop.
1. In the Navigator physical view, right-click the
Stop. The agent goes offline and the Navigator item is dimmed. The
2. Click
agent does not come online until you start it manually or, if it is set to start
automatically, after you restart the monitoring server to which it is
connected.
v To recycle a monitoring agent from the Tivoli Enterprise Portal
agent to stop.
1. In the Navigator physical view, right-click the
Restart to stop, then start the monitoring agent. This might take a
2. Click
short time depending on the network traffic.
Updating agents
Whenever a new release of a distributed agent is available, you can use remote
deployment to apply the updates. You can perform the updates through the Tivoli
Enterprise Portal or at the command line.
v Updating an agent through the Tivoli Enterprise Portal
v Updating an agent through the command-line interface on page 145
Procedure
1. Right-click the
Navigator item for the agent that you want to upgrade.
Configure to open the Configure Managed System window.
2. Click
3. Click the Agent tab.
144
4. Compare the installed version of the monitoring agent with any available
product updates, then highlight the row of the agent to update and click Install
Updates.
Results
Installation of the updates begins and might take several minutes to complete. The
list that displays reflects the contents of the deployment depot. If Install Updates
is disabled, one or more of the following conditions exist:
v The depot entry does not match the product type.
v The VVRR fields for the agent and the depot entry are the same, where VV is the
version number and RR is the revision number. For example, an entry of 0610
prevents you from applying a fix pack intended for a version 6.2 agent.
v The depot entry is at an older version than the agent.
v The host version field of the depot entry does not contain the host platform for
the agent.
v The prereq field of the depot entry does not contain an agent of the same type
as the agent itself. For example, if 6.1 UD (DB2 monitoring) is the selected agent,
the prereq field in the depot entry must contain a deployment bundle notation
such as ud:061000000, which is one way to denote a patch deployment bundle.
Procedure
1. Use the tacmd login command to log into a Tivoli Enterprise Monitoring
Server.
tacmd login {-s|-server} {[{https|http}://]HOST[:PORT]}
[{-u|--username} USERNAME]
[{-p|--password} PASSWORD]
[{-t|--timeout} TIMEOUT] [-t TIMEOUT]
a. For example, to log in to the system ms.austin.ibm.com with the user name
Admin and the password log1n, run the following command:
tacmd login -s ms.austin.ibm.com -u Admin -p log1n
2. After logging in, use the tacmd updateAgent command to install an agent
update to a specified node.
tacmd updateAgent {-t|--type} TYPE {-n|--node} MANAGED-OS
[{-v|--version} VERSION] [{-f|--force}]
145
a. For example, the following command updates a UNIX agent (type UX) on
itmserver:
tacmd updateagent -t UX -n itmserver:KUX -v 6111
Procedure
1. Right-click the
Navigator item for the agent you want to remove.
2. Click Remove.
3. Click Yes when you are asked to confirm the removal of the agent. If you are
removing an agent that has subagents, another message will ask if you want
them all removed.
4. When you are asked to confirm that you want to permanently uninstall the
agent, click Yes to uninstall or No to leave the agent installed on your system.
Procedure
1. In the Manage Tivoli Monitoring Services window, right-click the monitoring
agent, and click Reconfigure.
2. Click OK in the first Agent Advanced Configuration window.
3. In the second Agent Advanced Configuration window, enter the Hostname or
IP Address of the monitoring server to connect to; if the port you are using is
different from the default 1918, enter the Port number.
146
What to do next
When reconfiguring a Universal Agent to connect to a different monitoring server,
restart all the situations that are distributed to that managed system. Otherwise,
the situations that are set to autostart will fail to start and an error will occur.
147
148
149
Component relationships
The Agent Management Services uses three interfaces to communicate with other
components in the OS agent process.
Figure 2. Interactions of Agent Management Services components with IBM Tivoli Monitoring components
150
Component descriptions
Agent Management Services includes two components: Agent watchdog and Agent
Management Services watchdog:
Agent watchdog
The agent watchdog performs specific availability monitoring actions
against an agent based on the policy in the agent's common agent package
(CAP) file. This component runs inside the OS agent process as a logical
component. Other than the OS agent itself, the agent watchdog watches
any monitoring agent that has an XML file in the CAP directory of the OS
agent installation.
CAP files are being shipped with most agent products today. All agents in
the Tivoli portfolio, with the exception of those on i5/OS and z/OS, are
supported. For your convenience, the IBM Open Process Automation
Library has downloadable IBM Tivoli Monitoring Agent Management
Services Common Agent Package (CAP) files for agents that do not have
them included with the product.
Agent Management Services watchdog
Who watches the watchdog? That is the job of the Agent Management
Services watchdog. It is the same programmatically as the agent watchdog
within the OS agent and behaves in the same way, but it is used only to
watch the OS agent. The Agent Management Services watchdog is
included as a stand-alone executable file with the OS agents and runs as
process kcawd on Linux and operating systems such as UNIX, and as
process kcawd.exe on Windows.
151
variable in the OS monitoring agent configuration file for the relevant platform.
Agents that run natively on 64-bit Windows put their CAP files in the 64-bit Tivoli
Monitoring Agent directory; all others go in the 32-bit directory:
Install_dir\TMAITM6[_x64]\CAP
Install_dir/config/CAP
On the zLinux platform, Agent Management Services is disabled at installation or
upon upgrade to V6.2.2 Fix Pack 2 (or later) regardless of whether it was active or
inactive prior to the upgrade. On Intel Linux and other supported platforms, the
Agent Management Services is enabled by default.
152
<subagent id>
Edit this value only if you are creating an instance-specific CAP file for a
particular agent. For example, if you want to create a CAP file specifically
for a set of DB2 agent instances where the kud_default.xml file has a
subagent id="kudagent", set it to something like <subagent
id="kud_instance">. The <agentName> value for both the agent's original
CAP file and its instance-specific CAP files should match.
Enter a string value for the ID.
<instance>
Use this element to provide specific instance names that the target CAP file
policies apply to. It must follow the <agentName> element in the CAP file.
For example, to specify that an instance of a CAP file should apply to two
specific instances of the Tivoli Monitoring DB2 agent, named test1 and
test2, enter this information:
<subagent id="kud_instance">
<agentName>ITCAM Agent for DB2</agentName>
<instance>
<name>test1</name>
<name>test2</name>
</instance>
Enter a string value for the instance name within a <name> </name>
tagging pair.
To enable this support in an older CAP file, update the stop script:
153
<stopScript>
<command>$CANDLEHOME/$ITM_BINARCH/lz/bin/agentInstanceCommand.sh
um STOP ##INSTANCE## ##USER##</command>
<returnCodeList>
<returnCode type="OK">0</returnCode>
</returnCodeList>
</stopScript>
For single instance agents such as the UNIX Log Agent, use this syntax. It is
identical to the syntax on Linux except that - ##USER## is placed after su rather
than at the end:
<startScript>
<command>su - ##USER## -c "$CANDLEHOME/bin/itmcmd agent start ul"
</command>
<returnCodeList>
<returnCode type="OK">0</returnCode>
</returnCodeList>
</startScript>
<stopScript>
<command>su - ##USER## -c "$CANDLEHOME/bin/itmcmd agent stop ul"
</command>
<returnCodeList>
<returnCode type="OK">0</returnCode>
</returnCodeList>
</stopScript>
154
instance being displayed in the Tivoli Enterprise Portal; other Universal Agent
instances cannot be displayed. Either rename kum.xml to another file type such as
kumxml.old or delete it to have the new, upgraded version of the CAP file created
that supports instances used by Agent Management Services.
Related reference
Linux or UNIX installation considerations: Autostart scripts
155
Services, or at the command line). In the Agents Management Status table view,
right-click the row of the agent whose status you want to change, then select the
action:
AMS Recycle Agent Instance
Use this action to stop and and restart a particular instance of the
monitoring agent.
AMS Reset Agent Restart Count
Use this agent to return to 0 the count of agent attempts to restart.
AMS Start Agent
Use this action to start an agent that is under the management of the IBM
Tivoli Monitoring Agent Management Services. For a multi-instance agent,
use AMS Start Agent Instance.
AMS Stop Agent
Use this action to stop an agent that is under the management of the IBM
Tivoli Monitoring Agent Management Services.
AMS Start Agent Instance
Use this action to start a particular instance of the monitoring agent.
AMS Start Management
Use this action to put an agent under the management of the IBM Tivoli
Monitoring Agent Management Services. This is useful when the agent was
taken offline intentionally and you are ready to resume running the agent
and having it managed.
AMS Stop Management
Use this action to remove an agent from management by the IBM Tivoli
Monitoring Agent Management Services. This is useful when you want to
take an agent offline and not have it restarted automatically.
For example, to start managing the Universal Agent for Windows (shows in the
Agent Management Services workspace, Agent Management Status view as
Unmanaged), right-click the row and click Take Action > Select. Select the AMS
Start Management action from the list of possible actions. The command reads,
NT:AMS_Start_Manage "Universal Agent for Windows". Click OK to start managing
the agent. After you click Refresh, the Universal Agent status changes to Managed.
For further information on each command and Take Action commands in general,
see the IBM Tivoli Monitoring Tivoli Enterprise Portal User's Guide and the user's
guide for the specific agent.
Related reference
Take action commands
156
Autonomous capabilities
In addition to the built-in autonomous capability of Tivoli Enterprise Monitoring
Agents and Tivoli System Monitor Agents, you can configure special XML files that
require no connection to a Tivoli Enterprise Monitoring Server. With these XML
files you can define and run situations locally, emit situation events as SNMP alerts
or EIF events to a receiver, collect and save historical data locally, and use
Centralized Configuration to distribute XML file updates to selected monitoring
agents.
Tivoli Enterprise Monitoring Agent
Tivoli Enterprise Monitoring Agents are configured for autonomous
operation by default: The agent starts and continues to run with or without
connection to its monitoring server. With no connection to the monitoring
server, the agent can continue running situations autonomously; when the
agent connects to the monitoring server, it uploads situation events that
took place while it was disconnected. This incurs use of additional disk
space at the agent.
Some situations might not be able to be evaluated completely on the agent
alone and are unable to run when there is no connection to the monitoring
server. For example, situations using a group function such as COUNT or
AVG in the formula must be evaluated at the monitoring server. Even if
the agent or the host system is restarted, the events are persistently
preserved and uploaded on reconnect. This happens automatically on all
Copyright IBM Corp. 2005, 2010
157
agents that use the Tivoli Enterprise Monitoring Agent V6.2.2 framework.
No configuration changes are required.
Autonomous mode was introduced in V6.2.1 as a configurable agent
parameter: IRA_AUTONOMOUS_MODE. Starting with V6.2.2, this
parameter is enabled (set to Y) by default. If you do not want autonomous
behavior enabled for an agent, you can disable it by setting the parameter
to N. Regardless of the setting for this parameter, historical data collection
always runs autonomously and reflex automation for a situation is carried
out when the situation becomes true. See Environment variables for
autonomous behavior on page 160.
OMEGAMON XE for z/OS and OMEGAMON XE for Storage
agents must run connected because they are configured in the Tivoli
Enterprise Monitoring Server in the local RTE: If the monitoring server
becomes unavailable, so too do these agents. Running connected to the
monitoring server does not prevent them from supporting autonomous
capabilities such as emitting SNMP traps and private situations. (The
OMEGAMON XE on z/OS agent can be configured to run standalone, and
therefore without a monitoring server connection, but that means that no
plex data is available for alerts and situations.) OMEGAMON XE for IMS
currently does not support any of the autonomous capabilities.
Tivoli System Monitor Agent
The Tivoli System Monitor Agent is installed on a computer that has no
Tivoli Management Services components or Tivoli Enterprise Monitoring
Agents installed other than agents built with Tivoli Monitoring Agent
Builder V6.2.2 or higher.
The Tivoli System Monitor Agent agent is an OS agent that never connects
to a monitoring server. The autonomous version of the agent uses the same
agent code that is installed for a full OS agent, but Java is not used for the
installation process and the configuration user interface is not provided.
The resulting installation is faster and has a small installed footprint. Local
XML configuration files for defining such functions as private situations
and SNMP alerts are processed during agent startup.
Private situations
Enterprise monitoring agents and system monitor agents can use locally
defined situations to operate fully autonomously. These locally defined
private situations are created in a private situation definition XML file.
Private situations events come directly from the monitoring agent. You
must place a private situation configuration file in the agent installation
and restart the agent to enable this function. If you want to send an SNMP
alert or EIF event when a private situation event is opened, then the SNMP
trap configuration file or EIF event configuration file must also be in the
agent installation.
Private situations on an enterprise monitoring agent have no interaction
with or reporting of any kind to the monitoring server. Private situations
and enterprise situations can run concurrently.
Important: Be aware that all situations, whether private or enterprise, must
have unique names. Otherwise, actions invoked upon one situation are
applied to the other situation with the same name. You can use the CLI
tacmd listSit command to get a list of the enterprise situations on the hub
monitoring server.
See Private situations on page 172.
158
159
practical limitations of the computer's storage. You can use the provided
file conversion programs, such as krarloff, to move data out of the
historical files to text files.
See Private history on page 190.
Enterprise situation overrides
You can configure situation overrides for the locally installed enterprise
monitoring agent by using a pc_thresholds.xml (where pc is the
two-character product code) configuration file. And you can manage the
overrides at the agent manually or with Centralized Configuration.
Updated situation thresholds take effect after you restart the monitoring
agent. The agent sends threshold overrides to a local file and maintains
active situation thresholds over agent restarts.
You can apply a schedule by weekdays, days of the month, and start and
stop time of a day. The enterprise monitoring agent maintains dynamic
situation threshold overrides audit trails by writing active situation
threshold records to the agent operation log, which you can add to a
workspace in the Tivoli Enterprise Portal to review situation thresholds in
effect.
See Situation override XML specification on page 192.
Agent Service Interface
The IBM Tivoli Monitoring Service Index utility provides links to the Agent
Service Interface for each monitoring agent installed locally. After logging
into the operating system, you can select one of these reports: agent
information, situation, history, or queries.
Additionally, you can make a service interface request directly such as to
initiate an immediate configuration download or to recycle a situation.
See Agent Service Interface on page 227.
Centralized Configuration
Use Centralized Configuration to maintain monitoring agent configuration
XML files at a central location that are pulled from the central configuration
server at intervals (default is every 60 minutes) or on demand. Agents
participating in Centralized Configuration each have their own
configuration load list XML file that tells where to connect to get the latest
updates in the specified configuration files.
A computer that one or more monitoring agents connect to for
configuration updates is called a central configuration server. A computer
with one or more monitoring agents that download configuration updates
is called a central configuration client.
See Centralized Configuration.
160
/qautotmp/kmsparm.kbbenv
member name KPCENV in &hilev.&rte.RKANPARU
161
agents. By default, autonomy is enabled. To disable it, which sets the agent
to the same dependency it had on the monitoring server prior to V6.2.1, set
this parameter to N.
IRA_EIF_DEST_CONFIG=filename
Use this parameter in the agent environment file to specify the location of
the EIF destination configuration XML file. You can specify the complete
path or the path relative to the local configuration directory.
IRA_EIF_MSG_LOCALE=en_US
This parameter in the agent environment files is set to American English
by default. For agents that support globalized message text for the message
slot in the generated event using a predefined mapping file and language
resource bundles, the default language locale can be specified.
IRA_EVENT_EXPORT_CHECKUSAGE_INTERVAL=180
Specifies the preferred interval in seconds to check if the
IRA_AUTONOMOUS_LIMIT has been reached. The default interval is 180
seconds (3 minutes); the minimum interval that can be specified is 60
seconds.
IRA_EVENT_EXPORT_EIF=Y
This parameter in the agent environment file is set to enable the EIF event
export facility. Change the value to N to disable the facility.
IRA_EVENT_EXPORT_SIT_STATS=Y
You can get a report of the situation operation statistics through the Agent
Service Interface. This parameter enables (Y) or disables (N) the basic
situation operation statistics data collection:
Situation Name
Situation Type - Enterprise or Private
Application Name
Table Name
Sample interval
Row data size
Time stamp First Time situation started
Time stamp First Time situation raised event (passed filter)
Time stamp Last Time situation started
Time stamp Last Time situation stopped
Time stamp Last Time situation evaluated to TRUE
Time stamp Last Time situation evaluated to FALSE
Number of times situation recycled
Number of times situation in autonomous operation
Default: Y.
IRA_EVENT_EXPORT_SIT_STATS_DETAIL=N
When set to Y, this parameters enables collection of the following event
metrics from the agent:
True sample count
False sample count
True Sample ratio
False Sample ratio
Number of data rows counted in 24 hours
162
163
Private situations
IRA_PRIVATE_SITUATION_CONFIG
Specifies the fully qualified private situation configuration file name.
During agent initialization, a check is made for the private situation
configuration file: Install_dir/localconfig/pc/pc_situations.xml where
pc is the two-character product code.
A fully qualified path to the situation configuration file on z/OS,
such as 'TIVOLI.ITM622.TVT1006.RKANDATV(MYPSSIT)' where
DDNAME RKANDATV is TIVOLI.ITM622.TVT1006.RKANDATV:
IRA_PRIVATE_SITUATION_CONFIG=MYPSSIT.
For a situation configuration file that is not a PDS member in DDNAME
RKANDATV, specify 'TIVOLI.ITM622.TVT1006.MYFILES(MYPSSIT)' where
DDNAME MYFILES is TIVOLI.ITM622.TVT1006.MYFILES:
IRA_PRIVATE_SITUATION_CONFIG=MYPSSIT.MYFILES.
See Private situations on page 172 to learn about private situations.
Private history
CTIRA_HIST_DIR
Specifies the directory where agent-based short-term history data files will
be stored. Does not apply to the Tivoli Enterprise Monitoring Server's
short-term history data files. This is the default location for enterprise
history or private history binary files.
Install_dir\TMAITM6\logs
Install_dir/arch/pc/hist
164
See Private history on page 190 to learn about private history data collection.
165
interface. The HTML file must exist in the agent installation HTML
subdirectory: Install_dir\localconfig\html\ or as specified by
IRA_SERVICE_INTERFACE_DIR.
IRA_SERVICE_INTERFACE_DIR
Defines the path specification of the agent service interface HTML
directory. In conjunction with the
IRA_SERVICE_INTERFACE_DEFAULT_PAGE parameter, the agent
constructs the file path to a specific, requested HTTP GET object. The
default is Install_dir/localconfig on distributed systems.
Example: If IRA_SERVICE_INTERFACE_DIR="\mypath\private" and you enter
http://localhost:1920///kuxagent/kuxagent/html/myPage.htm in your
browser, myPage.htm is retrieved from \mypath\private\html\ instead of
ITM_dir\localconfig\html\.
There is no directory path specification but instead a data set
represented by the JCL DD (Data Definition) name. Therefore,
IRA_SERVICE_INTERFACE_DIR is not used but the
IRA_SERVICE_INTERFACE_HTML specification is in effect. The default is
RKANDATV DD name.
See also the environment variables for Centralized Configuration that are prefixed
with IRA_SERVICE_INTERFACE.
166
Related tasks
Editing the agent environment file
Related reference
Environment variables for central configuration
Access Authorization Group Profile
Situation limitations
The types of formula functions that can be used in a private situation are limited.
As well, the types of formula functions in an enterprise situation that can be
processed by an agent when it is disconnected from its Tivoli Enterprise
Monitoring Server are limited.
Table 14. Availability of situation formula functions when an enterprise agent is connected or
disconnected, or when the situation is private.
Event emitted
from the
monitoring
server
Formula
function
Supported in
enterprise
situations
Enterprise
situation
Agent connected
to the
monitoring
server
Evaluates at the
monitoring
server
Enterprise
situation
Agent
disconnected
from the
monitoring
server
Evaluates at the
agent
Supported in
private
situations
Evaluates at the
agent1
Cell functions
CHANGE
available
available
available
not available
DATE
available
available
available
not available
MISSING
available
available
available
available
PCTCHANGE
available
available
available
not available
SCAN
available
available
available
not available
STR
available
available
available
not available
TIME
available
not available
not available
not available
VALUE
available
available
available
available
IN
available
available
available
not available
Group functions can be applied to multiple row attribute groups and to those configured
for historical data collection. Table and chart views require that a time range be set to show
a span of data samplings.
AVG
available
not available
not available
not available
COUNT
available
not available
not available
not available
MAX
available
not available
not available
not available
MIN
available
not available
not available
not available
SUM
available
not available
not available
not available
167
Table 14. Availability of situation formula functions when an enterprise agent is connected or
disconnected, or when the situation is private. (continued)
Event emitted
from the
monitoring
server
Formula
function
Supported in
enterprise
situations
Enterprise
situation
Agent connected
to the
monitoring
server
Evaluates at the
monitoring
server
Enterprise
situation
Agent
disconnected
from the
monitoring
server
Evaluates at the
agent
Supported in
private
situations
Evaluates at the
agent1
Situation characteristics
Embedded,
including
correlated
situations
available
not available
not available
not available
Multiple
attribute groups
available
not available
not available
not available
Persistence
enabled
available
available2
available2
not available
Display item
selected
available
available
not available3
not available
Uses duper
process
available
available
not available4
not available
Distribution to
managed system
group
available
available
available
not available
Situation persistence is not evaluated at the agent. Traps can be emitted in two modes:
RC (Rising Continuous) whereby a trap is emitted every time the situation is true; HY
(Hysteresis) whereby a trap is emitted the first time the situation is true and a clearing trap
is emitted when the situation is no longer true. As well, persistence can be enabled at the
trap destination by implementing a persistence rule.
Situations that include a display item (available for multiple row attribute groups) are
limited to sending one SNMP alert for the first row that evaluates to true; no alerts can be
sent for any subsequent rows that evaluate to true.
Traps are emitted but situations are not evaluated when the agent is disconnected from
the monitoring server.
168
Portal, but situations running on multiple subnodes for an agent instance are
actually evaluating on a single table. If a situation becomes true on one subnode,
an SNMP alert defined for that situation is emitted, but no SNMP alerts are
emitted for that situation on any other subnodes because no further rows are
processed in the table.
Here are some alternatives to emitting SNMP alerts for agents with subnodes:
v Forward events from the monitoring server to an EIF receiver.
v When you configure the agent, define only one subnode for an agent instance.
v Define a separate situation for each subnode and distribute that situation to only
a single subnode. In the following example,
situation KAB_Log_Message is distributed to ALL LOG subnodes in the AB
agent
situation KAB_Log1only_Message is distributed to only the AB:uxlog1:LOG
subnode
situation KAB_Log2only_Message is distributed to only the AB:uxlog2:LOG
subnode
Instance 1 of the AB log monitoring agent is monitoring three logs (there is a
subnode for each log file): uxlog1, uxlog2, and uxlog3:
If a message appears in the file monitored by subnode uxlog1, these
situations become true: KAB_Log_Message and KAB_Log1only_Message.
If a message appears in the file monitored by subnode uxlog3, this situation
becomes true: KAB_Log_Message
The private situation configuration file for the agent:
<PRIVATECONFIGURATION>
<PRIVATESIT>
<SITUATION>KAB_Log_Message />
<CRITERIA><![CDATA[ *IF *VALUE KAB_LOGFILE.Message *NE ]]>
</CRITERIA>
<INTERVAL>000000</INTERVAL>
<DISTRIBUTION>AB:uxlog:LOG</DISTRIBUTION>
</PRIVATESIT>
<PRIVATESIT>
<SITUATION>KAB_Log1only_Message />
<CRITERIA><![CDATA[ *IF *VALUE KAB_LOGFILE.Message *NE ]]>
</CRITERIA>
<INTERVAL>000000</INTERVAL>
<DISTRIBUTION>AB:uxlog1:LOG</DISTRIBUTION>
</PRIVATESIT>
<PRIVATESIT>
<SITUATION>KAB_Log2only_Message />
<CRITERIA><![CDATA[ *IF *VALUE KAB_LOGFILE.Message *NE ]]>
</CRITERIA>
<INTERVAL>000000</INTERVAL>
<DISTRIBUTION>AB:uxlog2:LOG</DISTRIBUTION>
</PRIVATESIT>
</PRIVATECONFIGURATION>
169
Related concepts
Customizing event integration with Tivoli Netcool/OMNIbus
Customizing event integration with Tivoli Enterprise Console
Related reference
Private situation operation on page 172
170
Related reference
Private situation XML specification on page 175
Trap configuration XML specification on page 199
EIF event mapping XML specification on page 216
EIF event destination configuration XML specification on page 221
Configuring the Tivoli Enterprise Monitoring Server on z/OS
i5/OS National language support (NLS) considerations
Procedure
1. While the watchdog process is running, move the common agent package
(CAP) file named kpc_default.xml (where pc is the two-character product code)
out of the CAP directory to a temporary location. The file is located in the
KCA_CAP_DIR directory.
Install_dir\TMAITM6[_x64]\CAP\
Install_dir/config/CAP
Removing the file from the CAP directory renders the agent invisible to the
Agent Management Services.
2. Modify all instances of <managerType> in the CAP file to enable or disable
management:
v <managerType>ProxyAgentServices</managerType> to enable management.
v <managerType>NotManaged</managerType> to disable management.
A best practice is to rename the modified file to kpc.xml (where pc is the
two-character product code). All CAP files located in the KCA_CAP_DIR are
processed by Agent Management Services. If two or more CAP files share the
Chapter 12. Agent autonomy
171
same subagent id value, they are processed in sorted order. For example,
kca.xml is used before kca_default.xml. Also, renaming the CAP file to kpc.xml
ensures that your changes do not get overwritten during a future upgrade.
3. Save the updated file.
4. While the watchdog process (kcawd) is running, move or copy the updated
CAP file back to KCA_CAP_DIR.
Results
The updated Agent Management Services settings are processed after the CAP file
is placed in KCA_CAP_DIR.
Private situations
Define private situations for monitoring criteria and the resulting events that are
pertinent to your local agent environment or to an event receiver and not relevant
to the Tivoli Enterprise Monitoring environment. Private situations can be defined
for Tivoli Enterprise Monitoring Agents and Tivoli System Monitor Agents.
172
You can also create situations in this file by exporting existing enterprise situations
from the monitoring server, using the CLI tacmd bulkExportSit and then copying
the exported situations that are eligible for use as private situations from their
XML file to the agent Private Situation configuration file. The last situation (named
Disk_Queue) in the example came from an exported situation XML file.
<PRIVATECONFIGURATION>
<PRIVATESIT>
<SITUATION>NT_Missing_Scheduler_pr />
<CRITERIA>
<![CDATA[ *MISSING NT_Process.Process_Name *EQ (schedule)]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<PRIVATESIT>
<SITUATION>NT_Paging_File_Critical_pr />
<CRITERIA>
<![CDATA[ *VALUE NT_Paging_File.%_Usage *GE 80 ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<PRIVATESIT>
<SITUATION>Disk_Queue />
<PDT><![CDATA[ *IF *VALUE NT_Physical_Disk.Avg_Disk_Queue_Length
*GE 0.004 ]]></PDT>
<REEV_TIME>003000</REEV_TIME>
</PRIVATESIT>
</PRIVATECONFIGURATION>
Activation
When the agent is initialized, an XML parser examines and validates the private
situation definitions. All XML parsing error messages are recorded in the agent
operations log. (See the IBM Tivoli Monitoring Troubleshooting Guide.)
Private situations continue to run until the agent is shut down.
Chapter 12. Agent autonomy
173
The events that are opened when a situation becomes true can be sent as
SNMPv1/v2 traps or SNMPv3 informs when an SNMP trap configuration file is
created and a receiver such as the Netcool/OMNIbus SNMP Probe has been
configured to receive them; or as EIF events when an EIF event configuration file
is created and a receiver such as the Tivoli Enterprise Console event server or
Netcool/OMNIbus Probe for Tivoli EIF is configured to receive them. As well, the
Agent Service Interface provides a summary report of situation activity.
You create a private situation file named pc_situations.xml and save it to the
Install_dir/localconfig/pc (where pc is the product code). If you prefer to name
the file differently or use a different path, the IRA_PRIVATE_SITUATION_CONFIG
and IRA_LOCALCONFIG_DIR agent environment variables are provided for you
to change the file name and path.
Summary
Private situations are agent monitoring requests defined by a local administrator
with criteria that is pertinent to the local agent environment. This is a summary of
private situation characteristics:
v Created at the agent locally through a simple editor.
v Emit results and events with agent SNMP traps.
v Have a separate namespace to avoid naming conflicts with enterprise situations.
v Run from the time the agent starts until it stops regardless of monitoring server
connectivity.
v Multiple expressions in a formula must have logic connectors that are uniformly
conjunctive AND or disjunctive OR; a mix of the two connectors in a formula is
not supported.
v Support up to nine expressions in the situation formula when connected by
Boolean AND logic and up to ten expressions when connected by Boolean OR
logic.
v All enterprise situation threshold operators are supported: equal (EQ), not equal
(NE), greater than (GT), less than (LT), greater than or equal (GE), and less than
or equal (LE).
v Include support for the reflex automation action command.
v Include support for the VALUE and MISSING formula functions only; include
no support for group functions or other cell functions.
174
Elements
The elements and their attributes are case-insensitive. For example, you can enter
<PRIVATESIT>, <PrivateSit>, or <privatesit>.
<PRIVATECONFIGURATION>
PRIVATECONFIGURATION is the root element identifying this as an
agent private situation configuration document.
<PRIVATECONFIGURATION>
<PRIVATESIT>
<SITUATION NAME=Check_Process_CPU_Usage INTERVAL=000500 /SITUATION>
<CRITERIA>
<![CDATA[ *VALUE NT_Process.%_Processor_Time *GE 65 *AND
*VALUE NT_Process.Priority_Base *NE 0 *AND
*VALUE NT_Process.Process_Name *NE _Total]]>
</CRITERIA>
<CMD><![CDATA[netstat >.\logs\netstat.dat]]></CMD>
<AUTOSOPT When=N Frequency=N />
</PRIVATESIT>
</PRIVATECONFIGURATION>
<PRIVATESIT>
Enclose each situation definition in PRIVATESIT begin and end tags.
Chapter 12. Agent autonomy
175
<SITUATION>
Within each set of PRIVATESIT begin and end tags, add a set of
SITUATION begin and end tags. Within each set of SITUATION begin and
end tags is the complete situation definition. Define the situation with
these attributes:
NAME=
The situation name, which must begin with a letter and can be up
to 31 letters, numbers and _ underscores, such as
Missing_Process_Helper_Harmless. Be aware that all situations,
whether private or enterprise, must have unique names. Otherwise,
actions invoked upon one situation are applied to the other
situation with the same name.
INTERVAL=
Unless this is a pure-event situation, specify the sampling interval
in HHMMSS format. Default: 001500 (15 minutes). Alternatively,
use the <INTERVAL> element.
CRITERIA=
The situation formula. Alternatively, use the <CRITERIA> element.
<SITUATION NAME=High_CPU_Usage INTERVAL=000500
CRITERIA=*VALUE NT_Process.%_Processor_Time *GE 65
*AND *VALUE NT_Process.Priority_Base *NE 0
*AND *VALUE NT_Process.Process_Name *NE _Total />
<INTERVAL>
Specifies the situation sample interval in HHMMSS format. A value of
000000 (six zeroes) indicates a pure-event situation. For sampled-event
situations, the minimum interval is 000030 (30 seconds) and the maximum
is 235959 (23 hours, 59 minutes, and 59 seconds). Default: 001500 (15
minutes). This element is required if INTERVAL is not specified in the
SITUATION element.
<CRITERIA>
The situation criteria is specified within this element and the <![CDATA[
]]> element. Each expression has three parts, starting with *VALUE or
*MISSING, followed by attribute-table-name.attribute-name, the logical
operator (such as *EQ), and the attribute threshold value or, for the
MISSING function, a comma-separated list of names. It is acceptable, but
not required to begin the formula with *IF, as is done in enterprise
situation formula syntax.
For the attribute, use the detailed attribute name in the format of
attribute-table- name dot attribute-name. The product attribute file defines
the agent product attribute tables and associated attributes, for example,
knt.atr or kux.atr files residing in the ATTRLIB directory for a distributed
agent installation.
The Operator defines logical operation of filter value and data. The
supported operators are: *EQ for equal, *NE for not equal, *GE for greater
than or equal to, *LE for less than or equal to, *LT for less than, and *GT
for greater than. Within the <CRITERIA> element, the command is
enclosed in Character Data tags to exclude it from XML parsing. This
example shows a formula that triggers an alert when the available disk
space is 35% or below:
<CRITERIA> <![CDATA[*VALUE NT_Logical_Disk.%_Free *LE 35]]> </CRITERIA>
For multiple expressions, use the *AND or *OR connector. All connectors
in the formula must be the same, either all *AND or all *OR. Mixing
176
logical *AND and *OR connectors is not supported. You can have up to
nine *AND connectors or up to 10 *OR connectors in a formula, .
In a formula with multiple expressions, there can be no more than one
*MISSING expression, it must be the last expression in the formula, and
only *AND connectors can be used. (See the Tivoli Enterprise Portal User's
Check for Missing Items.)
Guide for a description of
Wildcards are not supported. For example, *VALUE
NT_Process.Process_Name *EQ S* to find all processes that start with S
is invalid in a private situation. Likewise, wildcards in a *MISSING list are
invalid, such as NT_Process.Process_Name *EQ ('DB2*') to find all
processes beginning with DB2.
Examples:
<CRITERIA>
<![CDATA[ *VALUE NT_Process.%_Processor_Time *GE 65 *AND
*VALUE NT_Process.Priority_Base *NE 0 *AND
*VALUE NT_Process.Process_Name *NE _Total]]>
</CRITERIA>
<CRITERIA>
<![CDATA[ *MISSING NT_Process.Process_Name *EQ (schedule,notepad)]]>
</CRITERIA>
<CRITERIA>
<![CDATA[ *VALUE Linux_Process.State *NE Running *AND
*MISSING Linux_Process.Process_Command_Name *EQ (MyHelp,myhelpw)]]>
</CRITERIA>
If the private situation uses any scaled attributes, their values must be
normalized for proper evaluation. A scaled attribute value is used to
specify how many positions to shift the decimal point to the left. For
example, 55.255 is a valid value for an attribute that displays with a scale
of 3. To normalize it, you would shift the decimal point right by three
places to be 55255.
SCAL (Scale)
5000
The attribute description topics for your product should specify whether
the value is scaled. For distributed agents, you can also review the
attribute file for scal in the attribute definition. For example, khd.atr for
the Warehouse Proxy agent has a work queue insertion rate attribute with
<install_dir>\TMAITM6\ATTRLIB;
scal 2. Location of kpc.atr files:
<install_dir>/platform/<pc>/tables/ATTRLIB, where
platform is the operating system and pc is the product code.
This example shows a hexadecimal integer as the comparison value:
Chapter 12. Agent autonomy
177
]]>
tags.
<AUTOSOPT>
This is required if an action <CMD> is specified. It defines the action
command execution options, WHEN (X), FREQUENCY (Y), WHERE (Z).
The default is NNN:
WHEN= Optional. Y to run the command for each item; or N to
run the command on only the first row of data returned that meets the
situation criteria. If the attribute group returns multiple rows of data
and more than one row satisfies the condition, you can choose to issue
the command on only the first row that meets the criteria or once for
each row that meets the criteria. Default: N.
FREQUENCY= Optional. Y to issue the command every time the
situation evaluates to true; or N to issue the command when the
situation is true, but not again until the situation evaluates to false,
followed by another true evaluation. Default: N.
WHERE= N to run the command at the agent. Default: N Because
there is only one possible setting for where, you do not need to
include it in the AUTOSOPT element.
<AUTOSOPT When=Y Frequency=Y />
<DISTRIBUTION>
Required for products with subnodes (subagents). Specifies a managed
system name or a list of managed system names separated by a comma (,).
The default is the agent managed system name or all known subnodes.
<LSTDATE>
Optional. Situation last updated timestamp. If it is unspecified then the
current data time is automatically generated. The format is
CYYMMDDHHMMSSmmm (as in 1100715074501000 for July 15, 2010 at
07:45:01) where:
C = Century (1 for 21st)
Y = Year
M = Month
D = Day
H = Hour
M = Minute
S = Second
178
m = millisecond
<LSTUSRPRF>
Optional. This is the ID of the user who last updated this situation
definition. If it is unspecified then the current logon user ID is used.
Example:
<LSTUSRPRF>SYSADMIN</LSTUSRPRF>
<LSTRELEASE>
Optional. Specifies the situation version. Example:
<LSTRELEASE>V622</LSTRELEASE>
<SITINFO>
Optional. Defines the situation qualifiers for EIF events. Enclose in the
<![CDATA[ ]]> element. Alternatively, it defines qualifiers for EIF events
using parameters. Multiple qualifiers are delimited by a semicolon (;).
ATOM= Optional. For multiple-row attribute groups. This is the catalog
COLUMN name to use as the display item, which causes an event to be
generated for each subset of rows with the same display item value.
COUNT= Optional. This is called situation persistence in the Tivoli
Enterprise Portal. Specify the number of intervals that the situation
must remain true before an event is opened.
SEV= Optional. The severity to assign to the EIF event: Fatal, Critical,
Warning, Minor, Harmless, Informational, or Unknown.
TFWD=[Y|N] Optional. Y is the default. If you want to send only
SNMP alerts and no EIF events, set this attribute to N.
TDST= Optional. Specify one or more EIF receiver destinations to send
the event to. You can enter up to five valid destination server IDs, each
separated by a comma (,). Valid destinations are defined in the
pc_eventdest.xml file. If no TDST parameter is specified, the EIF event
is sent to all default event destinations defined (destination entries with
a default="Y" setting) in the event destination configuration file.
Examples:
<SITINFO><![CDATA[SEV=Fatal;~;]]></SITINFO>
<SITINFO><![CDATA[SEV=Critical;TFWD=Y;TDST=1,3;]]></SITINFO>
<HISTORY>
Optional. Use the history element to specify each attribute group that you
want to collect historical data for. The agent does not support multiple
<HISTORY> specifications for the same TABLE. The XML parser processes
duplicated <HISTORY> as update scenarios. The final updated attribute
value will be the value in effect and always output to agent's Operation
Log.
TABLE= This parameter specifies the application attribute group name.
DISTRIBUTION If the agent has subnodes, specify the subnode name
in DISTRIBUTION begin and end tags. Separate multiple subnode
names with , commas.
INTERVAL= Optional. This parameter specifies the historical data
collection interval in minutes. The minimum collection interval is 1
minute and the maximum is 1440 (24 hours). Valid intervals are values
that divide evenly into 60 or are divisible by 60: an interval below 60
could be 1, 2, 3, 4, 5, 6, 10, 12, 15, 20, and 30; an interval greater than 60
could be 120, 180, 240, and so on, up to 1440. If you enter an invalid
value, no history will be collected for the specified attribute group.
Default:15.
Chapter 12. Agent autonomy
179
The agent collects System table data every 5 minutes and maintains 3 days
of short-term history.
<HISTORY TABLE=System Interval=5 RETAIN=72
/>
/>
Related reference
Private history on page 190
Agent Service Interface - History on page 234
Agent Service Interface - Situations on page 233
UTF-8 encoded XML files on page 170
Elements
The elements and their attributes are case-insensitive. For example, you can enter
<SITNAME>, <SitName>, or <sitname>.
<TABLE>
This is the root element of the exported situation XML file. In the private
situation configuration file, the TABLE tagging (and everything between)
from the exported situation is processed as a private situation definition.
180
<ROW>
This is the child element to follow TABLE.
<SITNAME>
Monitoring situation name. The situation name must begin with a letter
and can be up to 31 letters and numbers and _ underscores. Within each
set of SITNAME begin and end tags is the complete situation definition.
Example:
<SITNAME>Free_DiskSpace_Low</SITNAME>
For multiple expressions, use the *AND and *OR connectors. All
connectors in the formula must be the same, either all *AND or all *OR. A
mix of logical *AND and *OR connectors is not supported. Example:
<PDT> <![CDATA[*IF *VALUE NT_Process.%_Processor_Time *GE 65 *AND
*VALUE NT_Process.Priority_Base *NE 0 *AND
*VALUE NT_Process.Process_Name *NE _Total]]> </PDT>
181
<PRIVATECONFIGURATION>
<PRIVATESIT>
<SITUATION>SCALE_TEST</SITUATION>
<CRITERIA><![CDATA[ *IF *VALUE NT_Physical_Disk.Avg_Disk_Queue_Length
*GE 0.004 ]]></CRITERIA>
<INTERVAL>000030</INTERVAL>
</PRIVATESIT>
</PRIVATECONFIGURATION>
Normalize the value by shifting the decimal point to the right by three
places: 0.004 is 4 or a value such as the one shown here.
<CRITERIA><![CDATA[ *IF *VALUE NT_Physical_Disk.Avg_Disk_Queue_Length
*GE 4.123 ]]></CRITERIA>
<CMD>
Optional. Defines the action command or script to invoke when the
situation is true. Enclose the command in the <![CDATA[ ]]> section.
Example:
<CMD><![CDATA[netstat >.\logs\netstat.dat]]></CMD>
<AUTOSOPT>
This is required if an action command <CMD> is specified. It defines reflex
automation action command execution options, in order XYZ, between
begin and end tags. The default is NNN:
Only take action on first item
Don't take action twice in a row (wait until situation goes false
then true again)
Execute the Action at the Managed System (Agent)
X=Y Run command for each item.
X=N Run command on first item only.
Y=Y Run command for each sample interval.
Y=N Do not run command twice in a row.
Z=N This is always set to N for private situations, and means to run
the command at the agent. If the exported option is set to Y, the setting
will be ignored and be treated as N.
<DISTRIBUTION>
Required for products with subnodes (subagents). Specifies a managed
system name or multiple managed system names separated by a comma
(,). The default is the agent managed system name or all known subagents.
Managed system groups are not supported including the predefined
managed system groups, which are prefixed with an asterisk (*).
<LSTCCSID>
Optional. Specifies the IBM Code Character Set ID. en_US is the only value
allowed.
<LSTDATE>
Optional. Situation last updated timestamp. If it is unspecified then the
current data time is automatically generated. The format is
CYYMMDDHHMMSSmmm (as in 1090715074501000 for July 15, 2009 at
07:45:01) where:
C = Century (1 for 21st)
Y = Year
M = Month
182
D = Day
H = Hour
M = Minute
S = Second
m = millisecond
<LSTRELEASE>
Optional. Specifies the situation version.
<LSTUSRPRF>
Optional. This is the ID of the user who last updated this situation
definition. If it is unspecified then the current logon user ID is used.
<SITINFO>
Optional. Defines the situation qualifiers for EIF events. Within the
<SITINFO> element, enclose the situation formula in <![CDATA[ ]]>
tagging, such as <![CDATA[ SEV=Critical ]]>. Alternatively, this defines
qualifiers using parameters. Multiple qualifiers are delimited by a
semicolon (;).
ATOM= Optional. For multiple-row attribute groups. This is the catalog
COLUMN name to use as the display item, which causes an event to be
generated for each subset of rows with the same display item value.
COUNT= Optional. This is called situation persistence in the Tivoli
Enterprise Portal. Specify the number of intervals that the situation
must remain true before an event is opened.
SEV= Optional. The severity to assign to the EIF event: Fatal, Critical,
Warning, Minor, Harmless, Informational, or Unknown.
TFWD=[Y|N] Optional. Y is the default. If you want to send only
SNMP alerts and no EIF events, set this attribute to N.
TDST= Optional. Specify one or more EIF receiver destinations to send
the event to. You can enter up to five valid destination server IDs, each
separated by a comma (,). Valid destinations are defined in the
pc_eventdest.xml file. If no TDST parameter is specified, the EIF event
is sent to all default event destinations defined (destination entries with
a default="Y" setting) in the event destination configuration file.
<TEXT>
Situation description. Within the <TEXT> element, enclose the situation
formula in <![CDATA[ ]]> tagging.
<REEV_TIME>
Specifies the situation sample interval in HHMMSS format. A value of 0
zero indicates a pure-event situation. The default interval is 15 minutes,
001500; the minimum is 30 seconds, 000030; and the maximum is 23 hours,
59 minutes, and 59 seconds, 235959. Example:
<REEV_TIME>000500</REEV_TIME>
Ignored elements
The following elements in the exported XML specification are not used
except where noted:
<FULLNAME> (processed for EIF)
<ADVISE>
<AFFINITIES>
<ALERTLIST>
<AUTOSTART>
Chapter 12. Agent autonomy
183
<DESTNODE />
<HUB />
<LOCFLAG />
<NOTIFYARGS>
<NOTIFYOPTS>
<OBJECTLOCK>
<PRNAMES>
<QIBSCOPE>
<REEV_DAYS> (over 1 day unsupported)
<REFLEXOK>
<SENDMSGQ>
<SITINFO> (processed for EIF)
<SOURCE>
184
</TEXT>
<DISTRIBUTION>*NT_SYSTEM</DISTRIBUTION>
</ROW>
</TABLE>
Tip: Each exported situation is given its own XML file. If your private situations
will initially result from an export of your enterprise situations, create an XML
with PRIVATECONFIGURATION begin and end tags, then paste the TABLE begin
and end tags and everything contained in them into the file for each situation that
you want to include. For exported situations, the TABLE tags are equivalent to the
PRIVATESIT tags.
185
Linux OS lz_situations.xml
<PRIVATECONFIGURATION>
<!-- Situation Description: Percentage of time the processor is busy
is extremely high -->
<PRIVATESIT>
<SITUATION>Linux_High_CPU_Overload_pr />
<CRITERIA>
<![CDATA[ *VALUE Linux_CPU.Idle_CPU *LT 10 *AND *VALUE Linux_CPU.CPU_ID
*EQ Aggregate ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percentage of packet collisions during data
transmission is high -->
<PRIVATESIT>
<SITUATION>Linux_High_Packet_Collisons_pr />
<CRITERIA>
<![CDATA[ *VALUE Linux_Network.Collision_Percent *GT 10 ]]>
</CRITERIA>
<INTERVAL>000500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percentage of available i-nodes is low -->
<PRIVATESIT>
<SITUATION>Linux_Low_Pct_Inodes_pr />
<CRITERIA>
<![CDATA[ *VALUE Linux_Disk.Inodes_Used_Percent *GT 80 ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percentage of space available on a filesystem
is low -->
<PRIVATESIT>
<SITUATION>Linux_Low_Pct_Space_pr />
<CRITERIA>
<![CDATA[ *VALUE Linux_Disk.Space_Available_Percent *LT 15 ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Tests if the SSH Daemon, sshd, is up running -->
<PRIVATESIT>
<SITUATION>Linux_Process_Missing_sshd_pr />
<CRITERIA>
<![CDATA[ *IF *MISSING Linux_Process.Process_Command_Name
*EQ (/usr/sbin/sshd) ]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percentage of Processor time used by
a process high -->
<PRIVATESIT>
<SITUATION>Linux_Process_High_CPU_pr />
<CRITERIA>
<![CDATA[ *VALUE Linux_Process.Busy_CPU_Pct *GT 60 ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: High number of stopped processes on this system -->
<PRIVATESIT>
<SITUATION>Linux_Process_Stopped_pr />
<CRITERIA>
<![CDATA[ *VALUE Linux_Process.State *NE Running *AND
*VALUE Linux_Process.State *NE Sleeping *AND
*VALUE Linux_Process.State *NE Disk *AND
*VALUE Linux_Process.State *NE Trace ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
186
UNIX OS ux_situations.xml
<PRIVATECONFIGURATION>
<!-- Situation Description: Reports High CPU processes -->
<PRIVATESIT>
<SITUATION>UNIX_CMD_Runaway_Process_pr />
<CRITERIA>
<![CDATA[ *IF *VALUE Process.CPU_Utilization *GT 95 ]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Process CPU utilization is greater than
or equal to 85% -->
<PRIVATESIT>
<SITUATION>UNIX_CPU_Critical_pr />
<CRITERIA>
<![CDATA[ *IF *VALUE Process.CPU_Utilization *GE 85 *AND *VALUE
Process.Command *NE kproc *AND *VALUE Process.Command *NE swapper ]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Notes typical I/O bound processor (NFS) -->
<PRIVATESIT>
<SITUATION>UNIX_HD_Exces_IO_Wait_pr />
<CRITERIA>
<![CDATA[ *VALUE System.Wait_I/O *GT 20 ]]>
</CRITERIA>
<INTERVAL>000200</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Tests if the Internet Services Daemon, inetd,
is up running -->
<PRIVATESIT>
<SITUATION>UNIX_Process_Missing_inetd_pr />
<CRITERIA>
<![CDATA[ *MISSING Process.Command *EQ (/usr/sbin/inetd) ]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Checks the System CPU, Idle, I/O Wait,
and Load Averages for the Busy state -->
<PRIVATESIT>
<SITUATION>UNIX_System_Busy_Warning_pr />
<CRITERIA>
<![CDATA[ *VALUE System.System_CPU *GT 50 *AND
*VALUE System.Idle_CPU *GT 0 *AND *VALUE System.Wait_I/O *GT 0 *AND
Chapter 12. Agent autonomy
187
Windows OS nt_situations.xml
<PRIVATECONFIGURATION>
<!-- Situation Description: One of the NT Logs is close to capacity -->
<PRIVATESIT>
<SITUATION>NT_Log_Space_Low_pr />
<CRITERIA>
<![CDATA[ *VALUE NT_Monitored_Logs_Report.%_Usage *GE 95 ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Test if the NT Scheduler process is running -->
<PRIVATESIT>
<SITUATION>NT_Missing_Scheduler_pr />
<CRITERIA>
<![CDATA[ *MISSING NT_Process.Process_Name *EQ (schedule) ]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percent of the Page File in use is too high -->
<PRIVATESIT>
<SITUATION>NT_Paging_File_Critical_pr />
<CRITERIA>
<![CDATA[ *VALUE NT_Paging_File.%_Usage *GE 80 ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percent of the Page File in use is rising -->
<PRIVATESIT>
<SITUATION>NT_Paging_File_Warning_pr />
<CRITERIA>
<![CDATA[ *VALUE NT_Paging_File.%_Usage *GE 75 *AND
*VALUE NT_Paging_File.%_Usage *LT 80 ]]>
</CRITERIA>
<INTERVAL>001000</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percent of the time the disk drive is busy
is too high -->
<PRIVATESIT>
<SITUATION>NT_Phys_Disk_Busy_Crit_pr />
<CRITERIA>
<![CDATA[ *VALUE NT_Physical_Disk.%_Disk_Time *GT 90 *AND
*VALUE NT_Physical_Disk.Disk_Name *NE _Total ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percent of the time the disk drive is busy
is rising -->
<PRIVATESIT>
<SITUATION>NT_Phys_Disk_Busy_Warn_pr />
<CRITERIA>
<![CDATA[ *VALUE NT_Physical_Disk.%_Disk_Time *GT 80 *AND
*VALUE NT_Physical_Disk.%_Disk_Time *LE 90 *AND
*VALUE NT_Physical_Disk.Disk_Name *NE _Total ]]>
</CRITERIA>
<INTERVAL>001500</INTERVAL>
</PRIVATESIT>
<!-- Situation Description: Percentage of processor time used is too high -->
<PRIVATESIT>
<SITUATION>NT_Proc_CPU_Critical_pr />
<CRITERIA>
188
189
Private history
Private history is the collection and short-term storage of data from a local
monitoring agent. Define historical collection in a private situation configuration
file for an agent, then use the Agent Service Interface to view the short-term
history.
Private history is configured in the private situation configuration file
Local historical data collection is defined in the local private situation
configuration file for each attribute group that you want to save historical
data for. You can define private history with or without private situations.
There can be only one active history data collection per application table
(attribute group).
190
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
ID=N303
APPL=KN3
TABLE=KN3BPG
COL=TMZDIFF
TYP=INTEGER
COL=WRITETIME TYP=CHARACTER
COL=ORIGINNODE TYP=CHARACTER
COL=SYSID
TYP=CHARACTER
COL=TIMESTAMP TYP=CHARACTER
COL=CATDESC
TYP=INTEGER
COL=CATPCT
TYP=INTEGER
COL=POOLNAME
TYP=CHARACTER
COL=CATEGORY
TYP=INTEGER
COL=SAMPLES
TYP=INTEGER
COL=INTERVAL
TYP=INTEGER
GROUP=KN3
LEN=4
REQ
LEN=16
BIT=72
LEN=32
REQ
LEN=4
REQ
LEN=16
REQ
LEN=2
REQ
LEN=4
REQ
LEN=4
REQ
LEN=4
REQ
LEN=4
REQ
LEN=4
REQ
REQ
A table belongs to a PDS group and a number of VSAM files are allocated
for a PDS file group for storing table data. The PDS OVERRIDE statement
Chapter 12. Agent autonomy
191
can be used to modify the table or group assignment (or both) and
properties. The KN3 group specification is illustrated here:
OVERRIDE TABLE=KN3BPG APPL=KN3 WRAP=0 GROUP=KN3
GROUP=KN3 FILE=DSN:CCAPI.COMMON.NV.CIDSSP13.RKN3HIS3
GROUP=KN3 FILE=DSN:CCAPI.COMMON.NV.CIDSSP13.RKN3HIS2
GROUP=KN3 FILE=DSN:CCAPI.COMMON.NV.CIDSSP13.RKN3HIS1
The PDS stores table data using the application name, table name,
WRITETIME, and any indexed columns as the VSAM file key. For Private
History, using KN3BPG table VTAM_Buffer_Usage_By_Category as an
example, the following two configuration steps are required:
1. Add application tables that require history data collection as new tables
to PDS dictionary, in data set RKANPARU member KN3PDICT:
a. Make a copy of the KN3BPG table definition.
b. Change APPL=KN3 to APPL=PVT.
c. Change TABLE=KN3BPG to TABLE=PN3BPG.
2. Add application tables OVERRIDE statement in data set RKANPARU
member KN3PG.
a. Copy the table KN3BPG OVERRIDE statement, if any.
b. Change APPL=KN3 to APPL=PVT.
After completion of the two configuration steps, Private History can be
configured and retrieved as shown in this example:
<HISTORY TABLE= VTAM_Buffer_Usage_By_Category Interval=15 Retain=24>
<HISTREAD>
<SQLTABLE>
<TABLENAME>KN3BPG</TABLENAME>
<FILTER><![CDATA[ *VALUE WRITETIME *GE 1090728020000000 *AND
*VALUE WRITETIME *LE 1090728080000000]]></FILTER>
<OUTLIMIT>5000</OUTLIMIT>
</SQLTABLE>
</HISTREAD>
Both enterprise- and private history table data are stored and read by the
PDS from the same VSAM datasets using the unique key. Alternatively,
you can assigned private history to its own PDS file group and allocate
separate VSAM dataset for the private history group.
Related reference
Private situation XML specification on page 175
Agent Service Interface - History on page 234
Converting short-term history files to delimited flat files
192
After reading the XML document, the agent synchronizes the defined threshold
override specifications against all data collection requests of all defined table
definitions. All threshold parameters, calendar, and situation updates and deletion
take effect immediately. The agent outputs the complete threshold override
specification XML document to the named local threshold file.
ctira_sit_path/hostname_pc_thresholds.xml
See Situation expression overrides on page 165 for the agent environment
variables that enable local situation override operation.
You must create and manually write override definitions in the same file that is
created in CENTRAL mode. The names of the columns to be used when specifying
overrides is taken from the attributes file (such as C:\ibm\ITM\TMAITM6\
ATTRLIB\knt.atr for the Windows OS agent).
Elements
Enclose all values in double quotation marks, for example,
NT_Available_Bytes_Warning).
<OVERRIDE>
Begin <override> and end </override> tags define this as a dynamic threshold
configuration document.
ObjName=
Specify the situation override document name.
<CALENDAR>
Optional. Specify the named calendar definition. Alternatively, you can specify
a scheduled override in the <threshold> element.
Name=
Specify the symbolic calendar name.
Action=
Optional. Specify the calendar definition disposition. Value Update
creates or replaces named calendar. Value Delete removes existing
named calendar.
Start= Stop=
Optional. Use these attributes to apply the override starting at the
same time and for the same duration. For example, start=08:15
stop=17:30 causes the override to take effect during the hours of 8:15
AM to 5:30 PM; start=21:45" stop=05:15 causes the override to take
effect from 9:45 PM to 5:15 AM on the next day. If calendar= is not
defined, the start=, stop=, and cron= values are used.
Cron= Optional. Specify a time definition in minute hour day month
day-of-week format, where minute is from 0 to 59, hour is 0 to 23, day
is 1 to 31, month is 1 to 12, and day-of-week is 0 to 6 (Sunday can be
either 0 or 7). Separate each field with a space and use any
combination of these symbols:
193
v Use an asterisk (*) to mean all legal values for the field. For
example, * in the month field means every month.
v Enter multiple field values separated by a comma (,).
v Use a hyphen (-) to denote a value range.
v Names can also be used for the month and day-of-week fields. Use
the first three letters of the particular day or month.
v Step value, preceded with a slash (/), is the number to skip. For
example, */3 in the hour field means every three hours or
(0,3,6,9,12,15,18,21). Step value is not valid for the minute field.
The CRON definition must specify a time range (begin time to end
time). If calendar= is not defined, the start=, stop=, and cron= values
are used.
LastUpdate=
Optional. Last update 16 digits timestamp. The timestamp is ignored if
it is earlier than the existing set timestamp. Default: 0 0 0 0 0.
ObjName=
Optional. Specify the override document name.
<SITUATION>
Define the situation threshold configuration.
Name=
Specify the situation name.
Table=
Optional. Specify the attribute table name if you prefer to use the
attribute name for the key or threshold definition instead of table
column name. Use either SQL table name or attribute table name.
Action=
Optional. Specify the situation definition disposition. If the
specification does not exist, value Update creates situation
specification; otherwise, matching overrides modified. Value Delete
removes entire situation override specification.
LastUpdate=
Optional. Last update 16 digits timestamp. Ignored if earlier than
existing set timestamp.
Calendar=
Optional. Specify a named calendar definition. The calendar applies to
all thresholds in this situation.
Priority=
Situation override priority. A lower numerical value denotes a higher
priority. Agent replaces lower priority override with higher priority
update and rejects update of equal priority. Default: 2147483647
ObjName=
Optional. Specify override document name.
<KEY> or <TRIGGER>
Optional. Define a table column containing a data value to uniquely
distinguish a data row in a multiple-row sample. Nested <key> definitions
imply AND condition; <key> definitions of the same level imply OR condition.
Column=
Column name. For example, column=USAGE. If you have subagents
194
that you want to apply the override on, you can specify column
ORIGINNODE as the key and the subnode Managed System name as
the key value.
Attr=
Value=
Column or attribute filter data value. The attribute value can also
specified between begin and end tags without using the Value
parameter. However, the parameter style is preferred.
<THRESHOLD>
Define the threshold specification.
Column=
Column name. For example, column=CONATTMP.
Attr=
Position=
Optional. Attribute sequence position in the situation logic construct.
Starting with value of 1. Value zero (0) implies all attribute occurrence
in conjunctive and/or disjunctive situation logic. This parameter is
useful in specifying a particular override attribute in logic containing
several occurrences of the same attribute. For example A1 > 80% AND
A2 < 95%. Default: 0
Operator=
Optional. Logic operation uniquely qualify defining attribute in
situation construct containing multiple occurrences of the same
attribute. Operators values are: EQ, NE, GE, LE, GT, LT. In the above
example, A1 can also be qualified using Operator=GT.
Value=
Column or attribute threshold value. Attribute value can also specified
in between begin and end tags without using Value parameter.
However, parameter style is preferred.
Calendar=
Optional. Specify a named calendar definition. The calendar overrides
any calendar specified in the <situation> element and any start=,
stop=, and cron= attributes.
Start= Stop=
Optional. Use these attributes to apply the override starting at the
same time and for the same duration. For example, start=08:15
stop=17:30 causes the override to take effect during the hours of 8:15
AM to 5:30 PM; start=21:45" stop=05:15 causes the override to take
effect from 9:45 PM to 5:15 AM on the next day. If calendar= is not
defined, the start=, stop=, and cron= values are used.
Cron= Optional. Specify a time definition in minute hour day month
day-of-week format, where minute is from 0 to 59, hour is 0 to 23, day
Chapter 12. Agent autonomy
195
Example
<overrides>
<situation name="Check_Event" table="NT_Event_Log">
<threshold attr="Source"
value="Symantec Antivirus"
start="08:00" stop="17:00" />
</situation>
<situation name="NT_Available_Bytes_Critical" table="NT_Memory">
<threshold attr="Available_Bytes"
value="750000"
start="08:00" stop="17:30"
cron=" * * * * 1-5" />
</situation>
<situation name="NT_Disk_Space_Low">
<threshold name="FREEMGBTES"
value="10"
cron="31-59 8-20 */2 * *"
</threshold>
</situation>
<situation name="NT_Log_Space_Low">
<threshold name="USAGE"
value="75"
start="08:00" stop="18:00"
cron="* * * * MON,WED,FRI"
</threshold>
</situation>
<situation name="Message_Queue_Warning" table="Queue_Statistics">
<KEY column="ORIGINNODE" value=SYSG:NETQ3">
<threshold attr="Queue_Depth"
value="10"
cron="0-30 8-17 * 3,6,9,12 *"
</threshold>
</KEY>
</situation>
<situation name="NT_Process_CPU_Critical" table="NT_Process">
<KEY attr="Process_Name" value="_Total">
<threshold attr="%_Processor_Time"
value="70"
start="06:00" stop="21:30"
cron="* * * * 1-5" />
</KEY>
196
</situation>
<situation name="NT_System_File_Critical" table="NT_System">
<threshold attr="File_Data_Operations/Sec"
value="50000"
cron="* 6-22 * * SAT,SUN"
</threshold>
</situation>
<situation name="DISKFULL">
<key column="INSTCNAME" value="C:">
<threshold column="PCFREE">5</threshold>
</key>
<key column="INSTCNAME" value="D:">
<threshold column="PCFREE">10</threshold>
</key>
<default>
<threshold column="PCFREE">0</threshold>
</default>
</situation>
<situation name="Windows_Events">
<key column="SOURCE" value="MSFTPSVC">
<key column="EVENTID" value="10">
<threshold column="SOURCE">MSFTPSVC</threshold>
</key>
<key column="EVENTID" value="100">
<threshold column="SOURCE">MSFTPSVC</threshold>
</key>
</key>
<key column="SOURCE" value="EventLog">
<key column="EVENTID" value="6005">
<threshold column="SOURCE">EventLog</threshold>
</key>
<key column="EVENTID" value="6009">
<threshold column="SOURCE">EventLog</threshold>
</key>
</key>
<default>
<threshold column="SOURCE">NOPASS</threshold>
</default>
</situation>
</overrides>
SNMP alerts
Tivoli Enterprise Monitoring Agents and Tivoli System Monitor Agents can be
configured to send alerts to an SNMP receiver like Netcool/OMNIbus, using the
Netcool/OMNIbus SNMP Probe, or Tivoli NetView. Sample OMNIbus rules files
are provided to illustrate some key integration ideas.
197
i5/OS
The i5/OS agent can send SNMPv1/v2 traps, but it cannot send
SNMPv3 informs.
198
SNMP element
The SNMP element of the trap configuration XML specification is the top-level
XML element. TrapDest, TrapAttrGroup, and Situation are elements within the
SNMP begin and end tags.
<SNMP>
<TrapDest name="OMNIbus2" Address="nswin21a" Stat="Y" />
<situation name="*" target="OMNIbus2" />
</SNMP>
TrapDest element
Use TrapDest elements in a trap configuration XML file to define a trap receiver.
The TrapDest element requires the name and address attributes. Default values are
used for any other attributes that are not specified.
<TrapDest name=LABEL Address=HOSTNAME/>
199
200
Description
Required
Name=
Alphanumeric label
that is used to identify
the Trap Destination.
Required
Address=
Required
IP=
ip protocol: 4 | 6
4 is IPv4; 6 is IPv6
Optional
"4"
All
Port=
Optional
"162"
All
BindAddress=
Version=
Optional
v1
All
Type=
Optional
Matches
version
All
Stat=
Optional
Stat is used on a
destination to send all
status traps to that
receiver when
Stat=Y. Set Stat to
N to disable all
status alerts for the
TrapDest. Also, set it to
N if you want only a
subset of Status alerts
to be sent to the
TrapDest. Individual
Status Alerts can be
sent to specific
TrapDest using the
StatTrap element.
All
Default
SNMPv1/v2
or SNMPv3
Attribute
All
Description
Required
Default
SNMPv1/v2
or SNMPv3
Community=
Specify trap
community name
string. Should be
encrypted using
itmpwdsnmp, but
clear-text is also
allowed. (1-63
characters)
Optional
public
v1 and v2
SecModel=
Optional
USM
v3
SecLevel=
Specify the
Authentication and
Privacy levels. The
levels supported are:
noAuthNoPriv no
authentication and no
privacy
authNoPriv
authentication no
privacy
authPriv
authentication and
privacy (not supported
on z/OS monitoring
agents)
Required for
v3.
v3
User=
Required for
v3
v3
AuthType=
Specify the
authentication protocol.
The protocols
supported are: MD5
and SHA
Required for
v3 SecLevel=
authNoPriv
or authPriv
v3
AuthPassKey=
Specify the
authentication
password Should be
encrypted using
itmpwdsnmp, but
clear-text is also
allowed. (1-63
characters)
Required for
v3 SecLevel=
authNoPriv
or authPriv
v3
PrivType=
Required for
v3
SecLevel=
authPriv
v3
PrivPassKey=
Required for
v3
SecLevel=
authPriv
v3
201
Description
Required
Default
SNMPv1/v2
or SNMPv3
Timeout=
Optional
v3
Retries=
v3
Related reference
SNMP PassKey encryption: itmpwdsnmp on page 207
TrapAttrGroup element
Use the TrapAttrGroup element in a trapcnfg.xml file to specify which attributes
from an attribute group to include in situation event traps.
In this syntax example, situations written for the Windows OS Paging File attribute
group will send an SNMP trap with the server name, usage percentage and the
usage peak values to the event receiver.
<TrapAttrGroup Table="NT_Paging_File" TrapAttrList="Server_Name,
%_Usage,%_Usage_Peak" />
This element can be used to decrease the amount of attribute data sent in each trap
request, reduce the possibility of trap fragmentation, and reduce the received data
to include only what is relevant.
The TrapAttrGroup element sets the default attributes that will be sent for all
situation that run against the Table. Individual situations can override the
TrapAttrGroup settings by specifying a TrapAttrList attribute in the situation
element.
If a TrapAttrGroup element is not defined for an attribute table, all attributes in the
situation's data row are added to the sitAttributeList varbind of the traps sent for
situations based on this attribute table. Attributes used in the situation predicate
are added first and remaining attributes are added until the PDU maximum length
of 1500 bytes is reached.
Table 16. TrapAttrGroup element XML specification
Attribute
Description
Table=
TrapAttrList=
Situation element
Use situation elements in a trap configuration XML file to define the trap sent for
the situation.
202
The Situation element requires the name and target attributes. Default values are
used for any other attributes that are not specified. The * asterisk wildcard can be
specified for the situation name or target or both:
v Specifying the wildcard for situation name represents all situations. For example
the following line sends traps for all defined true situations to the defined
TrapDest named trapProbe1:
<situation name=* target=trapProbe1 />
v Specifying the wildcard for both situation name and target enables the sending
of all traps to all defined trap receivers.
v Named situations have precedence over wildcard definitions. If a situation
definition includes a wildcard and another situation definition names a situation
or the target, the first occurrence of the named situation definition is honored.
Example:
<TrapDest name="MyReceiver" Address="UAHOST1" Version="v1" />
<TrapDest name="OMNIbus1" Address="OMNIbus1" Version="v2"
Community="{AES256:keyfile:a}P0hUrmUhCgfFwimS+Q6w+w==" />
<TrapDest name="OMNIbus2" Version="v3" Address="9.42.10.164"
SecLevel="authPriv" User="SnmpUser" AuthType="SHA"
AuthPassKey="{AES256:keyfile:a}vgpNvf5Vx3XbPj1sKRRvYg==" PrivType="DES"
PrivPassKey="{AES256:keyfile:a}OK5YOWvRIkPOw9k4JRy9ag==" />
<situation name="*" target="OMNIbus2" />
<situation name="My_Missing_Process" target="MyReceiver" />
<situation name="NT_AA_Missing_Test" target="OMNIbus1" />
<situation name="NT_AA_Missing_Test" target="OMNIbus2" />
<situation name="NT_ABC_Missing_Test" target="*" />
Description
Required
Name=
Target=
Default
Required
203
204
Attribute
Description
Sev=
Cat=
Optional
Mode=
Optional
Used to specify behavior for
SNMP trap emission on sampled
situations. The standard modes
are:
RC Rising Continuous, whereby
traps are sent on each true
evaluation of a situation. (Pure
events are always RC.) No specific
clearing trap will be sent.
HY Hysteresis, whereby a trap is
sent the first time the sampled
situation evaluates as true. A
clearing trap will be sent once the
sampled value no longer meets
the criteria of the situation.
Hysteresis mode requires the
situation be named; not specified
with a * wildcard.
RC
Pred=
Optional
The situation predicate (formula)
is sent in the trap's
autoSit-Predicates varbind. The
Pred attribute allows you to omit
the situation predicate by setting
Pred=N. This can be useful if
you do not care to receive the
predicate or if a complex predicate
is taking up too much of the trap
PDU, and you want more room to
send situation attributes in the
sitAttributeList varbind.
Table=
Required
Default
Description
Required
TrapAttrList=
Optional
A comma delimited list of
attributes to be included in the
sitAttributeList varbind of the
traps sent for situation.
Values specified here will override
any TrapAttrList values specified
in a TrapAttrGroup element for
the table that the situation is
running against.
Default
Note: Situations for multiple-row attribute groups that include a display item are
limited to sending one trap for the first row that evaluates to true, but not for any
subsequent rows.
StatTrap
Use the StatTrap element in an SNMP trap configuration file to modify the default
configuration of the predefined agent life cycle status traps.
In this syntax example, the predefined trap for EE_HEARTBEAT was modified to
specify severity 1 (Indeterminate) for the event, a 30-minute sampling interval, and
trap category 3 (Status).
<StatTrap name="EE_HEARTBEAT" sev="1" interval="30" cat="3" />
There are eight predefined agent life cycle traps and their default values are given
in this table. By default, these traps are sent to all TrapDest trap destinations where
the Stat attribute is Y. If the Stat attribute is omitted from a TrapDest element the
default value is Y.
Table 18. Agent life cycle status traps
Attribute
Description
Severity
Category
EE_HEARTBEAT
1 Indeterminate
3 Status
EE_AUTO_ENTER
1 Indeterminate
3 Status
EE_AUTO_EXIT
1 Indeterminate
3 Status
EE_AUTO_USE_LIMIT
3 Status
EE_TEMS_RECONNECT
_LIMIT
3 Status
205
Description
Severity
Category
EE_TEMS_CONNECT
4 - Node
Configuration
EE_TEMS_DISCONNECT
1 Indeterminate
4 - Node
Configuration
EE_SIT_STOPPED
1 Indeterminate
4 - Node
Configuration
Description
Required
Name=
Optional
Target=
Required
Sev=
Optional
Varies
Cat=
Optional
Varies
Interval=
Optional
15 for
EE_HEARTBEAT
0 for all others
206
Default
Program Summary
Community strings encrypted 1
AuthPassKey strings encrypted 2
EncryptPassKey strings encrypted 1
Related reference
Trap configuration XML specification on page 199
TrapDest element on page 199
207
They are defined in the canbase.mib and cansyssg.mib files that are available on
the IBM Tivoli Monitoring IBM Tivoli Monitoring Agents installation media.
agentStatusEvent
The agentStatusEvent is a monitoring agent operational status information
trap generated by the Tivoli Autonomous Agent SNMP Event Exporter to
inform and notify about a specific agent operational event.
agentSitSampledEvent
A sampled situation event was detected. This trap was generated by the
Tivoli Autonomous Agent SNMP Event Exporter in response to a situation
threshold being exceeded at the time of the data sampling.
agentSitPureEvent
A pure situation event was detected. This trap was generated by the Tivoli
Autonomous Agent SNMP Event Exporter in response to a situation
threshold being exceeded. The variables in a pure event trap are identical
to those for a sampled event trap except there is no agentSitSampleInterval because pure events are not sampled; rather the arrival of
unsolicited data from the monitored attribute group causes the situation to
become true. A situation created with an attribute group for a system log,
for example, opens a pure event when a log entry arrives.
Related reference
MIB SNMP agent event descriptions
Procedure
1. Copy the Tivoli Monitoring rules file and lookup file.
a. Locate the mibs/sample_rules/omnibus directory on the Tivoli Monitoring
V6.2.2 Agents installation media.
208
Table definitions must appear at the start of a rules file, before any
processing statements. If you are adding this statement to mttrapd.rules,
position it after the comments at the head of the file and before the first
processing statement. The fully qualified filename must be enclosed in
double quotes. Environment variables like %OMNIHOME% or
$OMNIHOME can be used. The Linux and UNIX filename convention, with
the / forward slash to delimit the path, is also used by Windows.
c. Add the rules reference in the order in which it should be processed.
include "<path_to_rules_file>/
ibm-TIVOLI-CANSYSSG-MIB.include.snmptrap.rules"
This statement should be added in the rules file in the location where it
should be processed. For example, if adding the include to the default
mttrapd.rules file, you would want the default rules to first "Check if an
SNMPv2 trap and convert to SNMPv1 style tokens". The next block of code
in the default mttrapd.rules handles Generic traps. The include statement
for the ibm-TIVOLI-CANSYSSG-MIB.include.snmptrap.rules should go after
this, possibly as the last line of mttrap.rules. You will best know where to
include the rules if you are familiar with the SNMP Probe and your event
space.
3. Review and edit the SNMP Probe properties file:
a. Open $OMNIHOME/probes/arch/mttrapd.props in a text editor.
b. Set the Protocol property to UDP or ALL. Tivoli Monitoring SNMP alerts
are sent using UDP.
c. Set the RulesFile property if the default rules file for the probe is not
mttrapd.rules.
d. Set the MIBDirs property to the path where the mib files will reside.
4. Make the Tivoli Monitoring mib files available to the SNMP Probe:
a. Locate the mibs directory on the Tivoli Monitoring installation media.
b. Copy canbase.mib and cansyssg.mib, to the mib location specified in
mttrapd.props by the MIBDirs property.
c. The canbase.mib and cansyssg.mib include some common SNMP mibs.
These mibs must also be available to the SNMP probe:
RFC1155-SMI
RFC1213-MIB
SNMPv2-TC
RFC-1212
RFC-1215
If these mibs are not already present in the location specified in
mttrapd.props by the MIBDirs property, they are publicly available and can
be downloaded from the Internet.
Chapter 12. Agent autonomy
209
5. If you are integrating Tivoli Monitoring, Tivoli Business Service Manager, and
Netcool/OMNIbus, the Netcool/OMNIbus SNMP Probe rules should also
include an additional rules file, tbsm_snmp_event.rules, that sets the OMNIbus
BSM_Identity attribute. The mibs/sample_rules/omnibus/tbsm directory on the
Tivoli Monitoring Agent installation media (V6.2.2 and higher) contains the
tbsm_snmp_event.rules file and the readme file that describes how to use it
with the SNMP Probe and how to use the itm_tbsm_update.sql file to add the
BSM_Identity attribute to the Netcool/OMNIbus database schema.
Results
You should now have these files installed on the probe system:
ibm-TIVOLI-CANSYSSG-MIB.include.snmptrap.rules
ibm-TIVOLI-CANSYSSG-MIB.include.snmptrap.lookup
can*.mib files that are provided on the Tivoli Monitoring installation media
What to do next
To activate the new rules and begin receiving alerts from Tivoli monitoring agents,
recycle the SNMP Probe.
210
Because the AlertKey is included in the information that is used to construct the
Identifier, you might encounter truncation problems with 255-character AlertKeys
used to create your Identifier.
As implemented in the ibm-TIVOLI-CANSYSSG-MIB.include.snmptrap.rules:
@Identifier = @Node + " " + @AlertKey + " " + $autoSit-Category + " " + @Type
" " + @Agent + " " + @Manager + " " + $specific-trap
Size
32
31
13
6 space delimiters
6
Total 87
This leaves 168 characters for the @AlertKey (255-87=168). If @AlertKey is defined
as $agentSit-Name + " (" + $sitDisplayItem + ")", then $sitDisplayItem must be
less than 133 characters (168-35=133).
Field
Size
agentSit-Name
32
space delimiter
parentheses
2
Total 35
Situations written for attribute groups (such as Event Log) that generate pure
events can be deduplicated by using the $agentSit-Name, but many might require
additional information to uniquely identify the event. Use the $sitDisplayItem
attribute to construct this additional data. The AlertKey will then be
$agentSit-Name + " (" + $sitDisplayItem + ")"
Use case statements based on the $agentSit-Table field to identify all events based
on a specific table.
Use case statements based on the $agentSit-Name if individual situations need
unique $sitDisplayItems.
211
The extract command can be used to extract the value of any of the name value
pairs from the $sitAttributeList using regex pattern matching. An example is
provided in the Sample rules for agentSitPureEvent traps based on the
NTEVTLOG $agentSit-Table.
$sitDisplayItem=extract($sitAttributeList,"Description=.(.+).;.*?")
This command extracts the value of the Description key and removes the quotes.
Compatibility notes
@ExtendedAttr
OMNIbus V7.2 and greater defines the @ExtendedAttr column in the
ObjectServer. The nvp functions are provided to allow manipulation of
name-value pairs in the @ExtendedAttr alert field. The sitAttributeList
varbind is formatted to allow direct mapping into the @ExtendedAttr, but
this function is commented out to allow the rules to parse when the
MTTRAPD probe connects to an OMNIbus ObjectServer V7.0 or V7.1.
Uncomment the two lines in the ibm-TIVOLI-CANSYSSGMIB.include.snmptrap.rules file that set @ExtendedAttr if you are
forwarding events to OMNIbus V7.2 or greater.
#
@ExtendedAttr = $sitAttributeList
@Class
The @Class alert field is used to associate Tivoli Netcool/OMNIbus Tools
with Events displayed in the Tivoli Netcool/OMNIbus EventList.
For Tivoli Netcool/OMNIbus 7.2x and below, see the Netcool/OMNIbus
documentation for more information on creating and editing classes. By
default, these class values are not defined in your ObjectServer.
Setting @Class to a value that is not defined in the OMNIbus ObjectServer
causes no problems, but if you prefer to not set the @Class, uncomment
this line in the ibm-TIVOLI-CANSYSSG-MIB.include.snmptrap.rules file to
clear the @Class field before the event is forwarded to OMNIbus.#
@Class = ""
Procedure
1. Copy itm_heartbeat.sql from the Tivoli Monitoring Agent Support DVD
mibs/sample_rules/omnibus directory.
212
2. Place the copy in the Netcool/OMNIbus installation path and run the following
command:
Where user is a valid user name, password is the corresponding
v
password, and server is the ObjectServer name
%NCHOME%\bin\redist\isql.exe -U "user" -P "password" -S "server"
< itm_heartbeat.sql
Results
After the OMNIbus automation is installed, the automation registers the heartbeats
from managed systems as they arrive. Individual heartbeats are no longer
displayed and counted in the event console but, if an expected heartbeat is
overdue, the automation raises a Heartbeat missing alert with:
Summary = Heartbeat Missed for: + heartbeat_missed.Node +
last received at + to_char(heartbeat_missed.LastOccurrence)
What to do next
The default interval for sending the EE_HEARTBEAT status 15 minutes. You can
adjust the value by modifying the interval attribute for the heartbeat status event
in the trapcnfg.xml file for SNMP alerts and in the eifdest.xml file for EIF events
configuration file.
Especially with SNMP, one missed heartbeat does not necessarily indicate a
problem, thus the default is to raise an alert after the heartbeat is overdue: (2 x
heartbeat interval ) + 2 minutes. You can edit this in the itm_heartbeat.sql with the
entry,
-- 2 heartbeats plus 2 minutes grace before agent missed
set time_of_expiry = (new.ExpireTime * 2 * 60 + 120) + getdate();
For example, add two more minutes and the setting looks like this:
-- 2 heartbeats plus 4 minutes grace before agent missed
set time_of_expiry = (new.ExpireTime * 2 * 60 + 240) + getdate();
Related reference
EIF life cycle event on page 224
EIF heartbeat event on page 225
EIF events
Send private situation events directly from a Tivoli Monitoring Agent to an EIF
receiver without going through the Tivoli Enterprise Monitoring Server.
Related concepts
Situation event integration with Tivoli Enterprise Console
213
214
If you create a user defined event mapping file, store it in the following
location:
ITM_dir\localconfig\pc\pc_eventmap.map
ITM_dir/localconfig/pc/pc_eventmap.map
RKANDATV, with file name PCEVMAP
Sample event map configuration file:
<?xml version="1.0" encoding="UTF-8"?>
<itmEventMapping:agent>
<event_mapping>
<situation name="Flipper*" mapAllAttributes="Y">
<class name="ITM_ABC"/>
<slot slotName="msg">
<literalString value="The time now is
$Local_Time.Timestamp.TIMESTAMP$ on $hostname$"/>
</slot>
</situation>
</event_mapping>
</itmEventMapping:agent>
Heartbeat event of agent's online status sent to the EIF event receiver
The EventDest configuration XML file has an optional element for
specifying a heartbeat interval. After each interval, the agent status is
tested and the result then sent as online-offline status to the EIF receiver
(or receivers) specified in the EventDest file.
Tivoli Enterprise Monitoring Agents installed before Version 6.2.2 Fix Pack 1
When a Tivoli Monitoring OS agent of Version 6.2.2 Fix Pack 1 (or later)
has been installed, any Tivoli Enterprise Monitoring Agents installed on
that computer are eligible to use the autonomous EIF event forwarding
feature, even if they were installed prior to Version 6.2.2 Fix Pack 1. Be
aware, however, that monitoring agents that were installed before Version
6.2.2 Fix Pack 1 need some files that were not included in the agent install
bundle but that are part of the application support provided for a Tivoli
Enterprise Monitoring Server installation: the baroc file, optional event
mapping file, and resource bundle files. For these earlier version agents to
use the EIF facility to forward events, the following steps must be taken:
1. Install the earlier version agent in a monitoring server environment to
access the baroc and optional event mapping files. The agent
predefined baroc and optional event mapping files can be found in the
Install_dir/CMS/TECLIB or Install_dir/CNPS/teclib directory.
2. Copy the provided kpc.map event mapping file, if any, to the EIFLIB
directory of the agent installation.
3. If the Tivoli Enterprise Console event server is used as an event
receiver, copy the baroc file for each agent to the system where the
event server is installed. Compile and load the baroc on the event
server.
Agents running within the hub Tivoli Enterprise Monitoring Server Address
Space on z/OS
On z/OS systems it is possible to configure agents to run within the same
address space of the hub monitoring server. Because the EIF event
forwarder function (OTEA) can also be enabled at the hub monitoring
server, some precautions must be taken to avoid the cross interference
between the Event Forwarder at the hub monitoring server and the EIF
event export directly from the monitoring agent. One area that can have
potential overlap is a custom event mapping file. Currently on the hub
monitoring server, users can code their own event mapping (in addition to
Chapter 12. Agent autonomy
215
those that can be created using the Tivoli Enterprise Portal Situation editor
and stored in a monitoring server table). The name of these map files must
be in the form, QxxMAP (where xx is any two alphanumeric characters)
and reside in the RKANDATV dataset. In order to support user defined
event mapping files for autonomous agents, which also reside in the
RKANDATV data set, a different naming convention must be adopted. For
user defined event mapping files for autonomous agents, the file naming
convention is pcEVMAP (where PC is the 2 letter agent product code).
Elements
The elements and their attributes are case-insensitive. For example, you can enter
DEFAULT=, Default=, or default=.
<itmEventMapping:agent>
itmEventMapping:agent is the root element identifying this as an event
mapping definition for the monitoring agent.
<id>
Syntax:
<id>pc</id>
ID is the two character product code, such as UX for the UNIX OS agent.
For user defined event maps, it is recommended to use 99 as the id.
216
<version>
Syntax:
<version>nnnn</version>
Optional. Use this element to specify the version of the event mapping file.
<valueList>
Syntax:
<valueList name=valueListName>
Optional. Use the valueList element to define a value list of one or more
value items where valueListName is the name of the list.
<valueItem>
Syntax:
<valueItem name=item_value>
217
name= specifies the EIF class name to be used for the generated EIF
event. The eif_class_name string can contain a substitution variable
(attribute name) to generate EIF class names that are dynamic
depending on the value of the named attribute during runtime. See
Dynamic EIF classname on page 219.
valueList= specifies a valueList to be searched for dynamic EIF class
name generation.
defaultClass= specifies the default EIF class name to be used for the
EIF event if the eif_class_name string contains a substitution variable
but the value of the attribute has no match in the specified valueList.
<slot> Syntax:
<slot name=slot_name>
Optional. Define a slot in the EIF event. The name of the slot is the
slot_name.
<mappedAttribute>
Syntax:
<mappedAttribute name=attribute_name [multiplier=nnn]>
Optional. Specify the value source for the slot being defined. This is the
value of the attribute with the name attribute_name in the event data, if
available. Otherwise, a null value is used. If the multiplier= attribute is
specified and the value of the attribute is numeric, the value assigned for
the slot is the attribute value multiplied by the number specified.
<mappedAttributeEnum>
Syntax:
<mappedAttributeEnum name=attribute_name>
Optional. Use the text as the value for the slot being defined. When
defining a msg slot, you can specify variable substitution within the text
(described next).
218
$AttrGroup.Attribute$
Attribute substitution requires a fully qualified name (i.e. both attribute
group and attribute name separated by a period). The variable token will
be replaced by the value of the named attribute in the event data. If the
named attribute cannot be found in the event data, a null string will be
used.
$AttrGroup.Attribute.TIMESTAMP$
This is the same as the $AttrGroup.Attribute$ syntax but with a
.TIMESTAMP suffix qualifier. This is an indication to the EIF event
forwarder that the attribute value is a time stamp (defined as a timestamp
type in the attribute file) and should be formatted as a displayable
timestamp format: MM/DD/YYYY HH:MM:SS. If the attribute value is not
a valid timestamp, the raw attribute value will be used.
$slotname$
Event slot substitution replaces the variable token with the value of the
named slot after event mapping has been performed.
The following is an example taken from a predefined event mapping file where the
msg slot is customized for DM parity.
<slot slotName="msg">
<literalString value="Distributed Monitoring $sub_source$/$monitor$
on host $hostname$ $NT_LogicalDisk.Timestamp$"/>
</slot>
If the value for the sub_source and monitor slots have values tmpdisk and Disk
Read Bytes/sec, the msg slot text is similar to this example:
Distributed Monitoring tmpdisk/Disk Read Bytes/sec on host
elaix04 08/14/2009 10:23:11
219
uses the defaultClass= attribute if one is specified. Otherwise, it uses the EIF event
class of the EIF event last sent for the same situation name.
This is the relevant part of a sample event mapping definition uses to map a
situation event Test_Syslog to a set of EIF events based on the value of the
Message_Number attribute.
<situation name="Test_Syslog">
<class name=SAP_Syslog_$R/3_System_Log.Message_Number$
valueList=SyslogIDList defaultClass=SAP_Syslog_Default />
:
:
</situation>
This example has a SyslogIDList value list with valueItems AB0, AB1, A08, BV7,
EAS, and R45 and a Test_Syslog situation that monitors for message IDs AB0,
AB1, AB2, BV7, and BV8, The Test_Syslog situation evaluates to true for each of
these message ids. The generated EIF events are of the following classes:
1. AB0: SAP_Syslog_AB0 x
2. AB1: SAP_Syslog_AB1
3. AB2: SAP_Syslog_Default
4. BV7: SAP_Syslog_BV7
5. BV8: SAP_Syslog_Default
Normalizing the attribute value
A variable within the EIF event class name can reference any valid attribute in the
event whose value might contain characters that are not valid for use in an EIF
event class name. Before performing variable substitution in the event class name,
the EIF event forwarder replaces any UTF-8 multi-byte characters and invalid
characters with a single _ underscore. For example the white space characters, < >
( ) & /, are replaced by the _ underscore character.
Example
<itmEventMapping:agent
xmlns:itmEventMapping="http://www.ibm.com/tivoli/itm/agentEventMapping"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.ibm.com/tivoli/itm/agentEventMapping
agentEventMap.xsd">
<id>NT</id>
<version>6.2.0</version>
<event_mapping>
<situation name="NT_LDDBPS*">
<class name="w2k_LogDskDskBytesPerSec"/>
<slot slotName="source">
<literalString value="SENTRY"/>
</slot>
<slot slotName="probe">
<literalString value="DskBytesPerSec"/>
</slot>
<slot slotName="probe_arg">
<mappedAttribute name="NT_Logical_Disk.Disk_Name"/>
</slot>
<slot slotName="collection">
<literalString value="w2k_LogicalDisk"/>
</slot>
<slot slotName="monitor">
<literalString value="Disk Bytes/sec"/>
</slot>
<slot slotName="units">
<literalString value="(per second)"/>
220
</slot>
<slot slotName="value">
<mappedAttribute name="NT_Logical_Disk.Disk_Bytes/Sec"/>
</slot>
<slot slotName="effective_value">
<mappedAttribute name="NT_Logical_Disk.Disk_Bytes/Sec"/>
</slot>
<slot slotName="msg">
<literalString value="Distributed Monitoring $sub_source$/Disk
Bytes/sec on host $hostname$ $NT_Logical_Disk.Timestamp.TIMESTAMP$"/>
</slot>
</situation>
</event_mapping>
</itmEventMapping:agent>
Sample EIF files are provided on the Tivoli Monitoring Agent installation media in
the PrivateConfigSamples/EIF directory.
Related reference
UTF-8 encoded XML files on page 170
Elements
The elements and their attributes are not case-sensitive. For example, you can enter
EVENTDEST=, EventDest=, or eventdest=.
<EventDest>
EVENTDEST is the root element identifying this as an event destinations
definition for the monitoring agent.
<Destination>
Start of an event destination definition. Specify the destination index.
Optional attributes enable you to specify the destination type, a default
server, the maximum cache file size, and the option to clear the cache file
on restart.
id= Destination index, from 0 to 999. Default: 0
type= Optional. Destination type: T=Tivoli Enterprise Console;
M=Netcool/OMNIbus. The maximum event size generated will be 4K
and 32K for type=T and type=M, respectively. Default: T
default= Optional. The server entered here is designated as the default
destination. Default: N
clear_cache= Optional. Use this attribute to specify whether the existing
EIF cache file should be cleared when the destination is instantiated.
clear_cache=Y will cause the EIF event cache file to be cleared. On
z/OS systems, the EIF event cache is always cleared because z/OS EIF
supports only an in core event cache. Default: Y
max_cache_size= Optional. Specifies the maximum event cache physical
file size in kilobytes. Default: 4096
stat= Optional. Specify whether the destination shall receive life cycle
events. Default: N
master_reset= Optional. Specify whether a master reset event shall be
sent during agent startup. Default: N
Chapter 12. Agent autonomy
221
<Server>
Defines the event servers for the destination: one primary and up to seven
secondary servers. Specify each event server hostname or IP address and
the port. The first <server> definition is the primary listener. Any
additional <server> definitions are backup servers.
location= Specifies the hostname or IP address of the event listener.
port= Optional. Specifies the listening port of the event listener. A
setting of port=0 applies only to Tivoli Enterprise Console on Linux or
operating systems such as UNIX and indicates that the event listener is
using portmapper. Default: 0
<StatEvent>
Optional. Use the StatEvent element to send the online or offline status of
the agent to the event server. By default, heartbeat monitoring is disabled.
name= Specifies the name of the heartbeat event.
interval= Optional. The interval, expressed in minutes, at which the
heartbeat event is sent. A zero interval means no heartbeats are to be
sent. Default: 15.
Examples: Both stanzas name the heartbeat event, EE_HEARTBEAT. The
first stanza specifies a 5-minute interval and the second stanza disables the
heartbeat event.
<StatEvent name="EE_HEARTBEAT" interval="5"/>
<StatEvent name="EE_HEARTBEAT" interval="0"/>
Example
The following example is an event destination configuration file containing two
event destinations:
<EventDest>
<Destination id=0 type=M stat="Y" master_reset="Y">
<Server location=omniserver.ibm.com port=9999 />
<Server location=192.0.2.1 port=9999 />
<StatEvent name="EE_HEARTBEAT" interval="5"/>
</Destination>
<Destination id=1 type=T default="Y" master_reset="Y" stat="Y">
<Server location=tecserver.ibm.com port=5529/>
<StatEvent name="EE_HEARTBEAT" interval="5"/>
</Destination>
</EventDest>
Sample EIF files are provided on the Tivoli Monitoring Agent installation media in
the PrivateConfigSamples/EIF directory.
222
Related reference
UTF-8 encoded XML files on page 170
EIF heartbeat event on page 225
adapter_host
appl_label
cms_hostname
cms_port
fqhostname
hostname
integration_type
master_reset_flag
223
Table 20. Set of common slots for emitted EIF events. (continued)
Slots
msg
origin
severity
situation_displayitem
situation_eventdata
Raw situation event data starting from the second event data
row, if any. Event data attributes are in key-value pair
format. The event data can be truncated because of the total
event size and slot size limit, which is 2 KB.
situation_group
situation_fullname
situation_name
situation_origin
situation_status
situation_time
situation_type
situation_thrunode
source
sub_origin
sub_source
224
Event
Meaning
EE_HEARTBEAT
Agent heartbeat.
Meaning
EE_AUTO_ENTER
EE_AUTO_EXIT
EE_TEMS_CONNECT
EE_TEMS_DISCONNECT
EE_TEMS_RECONNECT_LIMIT
EE_SIT_STOPPED
All life cycle EIF events are ITM_StatEvent, which is a derived class of Event, with
the following slot values:
Table 22. EIF life cycle event ITM_StatEvent class slot values.
Slot
Value
source
appl_label
hostname
fqhostname
origin
situation_name
situation_time
date
severity
HARMLESS
msg
Related tasks
Enabling OMNIbus heartbeat automation on page 212
225
tools DVD that is included with the event server installation media. Status events
are kept separate from situation events so that rules can be written to apply only
to the specific class or type.
Example: The ITM_Heartbeat EIF event has a 1-minute interval (interval=1;
and situation_eventdata=1;) and is characterized as a Heartbeat Event:
ITM_Heartbeat;
interval=1;
source=ITM Agent: Heartbeat Event;
sub_source=EE_HEARTBEAT;
situation_name=**;
situation_origin=SuperServer:TEST;
situation_time=09/30/2009 09:03:24.000;
situation_eventdata=1;
appl_label=A:P:L;
hostname=SuperServer.raleigh.ibm.com;
fqhostname=SuperServer.raleigh.ibm.com;
origin=9.25.111.201;
severity=HARMLESS;
date=09/30/2009;
msg=Heartbeat Message;END
Related tasks
Enabling OMNIbus heartbeat automation on page 212
Related reference
EIF event destination configuration XML specification on page 221
226
Slot
Value
source
appl_label
A:P:S
master_reset_flag
hostname
fqhostname
origin
situation_name
**
situation_origin
situation_time
date
Date of event
situation_status
severity
MINOR
msg
Procedure
1. Start the IBM Tivoli Monitoring Service Index by entering http://<host
name>:1920 or https//<host name>:3661, where host name is the fully qualified
name or IP address of the computer where the agent is installed. A list of the
started services is displayed.
2. Click the pc Agent Service Interface (where pc is the two-character component
code) link for the application to work with.
3. As prompted, enter the administrator-level user name and password for the
operating system.
Results
After you have been authenticated, the Agent Service Interface Navigator page is
displayed with links to Agent Information, Situations, History, Queries, and
Service Interface Request. The Navigator page is the navigator.htm file that is
installed at this location by default:
Install_dir\localconfig\html
Chapter 12. Agent autonomy
227
Install_dir/config/HTML
Monitoring agents that use subnodes, such as Agentless Monitors, VMware VI
Agent, and subnodes created with Agent Builder, have some reporting limitations
in the Agent Service Interface:
v Queries link is unavailable
v Situations listing shows all the situations for an agent, including the subnodes;
filtering by subnode is not available
v Private history shows all the collected historical data for the selected attribute on
the agent, including any subnodes; filtering by subnode is not available.
228
Table 24. Access Authorization Group permissions for Service Interface commands
Service Interface API Restricted
Operation
Administrative
AgentInfo
AttrList
ReadAttr
ListSubnode
TableSit
SitStat
SitSummary
HistRead
Report
PvtControl
CnfgCommand
ConfigurationArtifact
PrivateConfiguration
Overrides
AAGP
FileObj
The Restricted group definition is required. If it is not included in the AAGP, the
agent default specification shown in Table 24 is in effect.
Specifying the keyword *NONE for a component category prohibits all non-explicit
users from accessing that component service. For example, <SIAPI>*NONE</SIAPI>
specified in Restricted group disallows general access to the Agent Service
Interface.
FileObj allows you to push or pull files on an agent using an HTTP request. For
Centralized Configuration, FileObj is the API that is used to allow a monitoring
agent to act as a central configuration server. The Agent Service Interface is
available in the basic services of the monitoring agent and can be used to serve
files or you can send HTTP requests to any agent to push or pull files. The AAGP
function provides additional security. By default, only root on Linux or UNIX and
Administrator on Windows are members of the AD group that has permission to
use the FileObj API. See the example in Monitoring agent as the central
configuration server on page 259.
If the AAGP contains no <AAGROUP> specification, the agent default specification
shown in Table 24 is in effect. Valid groups are RE, OP, and AD. There is no need
to define R (restricted) group users because all users are automatically assigned to
the Restricted group unless otherwise defined by the AAGP.
229
and end </AAGP> root-level element tags. The contents of the AAGP file are
merged with the existing AAGP being used by the agent and you can add
users to the default Access Authorization Groups. If you prefer to completely
replace the existing AAGP, use the REFRESH attribute with the AAGP element:
<AAGP REFRESH=Y> Deletes the current active AAGP and replaces it with
the AAGP definition from this AAGP specification.
<AAGROUP>
Defines an Access Authorization Group. Begin <AAGROUP> and end
</AAGroup> element tags enclose a set of group definitions.
<GROUPNAME>
Defines the Access Authorization Group name. Specify the name between
begin <GROUPNAME> and end </GROUPNAME> element tags. The group
name can be up to 32 characters and the first two characters must be unique
among all user group names.
<INCLUDE>
Optional. Specifies the AAGROUP definitions to be included in this
AAGROUP. Enclose the AAGROUP name within begin <INCLUDE> and end
</INCLUDE> tags.
<SIAPI>
Specifies the agent Service Interface API name and is not case-sensitive. Only
the component category is defined at this time. Enclose the name within begin
<SIAPI> and end </SIAPI> tags.
<other>
The <other> element is not available in the current release; it is reserved for
future use. It specifies the other agent component services to be managed.
<AAUSER>
Defines an authorized user ID and its associated Access Authorization Group
by name. Enclose each user definition within begin <AAUSER> and end
</AAUSER> tags.
<ID>
Specifies an authorized user sign-on ID and is not case-sensitive. Enclose the
user ID within begin <ID> and end </ID> tags.
<ASSIGN>
Specifies the Access Authorization Group assignment and is not case-sensitive.
Valid AAGP types are RE (Restricted), OP (Operation), and AD
(Administrative). You can enter the full group name or the first character.
Enclose the AAGP type within begin <ASSIGN> and end </ASSIGN> tags.
Example
<AAGP>
<AAGROUP>
<GROUPNAME>Restricted</GROUPNAME>
<SIAPI>AgentInfo</SIAPI>
<SIAPI>AttrList</SIAPI>
<SIAPI>ReadAttr</SIAPI>
<SIAPI>ListSubnode</SIAPI>
<SIAPI>TableSit</SIAPI>
<SIAPI>SitStat</SIAPI>
<SIAPI>SitSummary</SIAPI>
<SIAPI>HistRead</SIAPI>
<SIAPI>Report</SIAPI>
</AAGROUP>
<AAGROUP>
<GROUPNAME>Operation</GROUPNAME>
230
<INCLUDE>Restricted</INCLUDE>
<SIAPI>PvtControl</SIAPI>
<SIAPI>CnfgControl</SIAPI>
<SIAPI>CnfgCommand</SIAPI>
<SIAPI>configurationArtifact</SIAPI>
<SIAPI>PrivateConfiguration</SIAPI>
<SIAPI>Overrides</SIAPI>
</AAGROUP>
<AAGROUP>
<GROUPNAME>Administrative</GROUPNAME>
<INCLUDE>Operation</INCLUDE>
<SIAPI>FileObj</SIAPI>
<SIAPI>AAGP</SIAPI>
</AAGROUP>
<AAUSER>
<ID>dyang</ID>
<ASSIGN>OP</ASSIGN>
</AAUSER>
<AAUSER>
<ID>ksmith</ID>
<ASSIGN>OP</ASSIGN>
</AAUSER>
<AAUSER>
<ID>jmlake</ID>
<ASSIGN>AD</ASSIGN>
</AAUSER>
<AAUSER>
<ID>tcharris</ID>
<ASSIGN>OP</ASSIGN>
</AAUSER>
<AAUSER>
<ID>acwills</ID>
<ASSIGN>Operation</ASSIGN>
</AAUSER>
</AAGP>
231
5. The monitoring agent checks for AAGP updates periodically as specified in the
configuration load list or when the Service Interface configuration command is
issued.
6. The monitoring agent does not save or store the User Authorization Profile
locally.
232
* CSV2_PATH=d:\IBM\ITM\GSK7\bin
* KBB_VARPREFIX=$
* PATH!=$(CSV1_PATH);$(CSV2_PATH);$(PATH)
* KEYFILE_DIR=d:\IBM\ITM\keyfiles
* KDEBE_KEYRING_FILE=d:\IBM\ITM\keyfiles\keyfile.kdb
* KDEBE_KEYRING_STASH=d:\IBM\ITM\keyfiles\keyfile.sth
* KDEBE_KEY_LABEL=IBM_Tivoli_Monitoring_Certificate
* KBB_IGNOREHOSTENVIRONMENT=Y
* JAVA_HOME=d:\IBM\ITM\java\java50\jre
* KBB_IGNOREHOSTENVIRONMENT=N
* PATH=d:\IBM\ITM\GSK7\LIB;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\
System32\Wbem;D:\IBM\SQLLIB\BIN;D:\IBM\SQLLIB\FUNCTION;D:\IBM\SQLLIB\
SAMPLES\REPL;d:\IBM\ITM\bin;d:\IBM\ITM\bin\dll;d:\IBM\ITM\InstallITM;
d:\IBM\ITM\TMAITM6;d:\IBM\ITM\InstallITM
INTERVAL
The interval between data samples, in seconds. If situations for this
attribute group trigger pure events, there is no sampling interval and the
value shows as 0.
ROWSIZE
This is the row size.
FIRSTSTARTTIME
This is the day of the week, calendar day, and time when the situation is
initially started after the agent starts.
LASTSTARTTIME
This is the day of the week, calendar day, and time when the situation was
most recently started.
LASTSTOPTIME
This is the day of the week, calendar day, and time when the situation was
most recently stopped.
FIRSTEVENTTIME
This is the day of the week, calendar day, and time of the first occurrence
that the situation became true and opened an event since the situation was
started.
LASTTRUETIME
This is the day of the week, calendar day, and time when the situation
most recently became true and opened an event.
233
LASTFALSETIME
This is the day of the week, calendar day, and time when the situation
state evaluated to false after an earlier sampling evaluated to true.
TIMESRECYCLED
This is the number of times the situation was stopped and started since the
agent has been online.
TIMESAUTONOMOUS
This is the number times since startup that the situation entered
autonomous state because the enterprise monitoring agent was
disconnected from its monitoring server, followed by the DAY statistics:
DAY
DATE that the most recent statistical data was collected. If this is an
enterprise situation, this is since the agent was most recently connected.
TRUESAMPLES is the number of times the situation evaluated to true
while the agent was disconnected from the monitoring server.
FALSESAMPLES is the number of times the situation evaluated to false
after a prior true while the agent was disconnected from the monitoring
server.
TRUERATIO is the percentage of the number of times the situation
evaluates to true compared with the false state.
FALSERATIO is the percentage of the number of times the situation
evaluates to false compared with the true state.
HOURROWS is the number of rows of data that have been reported.
HOURTRUE is the number of hours that the situation remained true
while the agent was disconnected from the monitoring server.
HOURFALSE is the number of hours that the situation remained false
while the agent was disconnected from the monitoring server.
All situations are shown for an agent, including the subnodes. In this sample
TestLab agent with subnodes called ComputerA and ComputerB, ten situations
would be listed:
TestLab
SubNodeA (4 unique situations, plus 2 situations that are also on
SubNodeB)
SubNodeB (4 unique situations, plus 2 situations that are also on
SubNodeA)
Related reference
Private situation XML specification on page 175
234
All collected historical data is shown for the agent, including any subnodes.
Related reference
Private history on page 190
Private situation XML specification on page 175
Table name
This is the table name for the attribute group taken from the
<install_dir>/TMAITM6/ATTRLIB/kpc.atr file (where pc is the two-character
product code).
Name This is the column name for the attribute. It is not used in private
situations or private history, but is what you would see if you were to look
up the stored data in the Tivoli Data Warehouse.
Display
This is the detailed name of the attribute, formatted as
Attribute_Group_Name.Attribute_Name, and is what you enter in the private
situation and private history definitions. For example,
KHD_CONFIG.Connection_Pool_Size or NT_Registry.Server_Name.
Type
Length
This is the number of bytes or maximum number of bytes possible for the
attribute value. For TIMESTAMP attributes, 16 indicates the following
format: CYYMMDDHHMMSSmmm, such as 1090819160501000 for the 21st
century on August 19, 2009 at 4:05:01 PM
Minimum
The lowest possible value for the attribute is displayed here. If the field is
empty, there is no minimum value for the attribute.
Maximum
The highest possible value for the attribute is shown in this column. If the
field is empty, there is no maximum value for the attribute.
ENUMS
This is the enumeration and what it represents for an attribute. Some
enumerated attributes have multiple enumerations. When composing a
private situation for an enumerated attribute, use the actual value in the
formula and not the display value (what you would see in the Tivoli
Enterprise Portal).
These two reports show the results of a query to the Windows IP Address attribute
group, table name NTIPADDR. The first report is a listing of the attributes in the
table as they appear in the kpc.atr file. When creating private situations or private
history definitions, you must use the name shown in the Display column.
Chapter 12. Agent autonomy
235
Display
Type
Length
ORIGINNODE
NT_IP_Address.System_Name
64
TIMESTAMP
NT_IP_Address.Timestamp
16
INTFNAME
NT_IP_Address.Network_
Interface_Name
IPADDRESS
NT_IP_Address.IP_Address
50
DNSNAME
NT_IP_Address.DNS_Name
10
388
IPVERSION
NT_IP_Address.IP_Version
MACADDRESS
NT_IP_Address.MAC_Address
Minimum
Maximum
ENUMS
No DNS Entry
-2147483648
2147483647 4 IPv4
6 IPv6
10 IPv4_IPv6
28
The second report is displayed with the current sampled values of the attribute
group.
Table 26. Agent Service Interface - Queries sample report
ORIGINNODE
TIMESTAMP
INTFNAME
IPADDRESS DNSNAME
IPVERSION MACADDRESS
Primary:East:NT 1090819142128111
11a_b_g
Wireless
LAN Mini
PCI Adapter
9.52.100.111
East.ibm.com
00054e48f5bd
Primary:East:NT 1090819142128111
MS TCP
Loopback
interface
127.0.0.1
NO_DNS_
ENTRY
000d608b2938
Request input
Table 27. Agent Service Interface <AGENTINFO> request.
Tag
Description
<AGENTINFO>
Sample request:
<AGENTINFO>
</AGENTINFO>
236
Report output
Table 28. Agent Service Interface <AGENTINFO> request output.
Output tag
Description
<HOSTNAME>
<NODENAME>
<SUBSYSID>
Agent Subsystem ID
<NODEINFO>
<PRODUCT>
<VERSION>
Agent version
<LEVEL>
<PATCHLEVEL>
<AFFINITY>
<BOOTTIME>
<ENVFILE>
<STATUS>
237
C:\WINDOWS\System32\Wbem;c:\perl\bin;C:\Infoprint;
C:\IBM\ITM\InstallITM ]]>
</ENVFILE>
</AGENTINFO>
Request input
Table 29. Agent Service Interface <LISTSUBNODE> request.
Tag
Description
<LISTSUBNODE>
Sample request:
<LISTSUBNODE>
</LISTSUBNODE>
Report output
Table 30. Agent Service Interface <LISTSUBNODE> request output.
Output tag
Description
<SUBNODELIST>
Subnode list.
<NODECOUNT>
Subnode count.
<NAME>
Subnode name.
Sample output: The agent returns a listing of all known subnodes of the agent
<SUBNODELIST>
<NODECOUNT>3</NODECOUNT>
<NAME>dyang7ASFSdp:UAGENT00</NAME>
<NAME>dyang7:TS100</NAME>
<NAME>dyang7:TS200</NAME>
</SUBNODELIST>
Request input
Table 31. Agent Service Interface <ATTRLIST> request.
Tag
Description
<ATTRLIST>
Sample request:
<ATTRLIST>
</ATTRLIST>
238
Report output
Table 32. Agent Service Interface <ATTRLIST> request output.
Output tag
Description
<LISTATTRFILE>
<ATTRCOUNT>
<NAME>
Sample output: The agent returns a listing of all known attribute files that are
available on the computer
<LISTATTRFILE>
<ATTRCOUNT>16</ATTRCOUNT>
<NAME>DM3ATR00</NAME>
<NAME>TS1ATR00</NAME>
<NAME>TS2ATR00</NAME>
<NAME>UAGATR00</NAME>
<NAME>kdy.atr</NAME>
<NAME>khd.atr</NAME>
<NAME>kib.atr</NAME>
<NAME>knt.atr</NAME>
<NAME>kr2.atr</NAME>
<NAME>kr3.atr</NAME>
<NAME>kr4.atr</NAME>
<NAME>kr5.atr</NAME>
<NAME>kr6.atr</NAME>
<NAME>ksh.atr</NAME>
<NAME>ksy.atr</NAME>
<NAME>kum.atr</NAME>
</LISTATTRFILE>
Request input
Table 33. Agent Service Interface <READATTR> request.
Tag
Description
<READATTR>
<ATTRFILE>
Report output
Table 34. Agent Service Interface <READATTR> request output.
Output tag
Description
<ATTRFILE>
<ATTRDATA>
239
<ATTRFILE>TS2ATR00</ATTRFILE>
<ATTRDATA>
<![CDATA[//1090428005244020 TS200/06.00.00
//Generated by Universal Agent
//
entr ATTR
name TS2TCPIOQ00.Node_Name
affi 0000000000000080000000000000000000000000000
acod TS200
usag I
appl TS200
stmp 1090428005244020
cvrm 06.00.00
lvrm 06.00.00
tabl TS24601600
mult 1
samp 3
colu ORIGINNODE
type 2
slng 32
msid KUM0000
opgr 0
atid 065535
//entr ATTR
name TS2TCPIOQ00.LocalApplAddress
atom y
affi 0000000000000080000000000000000000000000000
acod TS200
colu UA1
type 2
slng 24
msid KUM0000
opgr 2
atid 065535
//
entr ATTR
name TS2TCPIOQ00.TargetApplAddress
affi 0000000000000080000000000000000000000000000
acod TS200
colu UA2
type 2
slng 24
msid KUM0000
opgr 2
atid 065535
//
entr ATTR
name TS2TCPIOQ00.SendQueueSize
affi 0000000000000080000000000000000000000000000
acod TS200
colu UA3
type 1
msid KUM0000
opgr 2
atid 065535
mini -2147483648
maxi 2147483647
//
entr ATTR
name TS2TCPIOQ00.RecvQueueSize
affi 0000000000000080000000000000000000000000000
acod TS200
colu UA4
type 1
msid KUM0000
opgr 2
atid 065535
240
mini -2147483648
maxi 2147483647
//
entr ATTR
name TS2TCPIOQ00._LocalTimeStamp
affi 0000000000000080000000000000000000000000000
acod TS200
colu UA5
type 2
slng 16
msid KUM0000
opgr 2
atid 065535
//
entr HIDDEN
name TS2TCPIOQ00.KUMHELP
affi 0000000000000080000000000000000000000000000
colu KUMHELP
type 3
opgr 0
cost 9
vali ^APPLICATION
vale "No Application Help Defined"
vali ^ATTRGROUP[TCPIOQ]
vale "No attribute group Help Defined"
vali LocalApplAddress
vale "No attribute Help Defined"
vali TargetApplAddress
vale "No attribute Help Defined"
vali SendQueueSize
vale "No attribute Help Defined"
vali RecvQueueSize
vale "No attribute Help Defined"
vali _LocalTimeStamp
vale "Universal Agent inserted attribute per metafile keyword
AddTimeStamp specification. It is the 16-byte timestamp value
when the data arrived."
]]></ATTRDATA>
</ATTROUTPUT>
Request input
Table 35. Agent Service Interface <REPORT> request
Tag
Description
<REPORT>
<SQLTABLE>
<TABLENAME>
The TABLENAME begin and end tags enclose the table name to
report. This is the name as it appears bracketed by begin and
end tags. If you are not sure what the spelling is of the table,
you can find it in the tabl field of the agent .atr file, located in
the <install_dir>/TMAITM6/ATTRLIB directory.
241
Description
<OUTPUT>
Sample request 2: Summary report of the Windows Process attribute group with
a filter and columns specified
The request is for the values in the _Total row.
<REPORT>
<SQLTABLE>
<TABLENAME>NTPROCESS</TABLENAME>
<OUTPUT>
<COLUMN>ORIGINNODE</COLUMN>
<COLUMN>TIMESTAMP</COLUMN>
<COLUMN>INSTCNAME</COLUMN>
<COLUMN>IDPROCESS</COLUMN>
<COLUMN>PCTPRCSTME</COLUMN>
<COLUMN>THREADCNT</COLUMN>
<COLUMN>WRKINGSET</COLUMN>
</OUTPUT>
<FILTER>
<![CDATA[ *VALUE INSTCNAME *EQ _Total]]>
</FILTER>
</SQLTABLE>
</REPORT>
Report output
Table 36. Agent Service Interface <REPORT> request output.
Output tag
Description
<REPORTDATA>
<STATUS>
<ROWCOUNT>
<ROW>
<NAME>
<DATA>
Numeric output
The report does not format numeric values; they remain unformatted.
For example, if you were to get a report containing an attribute with a
scale factor of 2, a value of 7 for that attribute would show in a table view
in the Tivoli Enterprise Portal as 0.07. You can look up the scale factor,
242
243
<NAME>SYSWRITE</NAME><DATA>749</DATA></COLUMN> <COLUMN>
<NAME>NSYSTHRD</NAME><DATA>-1</DATA></COLUMN> <COLUMN>
<NAME>PRUNABLE</NAME><DATA>112</DATA></COLUMN> <COLUMN>
<NAME>PRUNNING</NAME><DATA>-1</DATA></COLUMN> <COLUMN>
<NAME>PSLEEPING</NAME><DATA>0</DATA></COLUMN> <COLUMN>
<NAME>PIDLE</NAME><DATA>0</DATA></COLUMN><COLUMN>
<NAME>PZOMBIE</NAME><DATA>0</DATA></COLUMN><COLUMN>
<NAME>PSTOPPED</NAME><DATA>0</DATA></COLUMN><COLUMN>
<NAME>THRDRUNQ</NAME><DATA>-1</DATA></COLUMN><COLUMN>
<NAME>THRDWAIT</NAME><DATA>-1</DATA></COLUMN><COLUMN>
<NAME>BOOTTIME</NAME>
<DATA><![CDATA[1090413161248000]]> </DATA></COLUMN><COLUMN>
<NAME>PENDIOWT</NAME><DATA>-1</DATA> </COLUMN><COLUMN>
<NAME>STARTIO</NAME><DATA>-1</DATA> </COLUMN><COLUMN>
<NAME>DEVINT</NAME><DATA>-1</DATA> </COLUMN><COLUMN>
<NAME>UPTIME</NAME>
<DATA><![CDATA[076d18:43:39]]> </DATA></COLUMN><COLUMN>
<NAME>ZATTRIB</NAME><DATA><![CDATA[ ]]> </DATA></COLUMN><COLUMN>
<NAME>ZVALUE</NAME><DATA><![CDATA[ ]]> </DATA></COLUMN><COLUMN>
<NAME>SWAPFREE</NAME><DATA>7436</DATA> </COLUMN><COLUMN>
<NAME>PGINRATE</NAME><DATA>9</DATA> </COLUMN><COLUMN>
<NAME>PGOUTRATE</NAME><DATA>6</DATA> </COLUMN><COLUMN>
<NAME>PGSCANRATE</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGINS1</NAME><DATA>1</DATA> </COLUMN><COLUMN>
<NAME>AVPGINS5</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGINS15</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGINS60</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGOUT1</NAME><DATA>3</DATA> </COLUMN><COLUMN>
<NAME>AVPGOUT5</NAME><DATA>3</DATA> </COLUMN><COLUMN>
<NAME>AVPGOUT15</NAME><DATA>3</DATA> </COLUMN><COLUMN>
<NAME>AVPGOUT60</NAME><DATA>3</DATA> </COLUMN><COLUMN>
<NAME>AVPGSCAN1</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGSCAN5</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGSCAN15</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPGSCAN60</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>AVPRRUNQ60</NAME><DATA>0</DATA> </COLUMN><COLUMN>
<NAME>NETADDR6</NAME>
<DATA><![CDATA[No DNS Entry]]> </DATA></COLUMN><COLUMN>
<NAME>ZID</NAME><DATA>-1</DATA> </COLUMN><COLUMN>
<NAME>ZONE</NAME><DATA><![CDATA[-1]]> </DATA></COLUMN>
</ROW></SQLTABLE>
</REPORTDATA>
244
</COLUMN>
<COLUMN>
<NAME>IDPROCESS</NAME>
<DATA>0</DATA>
</COLUMN>
<COLUMN>
<NAME>THREADCNT</NAME>
<DATA>1057</DATA>
</COLUMN>
<COLUMN>
<NAME>WRKINGSET</NAME>
<DATA>1088495616</DATA>
</COLUMN>
</ROW>
</SQLTABLE>
</REPORTDATA>
Request input
Table 37. Agent Service Interface <TABLESIT> request
Tag
Description
<TABLESIT>
Enter begin and end TABLESIT tags to retrieve the agent table
and situation list.
<SQLTABLE>
<TABLENAME>
The TABLENAME begin and end tags enclose the table name to
report. This is the name as it appears bracketed by begin and
end tags. If you are not sure what the spelling is of the table,
you can see it in the Agent Service Interface Queries report or
find it in the tabl field of the agent .atr file, located in the
<install_dir>/TMAITM6/ATTRLIB directory.
A value of *ALL implies all known agent tables.
Sample request 1: Active Windows OS situations for Process and Logical Disk
<TABLESIT>
<SQLTABLE>
<TABLENAME>NTPROCESS</TABLENAME>
</SQLTABLE>
<SQLTABLE>
<TABLENAME>WTLOGCLDSK</TABLENAME>
</SQLTABLE>
</TABLESIT>
Report output
Table 38. Agent Service Interface <TABLESIT> request output.
Output tag
Description
<SITUATION>
<NAME>
<TYPE>
<STATUS>
245
Sample output: The Windows OS agent returns all running Process and Logical
Disk situations
<TABLESIT>
<SQLTABLE>
<TABLENAME>NTPROCESS</TABLENAME>
<SITUATION>
<NAME>Check_Process_CPU_Usage</NAME>
</SITUATION>
<TYPE>P</TYPE>
<SITUATION>
<NAME>Check_Process_CPU_Usage</NAME>
</SITUATION>
<TYPE>P</TYPE>
<SITUATION>
<NAME>Is_KFC_Running</NAME>
</SITUATION>
<TYPE>E</TYPE>
</SQLTABLE> <SQLTABLE>
<TABLENAME>WTLOGCLDSK</TABLENAME>
<SITUATION>
<NAME>Check_DiskSpace_Low</NAME>
</SITUATION>
<TYPE>P</TYPE>
</SQLTABLE>
</TABLESIT>
Request input
Table 39. Agent Service Interface <PVTCONTROL> request.
Tag
Description
<PVTCONTROL>
<PVTCOMMAND>
<PVTSITNAME>
<PVTACTION>
Report output
Table 40. Agent Service Interface <PVTCONTROL> request output.
246
Output tag
Description
<STATUS>
Request input
Table 41. Agent Service Interface <SITSUMMARY> request.
Tag
Description
<SITSUMMARY>
<SITSUMMARY>
</SITSUMMARY>
The output from the request looks like the private situation configuration files
shown in the Private situation examples on page 185.
Sample request 1: Download the configuration file to the agent
<SITSUMMARY>
<CONTROL>PUSH</CONTROL>
<INSTRUCTS>
<FILE><![CDATA[name="setenv150.bat"
path="%candle_home%\tmaitm6" recDLM="$@$" ]]>
</FILE>
<DATA>
<![CDATA[ set path=.;%WINDIR%\system32\npp;%PATH%$@$
set KFC_DEBUG_API=Y$@$
set KFC_DEBUG_FILTER=N$@$
set KFC_DEBUG_STORAGE=N$@$
set KFC_DEBUG_STORAGE_STAT=N$@$
set KFC_DEBUG_TIMESYNC=N$@$
set KFC_TIME_SYNC_REQUIRED=N$@$
set KFC_API_MEDIASERVER_LISTEN_PORT=12125$@$
set kbb_ras1=ERROR$@$
set kbb_ras1_log=.\logs\kfc1.log$@$ ]]>
</DATA>
</INSTRUCTS>
</SITSUMMARY>
Report output
Table 42. Agent Service Interface <SITSUMMARY> request output.
Output tag
Description
<ROW>
247
Description
<DATA>
<STATUS>
Sample output 2: The agent returns the trace log file contents
<SITSUMMARY>
<STATUS>0</STATUS>
<ROWCOUNT>5</ROWCOUNT>
<ROW>
<DATA><![CDATA[+49BDCB34.001C 00000000 3018060A 2B060106 03010104
0100060A 0...+........... ]]></DATA>
</ROW>
<ROW>
<DATA><![CDATA[ +49BDCB34.001C 00000010 2B060104 018D0301 0315
+.........]]></DATA>
</ROW>
<ROW>
<DATA><![CDATA[ (49BDCB34.001D-B90:kraaest1.cpp,92,
"IRA_ConstructTrapVarBindV1") *TRAP-INFO: IRA_ConstructTrapVarBindV1
- Entry pPDU<39B4C6A> pTrapWork<3CDA0A8> pTrapSit<2B8F098>
dataBuffer<39BC948> offset<1363> resetTrap<0>]]> </DATA>
</ROW>
<ROW>
<DATA><![CDATA[ (49BDCB34.001E-B90:kraaesti.cpp,289,
"addVarBindStringData") <0x39B4C6A,0x16>
*TRAP-INFO: VarBind 1.3.6.1.4.1.1667.1.2.1.10.1.1 KNT ]]> </DATA>
</ROW>
<ROW>
<DATA><![CDATA[ +49BDCB34.001E 00000000 3014060D 2B060104 018D0301
02010A01 0...+........... ]]></DATA>
</ROW>
</SITSUMMARY>
Request input
Table 43. Agent Service Interface <AGENTSTAT> request.
Tag
Description
<AGENTSTAT>
<SITUATION>
<NAME>
<DAYS>
<DETAILS>
248
Report output
Table 44. Agent Service Interface <AGENTSTAT> request output.
Output tag
Description
<TYPE>
<INTERVAL>
<ROWSIZE>
<FIRSTSTARTTIME>
<LASTSTARTTIME>
<LAST STOPTIME>
<FIRSTEVENTTIME>
<LASTTRUETIME>
<LASTFALSETIME>
<TIMESRECYCLED>
<TIMESAUTONOMOUS>
<DAY>
<DATE>
Date description.
<TRUESAMPLES>
<FALSESAMPLES>
<TRUERATIO>
<FALSERATIO>
<HOURROWS>
<HOURTRUE>
<HOURFALSE>
<STATUS>
249
<LASTSTOPTIME>NA</LASTSTOPTIME>
<FIRSTEVENTTIME>NA</FIRSTEVENTTIME>
<LASTTRUETIME>NA</LASTTRUETIME>
<LASTFALSETIME>Fri Mar 13 22:53:31 2009</LASTFALSETIME>
<TIMESRECYCLED>0</TIMESRECYCLED>
<TIMESAUTONOMOUS>0</TIMESAUTONOMOUS>
<DAY>
<DATE>Fri Mar 13 00:00:00 2009</DATE>
<TRUESAMPLES>0</TRUESAMPLES>
<FALSESAMPLES>80</FALSESAMPLES>
<TRUERATIO>0.00%</TRUERATIO>
<FALSERATIO>100.00%</FALSERATIO>
<HOURROWS>0 0 0 0 0 0 0 12 2 2 4 6 0 4 4 6 0 2 5 4 0 15 14 0
</HOURROWS>
<HOURTRUE>0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
</HOURTRUE>
<HOURFALSE>0 0 0 0 0 0 0 12 2 2 4 6 0 4 4 6 0 2 5 4 0 15 14 0
</HOURFALSE>
</DAY>
</SITUATION>
</SITSTATS>
Request input
Table 45. Agent Service Interface <HISTREAD> request.
250
Tag
Description
<HISTREAD>
<SQLTABLE>
<TABLENAME>
<PVTHIST>
<OUTPUT>
<COLUMN>
<FILTER>
<OUTLIMIT>
Sample request 1: Get Windows OS agent Process history data using filter and
column selections
<HISTREAD>
<SQLTABLE>
<TABLENAME>NTPROCESS</TABLENAME>
<OUTPUT>
<COLUMN>ORIGINNODE</COLUMN>
<COLUMN>TIMESTAMP</COLUMN>
<COLUMN>INSTCNAME</COLUMN>
<COLUMN>IDPROCESS</COLUMN>
<COLUMN>PCTPRCSTME</COLUMN>
<COLUMN>THREADCNT</COLUMN>
<COLUMN>WRKINGSET</COLUMN>
</OUTPUT>
<FILTER>
<![CDATA[ *VALUE ORIGINNODE *EQ Primary:DYANG3:NT
*VALUE WRITETIME *GE 1090408224500000 *AND
*VALUE WRITETIME *LE 1090408234500000]]>
</FILTER>
<OUTLIMIT>5000</OUTLIMIT>
</SQLTABLE>
</HISTREAD>
*AND
Report output
Table 46. Agent Service Interface <HISTREAD> request output.
Output tag
Description
<HISTREADDATA>
<STATUS>
<ROWCOUNT>
<ROW>
<NAME>
<DATA>
Sample output 1: The Windows OS agent returns Process history data for the
seven specified attributes on April 8 from 10:45 PM to 11:45 PM
<HISTREADDATA>
<SQLTABLE>
<TABLENAME>NTPROCESS</TABLENAME>
<ROWCOUNT>212</ROWCOUNT>
<ROW>
<COLUMN>
<NAME>ORIGINNODE</NAME>
<DATA><![CDATA[Primary:DYANG3:NT]]></DATA>
</COLUMN>
<COLUMN>
<NAME>TIMESTAMP</NAME>
<DATA><![CDATA[1090408224551430]]></DATA>
</COLUMN>
<COLUMN>
<NAME>INSTCNAME</NAME>
<DATA>![CDATA[Idle]]> </DATA>
</COLUMN>
<COLUMN>
<NAME>IDPROCESS</NAME>
<DATA>0</DATA>
</COLUMN>
<COLUMN>
<NAME>PCTPRCSTME</NAME>
<DATA>74</DATA>
Chapter 12. Agent autonomy
251
</COLUMN>
<COLUMN>
<NAME>THREADCNT</NAME>
<DATA>1</DATA>
</COLUMN>
<COLUMN>
<NAME>WRKINGSET</NAME>
<DATA>16384</DATA>
</COLUMN>
</ROW>
...
...
</SQLTABLE>
</HISTREADDATA>
Authorization
The Service Interface Request recognizes the complete configuration load list XML
syntax. The requests that are allowed depend on group permissions:
v If your user ID is a member of the Operation group in the Access Authorization
Group Profile (AAGP), you can use the <CNFGCOMMAND> element to refresh
files using an existing configuration load list, and can issue <CNFGACTION>
Reboot, Reload, and Download requests.
v If your user ID is a member of the Administrative group in the AAGP, you can
submit any valid configuration load list request using the syntax in the
Configuration load list XML specification.
Elements
The elements and their attributes are case-insensitive. For example, you can enter
<CNFGCOMMAND>, <CnfgCommand>, or <cnfgcommand>.
<CNFGCOMMAND>
Specify configuration command request. The following example of a
configuration control request reloads the contents of the current configuration
load list:
<CNFGCOMMAND>
<CNFGACTION>RELOAD</CNFGACTION>
</CNFGCOMMAND>
<CNFGACTION>
Specify the configuration command action:
Reboot
This attribute downloads the configuration load list.
Reload
Reload is used to perform an immediate resend of the current agent
load list, thereby downloading all specified agent artifacts if they have
been updated. See the example under <CnfgCommand>.
Download
Download is used to specify the file to send. See the examples under
<CnfgFile> and <CnfgDisp>.
252
<CNFGFILE>
Optional. Specific last two segments of file name when <CNFGACTION> is
Download.
File name must exist in the load list. Download file alert.txt
<CNFGCOMMAND>
<CNFGACTION>DOWNLOAD</CNFGACTION>
<CNFGFILE>alert.txt</CNFGFILE>
</CNFGCOMMAND>
<CNFGDISP>
Optional. Specific well-known configuration file disposition as identification of
file name when <CNFGACTION> is Download. The file definition must exist
in load list. The following example request downloads the private situation
configuration XML file:
<CNFGCOMMAND>
<CNFGACTION>DOWNLOAD</CNFGACTION>
<CNFGDISP>PVTSIT</CNFGDISP>
</CNFGCOMMAND>
<STATUS>
Use this element to return the status code within the beginning <status> and
ending </status> tags. The following example causes the agent to return the
command status:
<CNFGCOMMAND>
<STATUS>600 - Configuration control command completed successfully
</STATUS>
</CNFGCOMMAND>
Related reference
Access Authorization Group Profile on page 228
253
254
255
The basic tasks for implementing Centralized Configuration for existing agents are:
1. Decide on a strategy to organize and distribute configuration files from a
central repository and create the configuration files.
2. Configure the central configuration server.
3. Enable the agent to collect the initial configuration load list.
4. Update configuration files as needed on the central configuration server.
256
257
common
cnfglist.xml
lz
lz_cnfglist.xml
lz_trapcnfg.xml
nt
nt_cnfglist.xml
nt_trapcnfg.xml
The cnfglist.xml file can use the @PRODUCT@ keyword to direct the
agents to the correct files. Example:
<ConfigurationArtifact>
<ConfigServer
Name="CENTRAL-CONFIG-SERVER"
URL="http://icvr5a05.tivlab.raleigh.ibm.com/"
User="itmuser"
Password="{AES256:keyfile:a}vHBiEqmmvylNPs90Dw1AhQ==" />
<ConfigFile
Server="CENTRAL-CONFIG-SERVER"
Name="cnfglist.xml"
Path="common"
Disp="CNFGLIST"
Activate="YES" />
<ConfigFile
Server="CENTRAL-CONFIG-SERVER"
Name="@PRODUCT@_situations.xml"
Path="@PRODUCT@"
Disp="PVTSIT"
Activate="YES" />
<ConfigFile
Server="CENTRAL-CONFIG-SERVER"
Name="@PRODUCT@_trapcnfg.xml"
Path="@PRODUCT@"
Disp="TRAPCNFG"
Activate="RESTART" />
</ConfigurationArtifact>
Other keywords can be used to create the granularity required for each
agent to get the correct files.
258
QSECOFR
You can create configuration load lists and use the Administrative
credentials to connect to the monitoring agent that is acting as the central
configuration server. The ID does not have to exist on the client agents for
them to connect to the central configuration server.
Although user IDs can be stored in encrypted format, in most cases you
want to define a user ID on the system that will be hosting the central
configuration server and add that user to the agent's AAGP.
The following example gives the steps for creating a user on the Linux OS
agent and granting administrative access to the central configuration server
there:
1. Create the user on the system: The user named itmuser is created on
the Linux operating system and the Linux OS agent (lz) is the central
configuration server.
2. Create an AAGP.xml file in the Install_dir/localconfig directory that
adds the new ID to the Administrative group:
<AAGP>
<AAUSER>
<ID>itmuser</ID>
<ASSIGN>AD</ASSIGN>
</AAUSER>
</AAGP>
259
Tip: Consider having each agent collect an AAGP file so that you can
contact the agent directly through its Agent Service Interface to perform
configuration actions with a non-root ID. By connecting directly to an
agent's Service Interface with AD permission, you can provide
credentials to connect to a new central configuration server, put or get
files, or force immediate refreshes of configuration files.
3. On the monitoring agent that functions as the central configuration
server, edit the configuration load list to add a DISP="AAGP"
ConfigFile entry to load the AAGP XML file.
root;
This load list must use credentials (
Administrator) to connect to itself to add the new user ID to the AAGP.
The edited configuration load list looks like this:
<ConfigurationArtifact>
<ConfigServer
Name="CENTRAL-CONFIG-SERVER"
URL="http://linuxhost:1920///linuxhost_lz/linuxhost_lz/"
User="root"
Password="{AES256:keyfile:a}vHBiEqmmvylNPs90Dw1AhQ==" />
<ConfigFile
Server="CENTRAL-CONFIG-SERVER"
Name="AAGP.xml"
Path="/"
Disp="AAGP" />
</ConfigurationArtifact>
260
/QIBM/UserData/IBM/ITM/localconfig/a4/a4_cnfglist.xml
Elements
The elements and their attributes are case-insensitive. For example, you can enter
<CONFIGSERVER>, <ConfigServer>, or <configserver>.
<ConfigurationArtifact> </ConfigurationArtifact>
ConfigurationArtifact is the root element identifying this as a load list
configuration document. Enter <ConfigurationArtifact> at the beginning of
the file and </ConfigurationArtifact> at the end. Example of a load list
file:
<ConfigurationArtifact>
<ConfigServer
Name="AGOURALAB"
URL="http://9.55.100.99/"
User="smith"
Password="{AES256:keyfile:a}hjZM0YaLzpd5JQC5DeboJg==" />
<ConfigFile
Server="AGOURALAB"
Name="Private_Situations.xml"
Path="ITM/Config/@HOSTNAME@"
Disp="PVTSIT"
Activate="YES" />
<ConfigFile
Server="AGOURALAB"
Name="TRAPCNFG.xml"
Path="ITM/Config/common"
Disp="trapcnfg"
Activate="RESTART" />
<ConfigFile
Server="AGOURALAB"
Name="THRESHOLDS.XML"
Path="ITM/Config/@PRODUCT@"
Disp="threshold"
Activate="YES" />
</ConfigurationArtifact>
<ConfigServer>
Define a central configuration server with the following attributes:
261
Name=
Defines a symbolic name of a SERVER statement. The name can be
up to 32 characters and must be unique in the load list. Duplicate
names are not permitted.
URL= Defines the URL used to connect to the central configuration
server, which can be either of the following types:
v An Agent Service Interface acting as a central configuration
server and specified as:
HTTP-method://Hostname:port
///agent-ServicePoint/agent-ServicePoint
where:
HTTP-method
is http or https
Hostname
is the central configuration server host name. Use the IP
address if the Hostname is not guaranteed to be resolved
by local DNS.
port
agent-ServicePoint
is the TMS/Engine-registered Agent Service Interface
name, such as system.myhost_nt for the Windows OS agent
and myhost_lz for the Linux OS agent. You can customize
the service name of the target agent to a more functionally
recognized name using the
IRA_SERVICE_INTERFACE_NAME agent environment
variable. For example, https://9.48.123.13:3661///ParisCSF-A/Paris -CSF-A. Omit the agent-instance-name
definition if you are using a generic web server
configuration repository.
Path
262
AltServer=
Optional. Specifies an alternate server name. The agent constructs
the file request URL using the alternate server definition when it
cannot contact or log on to this server. The alternate server
definition cannot include an additional alternate server
specification.
The following HTTP status codes cause the agent to retry the
request using the AltServer specification:
401
Unauthorized
403
Forbidden
404
500
503
Service unavailable
263
Path= Specifies the file location path on the target <ConfigServer>. The
path can include environment variables that are resolved at the
server when connecting to a central configuration server. The
variables are resolved at the central configuration client when the
connection is to a web server.
Path is relative from the HTTP root of the configuration server.
When using a monitoring agent as the configuration server, the
Install_dir/localconfig directory is the HTTP root. The configuration
file anchor can be overridden by the
IRA_SERVICE_INTERFACE_CONFIG_HOME environment
variable.
Disp= Optional. Specifies the local disposition of known agent
configuration files. When the DISP attribute is specified, the agent
places the downloaded ConfigFile (or ConfigFiles) in the correct
location on the central configuration client system based on the
environment settings of the client agent. The DISP attribute also
enables activation options that are appropriate for each ConfigFile.
The agent knows the local location and name of these agent
configuration files and, upon downloading them, saves them
according to the agent specification.
If the Disp attribute is omitted, CUSTOM is used by default. The
placement of a file when using Disp=CUSTOM is restricted to
locations within the Tivoli Monitoring Install_dir. This restriction is
in place to enhance security. Other Disp file types are placed
wherever the monitoring agent expects the file to be, even if the
specified location is outside the Install_dir directory structure. If
you specify Disp=CUSTOM, it is helpful to use the @ITMHOME@
keyword to specify the LocalPath.
The following disposition values are currently defined:
CNFGLIST
Configuration load list file.
PVTSIT
Private Situation configuration XML file
TRAPCNFG
Agent SNMP trap configuration XML file
THRESHOLD
Situation threshold override configuration XML file.
EIFCNFG
EIF configuration file
EIFMAP
EIF event mapping file.
UAMETA
Universal Agent application Meta files.
PASCAP
Proxy Agent Service (Agent Management Services) common
agent package (CAP) file. The PASCAP Disp can be used only
on a Tivoli Monitoring OS Agent that supports Agent
Management Services. It downloads and activates the CAP file
if the product is installed. Options=NOPRODUCTCHECK can
be used to force the placement of the CAP file even if the
264
product that the CAP file manages is not installed. (See Tivoli
Agent Management Services installation and configuration.)
AAGP
Access Authorization Group Profile, which contains access
authorization group definitions and user ID access
authorization group assignments that were defined by the
security administrator. (See Access Authorization Group
Profile on page 228.)
CUSTOM
CUSTOM is the default value used if DISP is omitted. The
LocalName and LocalPath attributes should be specified for
DISP=CUSTOM. CUSTOM files can be downloaded only to a
location within the agent's installation directory structure.
Options=
Specifies the configuration file handling option:
NOPRODUCTCHECK
Valid only with DISP=PASCAP. Bypass product installation
requirement before the CAP file download operation. Currently
this is the only option value defined.
LocalName=
Specifies the local system file name. LocalName is used only if
DISP is omitted or is set to CUSTOM. If LocalName is omitted
when Disp=CUSTOM, the NAME attribute is used. LocalName is
ignored for all other Disp values because the agent identifies the
location of the file using default values or override parameters.
LocalPath=
Specifies the local system file path. LocalPath is used only if DISP
is omitted or is set to CUSTOM. If LocalPATH is omitted when
Disp=CUSTOM, the PATH attribute is used. LocalPath is ignored
for all other Disp values because the agent identifies the location of
the file using default values or override parameters.
Activate=
NO
RESTART
Restart the agent after a successful file download.
The following Disp types require the agent to restart in
order to read the updated configuration files:
TRAPCNFG
EIFCNFG
EIFMAP
RESTART can be used with PVTSIT to force a replacement
of the private situation definition rather than merging the
definition with currently active situations.
RESTART is also available for Disp="CUSTOM".
RESTART is not supported on z/OS or i5. The agent
process must be restarted in another manner to activate the
new configuration.
Chapter 13. Centralized Configuration
265
Table 47. Configuration load list <ConfigFile> element and the Activate options available for
the Disp type.
266
Disp=
Activate="Yes"
Activate="Restart"
Activate="NO"
CNFGLIST
Default
N/A
N/A
PVTSIT
Available
Available
Default
TRAPCNFG
N/A
Available
Default
EIFCNFG
N/A
Available
Default
EIFMAP
N/A
Available
Default
THRESHOLD
Available
Available
Default
UAMETA
N/A
Available
Default
PASCAP
AAGP
Default
N/A
N/A
Table 47. Configuration load list <ConfigFile> element and the Activate options available for
the Disp type. (continued)
Disp=
Activate="Yes"
Activate="Restart"
Activate="NO"
CUSTOM
N/A
Available
Default
<ConfigParm>
Optional. Specifies an agent environment variable override value that
updates the environment settings immediately and takes effect at the next
operation interval or instance.
Interval=
Override or set IRA_SERVICE_INTERFACE_CONFIG_INTERVAL.
Backup=
Override or set IRA_SERVICE_INTERFACE_CONFIG_BACKUP.
NumbTasks=
Override or set IRA_SERVICE_INTERFACE_CONFIG_POOL_SIZE.
MaxWait=
Override or set IRA_SERVICE_INTERFACE_CONFIG_MAX_WAIT.
267
See the keyword organization and syntax examples under Central configuration
server on page 257.
and the configuration for the sales department are in a directory called
C:\IBM\ITM\ConfigFiles\Sales, so we set
SALES_CNFG_FILES=Sales
This is the bootstrap configuration load list for the Sales Department:
<ConfigurationArtifact>
<ConfigServer Name="BACKUP-CONFIG-SERVER"
URL="http://linuxhost:1920///linuxhost_lz/linuxhost_lz/"
User="itmuser"
Password="{AES256:keyfile:a}8wNnAEj6uLMTTOeaC+2rfQ==" />
<ConfigServer Name="CENTRAL-CONFIG-SERVER"
URL="http://winhost:1920///primary.winhost_nt/primary.winhost_nt/"
268
User="itmuser"
Password="{AES256:keyfile:a}8wNnAEj6uLMTTOeaC+2rfQ=="
AltServer="BACKUP-CONFIG-SERVER" />
<ConfigFile Server="CENTRAL-CONFIG-SERVER"
Name="cnfglist.xml"
Path="%SALES_CNFG_FILES%"
Disp="CNFGLIST"
Activate="YES" />
</ConfigurationArtifact>
After creating a bootstrap configuration load list that identifies the correct load list
for the agent, place the file and restart the agent.
269
270
/QIBM/UserData/IBM/ITM/localconfig/a4/a4_cnfglist.xml
IRA_SERVICE_INTERFACE_CONFIG_INTERVAL
Specifies how often the agent attempts to check with the central
configuration server for updates. Specify the interval in minutes. One day
is 1440 minutes; one week, which is also the maximum, is 10080 minutes.
Default: 60 minutes.
IRA_SERVICE_INTERFACE_CONFIG_BYPASS_TIMESTAMP
When set to N, the agent downloads and replaces only the configuration
files that have a newer UTC time stamp than that of the local version.
Default: N. Setting this parameter to Y instructs the agent to bypass the
timestamp and always download the file after every interval.
As a best practice, synchronize system times across the network to
ensure that any monitoring agents running with their time ahead of the
central configuration server do not miss an update if the file is changed
within the time difference after download.
IRA_SERVICE_INTERFACE_CONFIG_BACKUP
When a new configuration file is downloaded, the agent renames the
existing local file to a backup copy by appending suffix 1 through 5 to the
file name and moving the file to a backup directory. This variable specifies
the number of backup versions to keep. The minimum is 0 for no backup;
the maximum is 5 backups. Default: 2 backups.
IRA_SERVICE_INTERFACE_CONFIG_BACKUP_DIR
Use this environment variable to establish a different backup directory
from the default. These are the default backup directories:
Install_dir\localconfig\pc\backup
Install_dir/localconfig/pc/backup
RKANDATV DD dataset
i5/OS
/QIBM/UserData/IBM/ITM/localconfig/a4/backup
IRA_SERVICE_INTERFACE_CONFIG_MAX_WAIT
Defines the maximum wait time in seconds for downloading all
configuration files specified in the load list from the central configuration
repository. The valid time range is between 15 300 seconds. Default: 60
seconds.
IRA_SERVICE_INTERFACE_CONFIG_PASCAP_FACTOR
central configuration client only. The time multiplication
factor that the monitoring agent uses to calculate the Agent Management
Services common agent package (CAP) file output delay interval. The
delay interval is derived from the KCA_DISCOVERY_INTERVAL
environment variable multiplied by this factor. The agent enforces a
minimum factor value of 1. Default: 1.5.
IRA_SERVICE_INTERFACE_CONFIG_POOL_SIZE
The agent creates a task thread pool to handle multiple load list articles
concurrently. The agent puts requests on a FIFO queue served by pool
tasks. Default: 10 tasks.
271
Problem determination
These diagnostic options can be set for the agent component. The output is the
ras1 log file.
IRA_DEBUG_SERVICEAPI=Y
Agent component name: Service Interface
IRA_DEBUG_PRIVATE_SITUATION=Y
Agent component name: private situation
IRA_DEBUG_TRANSCON=Y
Agent component name: Transport Conduit
KDH_DEBUG=D
Agent component name: Tivoli Monitoring Service Index HTTP Service.
272
Procedure
1. Verify that you have at least one IBM cryptographic coprocessor installed and
that the ICSF is installed.
2. Create a KAES256 member in the RKANPARU data set in the z/OS agent
runtime environment. Be sure to use the same encryption key that is used
throughout your environment. If the z/OS Configuration Tool has already
created a KAES256 member with the same encryption key for a Tivoli
Enterprise Monitoring Server on z/OS and the z/OS agent is configured in the
same runtime environment as the monitoring server, you can skip this step.
v Copy the KAES256 member from the monitoring server's RKANPARU data
set to the z/OS agent's RKANPARU data set.
v Alternatively, you can copy the KAES256.ser file from the keyfiles directory
of the distributed system where you will execute the itmpwdsnmp tool to
encrypt password and community strings. Upload the KAES256.ser file to the
KAES256 member of the z/OS agent's RKANPARU data set in binary mode.
KAES256.ser is 48 bytes on distributed systems and is padded with blanks in
the KAES256 member of the RKANPARU data set.
v For instructions on using the z/OS Configuration Tool to create the KAES256
member, see the Configuring hub and remote monitoring servers on z/OS
topic of Configuring the Tivoli Enterprise Monitoring Server on z/OS.
3. Concatenate ICSF modules to the existing startup PROC RKANMODL
DDNAME of the z/OS agent. Edit the z/OS agent startup PROC and add ICSF
support to the RKANMODL DDNAME. The following is an example of
RKANMODL where CSF.SCSFMOD0 is the data set that contains ICSF
decryption modules:
//RKANMODL DD DISP=SHR,DSN=my_load_modules
// DD DISP=SHR,DSN=TDOMPT.&LVMLVL..MODL
// DD DISP=SHR,DSN=TDOMPT.&CMSLVL..MODL
// DD DISP=SHR,DSN=CSF.SCSFMOD0
Chapter 13. Centralized Configuration
273
What to do next
Use the itmpwdsnmp utility to create the encrypted password and community
strings. The utility is available only in the Tivoli Enterprise Monitoring Agent
framework on distributed platforms. The agent framework can be installed from
the Tivoli Monitoring Base DVD or Tivoli Monitoring Agent Support DVD. Run
the itmpwdsnmp tool in interactive mode on the distributed system to encrypt the
passwords that will be placed in the configuration files. For instructions, see
SNMP PassKey encryption: itmpwdsnmp on page 207.
274
/opt/IBM/ITM/bin/itmpwdsnmp.sh
Here is an example of the display at the Linux command line:
itmpwdsnmp.sh
Enter the password to be encrypted:
Confirm string:
{AES256:keyfile:a}qNf3u5TzYsiNXRacS4/sXQ==
Select the ID that agents use to access the central configuration server
For our sample setup, it is itmuser. The password is stored in the
configuration load list that is used by agents to connect to the central
configuration server.
Encrypt the password for the itmuser ID using the itmpwdsnmp utility.
(Define this ID on each agent. The ID is added to the agent's AAGP.)
C:\ibm\ITM\TMAITM6\itmpwdsnmp.bat
/opt/IBM/ITM/bin/itmpwdsnmp.sh
Create the AAGP.xml file that adds the Administrative ID to the AD group
The Administrative ID used to access the central configuration server is
added to the predefined AD authorization group.
For our sample setup, we save the AAGP.xml file saved on the central
configuration server in the Install_dir/configserver/common directory.
<AAGP>
<AAUSER>
<ID>itmuser</ID>
<ASSIGN>AD</ASSIGN>
</AAUSER>
</AAGP>
This AAGP.xml file sets the AAGP on the central configuration server. For
our sample setup, the central configuration server will serve that same file
to agents that connect to it. This simplifies our sample setup. Nonetheless,
you can have different sets of agents collect unique AAGP files with
different sets of IDs and groups so that a different set of permissions is in
place for working with the Agent Service Interface on those agents. The
AAGP they download is used when connecting to their Agent Service
Interface. The agents use the IDs defined in the AAGP that the agent
collected to connect to the central configuration server.
Create the configuration load list for the central configuration server
For our sample setup, we use a Linux OS agent as the central
configuration server, so we create Install_dir/localconfig/
lz_cnfglist.xml, which is the default location for the agent's configuration
load list. (Having the load list file in the localconfig directory is one
reasons we moved the default central configuration repository location
with IRA_SERVICE_INTERFACE_CONFIG_HOME. The agent could use
the same localconfig files that it serves to other agents, but it might be
more convenient to keep the files separate that the central configuration
server distributes.) The cnfglist.xml allows the central configuration server
to load the AAGP to itself:
<ConfigurationArtifact>
<ConfigServer Name="CENTRAL-CONFIG-SERVER"
URL="http://linuxhost:1920///linuxhost_lz/linuxhost_lz/"
User="root"
Password="{AES256:keyfile:a}qNf3u5TzYsiNXRacS4/sXQ==" />
<ConfigFile Server="CENTRAL-CONFIG-SERVER"
275
Name="AAGP.xml"
Path="common"
Disp="AAGP" />
</ConfigurationArtifact>
There is no need to include the AAGP for the agent in the bootstrap
CNFGLIST. The agent will just use this file to locate the unique configlist
that the agent should use. This CNFGLIST will only be in effect for a few
seconds, we will define AAGP and other files in the In our sample, the
agent looks in the directory identified by the @PRODUCT@ keyword for a
file called cnfglist.xml. It is best to come to the config server for the
bootstrap CNFGLIST, because that will allow you to modify the way you
have agents identify their CNFGLIST by changing this file on the config
server rather than changing the mechanism on each agent for beginning
central config operations
Create a CNFGLIST that all windows OS agents will use
For our sample, create the configuration load list in Install_dir\
configserver\nt\confglist.xml:
<ConfigurationArtifact>
<ConfigServer Name="CENTRAL-CONFIG-SERVER"
URL="http://linuxhost:1920///linuxhost_lz/linuxhost_lz/"
User="root"
Password="{AES256:keyfile:a}qNf3u5TzYsiNXRacS4/sXQ==" />
<ConfigFile Server="CENTRAL-CONFIG-SERVER"
Name="AAGP.xml"
Path="common"
Disp="AAGP" />
<ConfigFile Server="CENTRAL-CONFIG-SERVER"
Name="cnfglist.xml"
Path="@PRODUCT@"
Disp="CNFGLIST"
Activate="YES" />
<ConfigFile Server="CENTRAL-CONFIG-SERVER"
Name="@PRODUCT@_situations.xml"
Path="@PRODUCT@"
Disp="PVTSIT"
Activate="YES" />
<ConfigFile Server="CENTRAL-CONFIG-SERVER"
Name="@PRODUCT@_trapcnfg.xml"
276
Path="@PRODUCT@"
Disp="TRAPCNFG"
Activate="RESTART" />
</ConfigurationArtifact>
277
Procedure
1. On the computer where the enterprise monitoring agent is installed, open the
agent environment file from Manage Tivoli Monitoring Services or from the
command line:
v Start Manage Tivoli Monitoring Services:
Click Start Programs IBM Tivoli Monitoring Manage Tivoli
Monitoring Services
Where ITM_dir is the IBM Tivoli Monitoring installation
directory, change to the ITM_dir/bin directory and run ./itmcmd manage [-h
ITM_dir]. Right-click the monitoring agent and click Advanced Edit ENV
File.
v At the command line, change to the agent configuration directory and open
the environment file in a text editor. Where pc is the two-character product
code:
Install_dir\TMAITM6[_x64]\kpcenv
Install_dir/config/pc.ini
2. Specify how to connect to a central configuration server and download the
initial (bootstrap) configuration load list:
IRA_CONFIG_SERVER_URL
Specifies the server URL. For example, http://9.52.111.99.
IRA_CONFIG_SERVER_USERID
Specifies the server user ID. Default: itmuser.
278
IRA_CONFIG_SERVER_PASSWORD
Specifies the user password either in plain text or AES encrypted
password string.
IRA_CONFIG_SERVER_FILE_PATH
Specifies the path to the configuration load list on the central
configuration server. The default is loadlist/@PRODUCT@. See
Configuration load list keyword substitution on page 267 for a list of
keywords.
IRA_CONFIG_SERVER_FILE_NAME
Specifies the name of the configuration load list file on the central
configuration server. Default: cnfglist.xml.
3. Save the environment file and recycle the agent to apply the changes.
Procedure
1. Locate the pc_silent_install.txt response file (such as ux_silent_install.txt) on the
Tivoli Monitoring Agent installation media and make a copy of it.
2. Open the silent response file in a text editor.
3. Specify how to connect to the central configuration server and download the
initial configuration load list.
SETENV_ IRA_CONFIG_SERVER_URL
Specifies the server URL. For example, http://9.52.111.99.
SETENV_ IRA_CONFIG_SERVER_USERID
Specifies the server user ID. Default: itmuser.
SETENCR_IRA_CONFIG_SERVER_PASSWORD
Specifies the user password as an AES encrypted password string. If
you want to enter it in plain text, prefix the environment variable with
SETENV_ instead of SETENCR_.
SETENV_ IRA_CONFIG_SERVER_FILE_PATH
Specifies the path to the configuration load list on the central
configuration server. The default is loadlist/@PRODUCT@. See
Configuration load list keyword substitution on page 267 for a list of
keywords.
279
SETENV_ IRA_CONFIG_SERVER_FILE_NAME
Specifies the name of the configuration load list file on the central
configuration server. Default: cnfglist.xml.
The SETENV_parameter=value statements create parameter=value statements in
the agent environment file; SETENCR_parameter=value statements create
parameter={AES256:keyfile:a}encryptedvalue statements.
4. Invoke the silent installation procedure as described in the Example of a silent
installation file named nt_silent_installcc.txt that is invoked on a Windows
system:
silentInstall.cmd -p nt_silent_installcc.txt
Example
This example shows how a copy of nt_silent_install.txt from the installation media
might be edited to install a system monitor agent on the local computer and
configure it for Centralized Configuration:
Before
;License Agreement=I agree to use the software only in accordance with
the installed license.
;SETENV_IRA_CONFIG_SERVER_URL=http://configserver.domain.com:1920
;SETENV_IRA_CONFIG_SERVER_USERID=itmuser
;SETENCR_IRA_CONFIG_SERVER_PASSWORD=plaintext_or_encrypted_using_itmpwdsnmp
;SETENV_IRA_CONFIG_SERVER_FILE_PATH=initloadlist/@PRODUCT@
;SETENV_IRA_CONFIG_SERVER_FILE_NAME=cnfglist.xml
After
License Agreement=I agree to use the software only in accordance with
the installed license.
SETENV_IRA_CONFIG_SERVER_URL=http://mysystem.mydomain.ibm.com:1920
SETENV_IRA_CONFIG_SERVER_USERID=itmuser
SETENCR_IRA_CONFIG_SERVER_PASSWORD={AES256:keyfile:a}encryptedpassword
SETENV_IRA_CONFIG_SERVER_FILE_PATH=bootstraploadlist
SETENV_IRA_CONFIG_SERVER_FILE_NAME=cnfglist.xml
280
Procedure
1. Access the system locally and place the configuration load list pc_cnfglist.xml in
the agent's Install_dir/localconfig/pc directory, where pc is the two-character
product code.
pc_cnfglist.xml
pc_cnfglist.xml
PCCFGLST.RKANDATV
a4_cnfglist.xml
2. Recycle the agent.
i5/OS
Results
During startup, the configuration load list file is read for the central configuration
server connection URL and the files to download from there.
Procedure
1. Use Agent Builder to create a non-agent deploy bundle. See the IBM Tivoli
Monitoring Agent Builder User's Guide for details.
a. Add the common bootstrap configuration load list confglist.xml file to the
bundle.
b. Create your own copy command that copies the file to the correct location
for the agent that you plan to deploy to. Here is an example of an
installation command for the Linux OS agent:
cp |DEPLOYDIR|/cnfglist.xml |CANDLEHOME|/localconfig/lz/lz_cnfglist.xml
c. Recycle the agent to start using the new configuration load list after it is
deployed.
v Optionally, create a post-installation command that uses the Agent
Management Services watchdog to recycle the agent. Create a command
for each platform that you plan to support because you must specify the
fully qualified path to the pasctrl utility that is located in the agent's
binary architecture directory.
v Here are some post-installation commands that could be used:
Install_dir\TMAITM6[_x64]\kcapasctrl.exe recycle nt
Install_dir/lx8266/lz/bin/pasctrl.sh recycle lz
Install_dir/aix526/ux/bin/pasctrl.sh recycle ux
281
v You could also include a script in the deploy bundle that contains more
advanced logic to recycle agent instances and call that script in a
post-installation command.
Deploy_dir/afterscript.sh
2. Add the bundle to your depot using the CLI tacmd addbundles.
3. Deploy the bundle to the agents using Add Managed System in the portal
client (see Adding an agent through the Tivoli Enterprise Portal on page 141)
or through the CLI using tacmd addSystem from the monitoring server (see
IBM Tivoli Monitoring Command Reference.
4. If the agent was not restarted started using a post-installation command in the
deploy bundle, recycle the agent to activate the configuration load list as
described in step 1.e.
Procedure
1. Log onto the to the hub Tivoli Enterprise Monitoring Server:
tacmd login s myhubserver u myusername p mypassword t 1440
where myhubserver is the fully qualified host name of the hub monitoring
server, and myusername and mypassword is a valid user ID for logging onto the
monitoring server operating system.
282
Procedure
1. Open a browser and access the agent's Service Index with the URL,
http://hostname:1920 or https://hostname:3661, where hostname is the
fully-qualified name or IP address of the computer where the monitoring agent
is installed.
2. Click the IBM Tivoli pc Agent Service Interface link for the agent, where pc is
the two-character product code.
3. As prompted, enter the user name and password. The ID must be a member of
the Access Authorization Group Profile's Administrative group on the central
configuration client agent.
4. Select the link to the Service Interface Request.
5. Paste the contents of the configuration load list XML file into the Agent Service
Interface Request text box, then submit the request.
Chapter 13. Centralized Configuration
283
What to do next
You can use the Agent Service Interface to submit the configuration load list as a
service interface request whenever you want to refresh the local configuration
on-demand.
Procedure
1. Create a file called request.xml with <UUSER> and <UPASS> elements to
specify the credentials that kshsoap requires to connect to the Agent Service
Interface. This ID must be defined on the target systems that you plan to
submit the request to. As well, the ID must be a member of the Administrative
group in the target agent's Access Authorization Group Profile. Example:
<ConfigurationArtifact>
<UUSER>root</UUSER>
<UPASS>{AES256:keyfile:a}ENRUCXLW40LpR0RtGSF97w==</UPASS>
<ConfigServer
Name="CENTRAL-CONFIG-SERVER"
URL="http://winhost:1920///system.winhost_nt/system.winhost_nt/"
User="Administrator"
Password="{AES256:keyfile:a}vHBiEqmmvylNPs90Dw1AhQ==" />
<ConfigFile
Server="CENTRAL-CONFIG-SERVER"
Name="cnfglist.xml"
Path="@PRODUCT@"
Disp="CNFGLIST"
Activate="YES" />
</ConfigurationArtifact>
v
Install_dir/interp/ms/bin/kshsoap
path_to_file/request.xml path_to_file/urls.txt
284
285
If you are enabling SNMP alerts from the agent, SNMP v1 & v2c
Community Strings and SNMP v3 Authentication and Privacy Passwords
can be stored in encrypted format in the PCTRAPS.RKANDATV trap
configuration file.
If you are enabling Centralized Configuration, the ConfigServer password
attributes can be encrypted when they are stored in a
xxCFGLST.RKANDATV Configuration Load List file or using the
IRA_CONFIG_SERVER_PASSWORD environment variable.
See the topic on Password encryption in configuration files on z/OS in
OMEGAMON XE and Tivoli Management Services on z/OS Common Planning
and Configuration for instructions.
286
287
288
belongs to an attribute group, and each attribute item stores data for a
particular property of the attribute group.
A table is generated for each attribute group and the table names are used
for collection of historical data. The individual monitoring agent user
guides contain complete descriptions of the attribute groups specific to that
agent.
Warehouse proxy
Managed systems to which data collection configurations have been
distributed send data to the Tivoli Data Warehouse through the warehouse
proxy agent, a multi-threaded server process that can handle concurrent
requests from multiple monitoring agents. If the warehouse proxy is not
reachable, the agent retries the transmission at the next warehouse interval
(next hour or next day, depending on the setting). If, at the next interval,
the warehouse proxy does not send back its status during transmission, the
transaction is restarted. Then the data is resent to the warehouse proxy
after 15 minutes. If the warehouse proxy sends back a status indicating a
failure, the transaction will be restarted at the next warehouse interval.
You can have multiple warehouse proxy agents in a monitored
environment. Install multiple warehouse proxy agents in a large
environment to spread the work of receiving historical data from the
monitoring agents and inserting it into the warehouse database.
If you do not intend to save historical data to a data warehouse, you do
not need to install and configure the warehouse proxy and the
summarization and pruning agent. If the data warehouse is not used, then
it is necessary to use additional programs to trim short-term history files.
Warehouse summarization and pruning
The warehouse summarization and pruning agent provides the ability to
customize the length of time for which to save data (pruning) and how
often to aggregate data (summarization) in the data warehouse. With
summarized data, the performance of queries can be improved
dramatically. And with data summarization and data pruning working
together, the amount of disk space used can be better managed.
Warehouse summarization is controlled on a per-table (attribute group)
basis. How the rows in each table are summarized is determined by a set
of attributes in each table that are designated as primary keys. There is
always one primary key, the ORIGINNODE (often called Server Name or
System Name), which means that data is summarized by the managed
resource. One or more additional primary keys are provided to further
refine the level of summarization for that table. For example, in an OS
agent disk table, a primary key might be the logical disk name, which allows
historical information be reported for each logical disk in the computer.
There can be only one summarization and pruning agent in the managed
environment; it connects directly to the Tivoli Data Warehouse.
289
290
291
history collection options. Also, for a given attribute group, the same
history collection options are applied to all monitoring servers for which
that collection is currently enabled.
Collection location
The Collection Location is where the short-term historical data file resides:
at the TEMA (Tivoli Enterprise Monitoring Agent) or the TEMS (Tivoli
Enterprise Monitoring Server). The default location is TEMA, which
minimizes the performance impact on the monitoring server from historical
data management. However, there are some product and attribute group
combinations that are only collected at a specific place, either the
monitoring server or the monitoring agent.
On OMEGAMON XE products, the persistent data store is used to
store short-term history, so it must be configured at the collection location.
For any given agent, do not vary the collection location: collect all
historical data for the product either at the monitoring agent or monitoring
server. For agents that are configured in the same address space as the
monitoring servers (required for OMEGAMON XE for z/OS and
OMEGAMON XE for Storage on z/OS), configure the persistent data store
in the same address space, and specify TEMS as the collection location.
Aggregate and prune warehouse data
The Summarization and Pruning Agent is a mechanism for managing data
in the Tivoli Data Warehouse. The data in the warehouse is a historical
record of activity and conditions in your enterprise. Summarization of the
data is the process of aggregating your historical data into time-based
categories, for example, hourly, daily, weekly, and so on. Summarizing data
allows you to perform historical analysis of the data over time. Pruning of
the data keeps the database to manageable size and thus improves
performance. Pruning of the database should be performed at regular
intervals.
Important: You can run only one summarization and pruning agent even
if you have multiple monitoring servers that are sharing a single Tivoli
Data Warehouse database. Running multiple summarization and pruning
agents causes database deadlocks and conflicts because the multiple
instances might attempt to summarize or prune the data in the tables
simultaneously.
Converting short-term history files to delimited flat files
If you choose not to use the Tivoli Data Warehouse, then you must
institute roll-off jobs to regularly convert and empty out the history data
files. Roll-off programs are provided. In addition to trimming the history
data files, these scripts produce flat files which can be used with
third-party tools to produce trend analysis reports and graphics. There is
also an environment variable for setting the maximum size of history files.
Some attribute groups are ineligible for historical data collection
Some agents do not enable collection of history data for all of their
attribute groups. This is because the product development team for that
agent has determined that collecting history data for certain attribute
groups is not appropriate or might have a detrimental effect on
performance. This might be because of the vast amount of data that is
generated. Therefore, for each product, only attribute groups that are
available for history collection are shown in the History Collection
Monitored Application.
Configuration window when you click a
292
Procedure
v
1. In the Manage Tivoli Monitoring Services window, right-click the monitored
application and click Advanced Edit Variables.
2. In the Override Local Variable Settings window, click Add.
list and select CTIRA_HIST_DIR
3. Scroll through the Variable
4. In the Value field, replace @LogPath@ with the full path to the directory
where you want the short-term history to be saved.
5. Click OK to see CTIRA_HIST_DIR in the Variable column and the new path
in the Value column; and click OK again to close the window. The value is
recorded in the KpcENV file, such as KNTENV.
6. Recycle the agent to have your changes take effect.
v
1. Change to the <itm_install_dir>/config directory and open pc.ini in a text
editor, where pc is the two-character product code. For example,
/opt/IBM/ITM/config/ux.ini for the UNIX OS agent. For a list of product
codes, see the Comprehensive List of IBM Tivoli Monitoring: ITM 6.X
Product Codes at http://www-01.ibm.com/support/
docview.wss?uid=swg21265222&myns=swgtiv&mynp=OCSSZ8F3&mync=E.
2. On a new line, add this environment variable followed by the full path to the
location where you want the short-term history to be saved:
CTIRA_HIST_DIR=
293
294
295
296
"Network_Address"
CHAR( 16 ) );
297
See the IBM Redbooks publication, Introduction to Tivoli Enterprise Data Warehouse
at http://www.redbooks.ibm.com/ for references and additional sample SQL
extract scripts.
298
v i5/OS and HP NonStop Kernel: Description files use the name of the
data file as the base. The last character of the name is 'M'. For example,
for table QMLHB, the history data file name is QMLHB and the
description file name is QMLHBM.
v z/OS: Description records are stored in the PDS facility, along with the
data.
v UNIX and Linux: Uses the *.hdr file naming convention.
v Windows: Uses the *.hdr file naming convention.
Sample *.hdr meta description file
TMZDIFF(int,0,4) WRITETIME(char,4,16)
QM_APAL.ORIGINNODE(char,20,128) QM_APAL.QMNAME(char,148,48)
QM_APAL.APPLID(char,196,12) QM_APAL.APPLTYPE(int,208,4)
QM_APAL.SDATE_TIME(char,212,16)
QM_APAL.HOST_NAME(char,228,48)
QM_APAL.CNTTRANPGM(int,276,4) QM_APAL.MSGSPUT(int,280,4)
QM_APAL.MSGSREAD(int,284,4) QM_APAL.MSGSBROWSD(int,288,4)
QM_APAL.INSIZEAVG(int,292,4) QM_APAL.OUTSIZEAVG(int,296,4)
QM_APAL.AVGMQTIME(int,300,4) QM_APAL.AVGAPPTIME(int,304,4)
QM_APAL.COUNTOFQS(int,308,4) QM_APAL.AVGMQGTIME(int,312,4)
QM_APAL.AVGMQPTIME(int,316,4) QM_APAL.DEFSTATE(int,320,4)
QM_APAL.INT_TIME(int,324,4) QM_APAL.INT_TIMEC(char,328,8)
QM_APAL.CNTTASKID(int,336,4) SAMPLES(int,340,4)
INTERVAL(int,344,4)
For example, an entry can have the form, where int identifies the data as
an integer, 75 is the byte offset in the data file, and 20 is the length of the
field for this attribute in the file:
attribute_name(int,75,20)
299
Procedure
1. Open the environment file for the agent:
In the Manage Tivoli Monitoring Services window, right-click the
v
component and click Advanced Edit ENV File. (These are the
Install_dir\TMAITM6\K<pc>ENV files where <pc> is the two-character product
code, such as C:\IBM\ITM\TMAITM6\KNTENV.)
Change to the Install_dir/config directory and open
v
<pc>.ini in a text editor, where <pc> is the two-character product code. For
example, /opt/IBM/ITM/config/ux.ini for the UNIX OS agent.
For a list of product codes see the IBM Tivoli product codes appendix of the
IBM Tivoli Monitoring: Installation and Setup Guide.
2. Add two new lines to the file, where 5 is the maximum number of megabytes
that the directory where the short-term history file is located can grow to; and
where 900 (15 minutes) is the number of seconds between evaluation of the
directory size:
KHD_TOTAL_HIST_MAXSIZE =5
KHD_HISTSIZE_EVAL_INTERVAL=900
Results
After you set a maximum and the directory limit is reached, no new records are
written to the short-term history files, which causes gaps to occur in the data
collected. However, if the data is warehoused, the warehouse proxy will trim the
short term history files to contain only the last 24 hours of data. This can allow the
agent to write historical data again; thus, the limit can be reached again and the
process repeats. This process can also cause gaps to appear in the data.
300
301
If you created SQL queries or stored procedures prior to IBM Tivoli Monitoring
V6.2.1 for use with the previous version of the historical data collection program,
these now might need to be modified. The SQL needs to take into account the fact
that some relational database products (such as Oracle) require all table and
column names to be surrounded by double quotation marks to access IBM history
data, some agents might have changed their data characterizations or added new
columns.
302
If the renamed files already exist, they are deleted prior to the renaming
operation (that is, only one generation of changed short-term history files is
kept).
v If warehousing is NOT specified in the current historical data collection request,
the history data and meta file are renamed as described above. On z/OS, if a
generic table is used to store the data, all short-term history data for a table
together with its meta record are deleted.
303
are not normal work days as vacation days. Be aware that defined shifts and
vacation days increase the amount of data in the Tivoli Data Warehouse.
If the Tivoli Data Warehouse and all the agents that are collecting data are
not in the same time zone, the Timezone Indicator identifies the time zone to
use. If you chose to use the Tivoli Data Warehouse time zone, all data is
changed to reflect the time zone of the Tivoli Data Warehouse. If you
choose the agent's time zone, the data stays unchanged, with the original
time zone for that agent.
Summarization tables in the data warehouse
The following are names of the summarization tables. The x represents the
original table name of the detailed data. The summarization interval that is
chosen for the particular attribute group is appended to the original table
name. Names can be different between the detailed data table and
summarized table name due to database name length restrictions.
Yearly x_Y
Quarterly
x_Q
Monthly
x_M
Weekly
x_W
Daily
x_D
Hourly
x_H
The table shows the names of the summarization columns in the detailed
tables and what they mean. The x represents the original column name.
The formula values are set by the agents and can be different for different
attribute groups . Attribute names can be different between the detailed
data table and summarized table due to database name length restrictions.
Table 49. Summarization functions
Name
Formula
Average
AVG_x
Delta high
HI_x
Delta low
LOW_x
Delta total
TOT_x
LAT_x
Maximum
MAX_x
Minimum
MIN_x
Sum
SUM_x
Names can be different between the detailed data table and summarized
table name due to database name length restrictions.
Summarization and pruning metrics
The following example describes how the Summarization and Pruning
304
agent calculates metrics that accumulate over time. You can use the results
to manage your resources. In this example, the metric represents cache hits
since last restart of server.
The total number of cache hits in the last hour is given by the Total value.
The Low value represents the lowest number of cache hits in the hour
based on all the detailed data values for the hour. The High value
represents the highest number of cache hits in the hour based on all the
detailed data values for the hour.
With these detailed data values in one hour: 9, 15, 12, 20, 22, delta-based
processing has the following rules:
v If the current value is greater than or equal to the previous value, the
output equals the previous value minus the current value.
v If the current value is less than the previous value, the output equals the
current value.
v
v
v
v
v
305
306
307
Procedure
1. If the History Collection Configuration window is not open, click
History
Configuration.
2. Select a Monitored Application from the tree.
3. Review the attribute groups in the table. If summarization and pruning has
already been configured for an attribute group, the values will be shown in the
summarization and pruning cells. Collapse the tree, drag the borders, or scroll
the table right to see all the cells.
308
4. Select one or more attribute groups to configure. You can select multiple groups
with Ctrl+click, or Shift+click to select all groups from the first one selected to
this point. The settings of the first group selected continue to display, regardless
of the settings in any of the other selected groups. This enables you to adjust
the configuration controls once and apply the same settings to all selected
attribute groups. Use the Clear all button if you want to clear all the fields and
start over.
5. In the Summarization area, select the check box for every time period to be
aggregated: Yearly, Quarterly, Monthly, Weekly, Daily, and Hourly.
6. In the Pruning area, select the check box for every time period to be pruned:
Yearly, Quarterly, Monthly, Weekly, Daily, and Hourly. If you also want to keep
the original data samples, select the Detailed data check box. In the
corresponding fields, specify the number of days, months, or years to keep the
data.
7. Click Apply to save the configuration for the attribute groups that were
selected. The summarization and pruning cells for the attribute group are
updated to reflect the new settings.
What to do next
The next time summarization and pruning takes place, the summarization and
pruning agent applies the configuration to the long-term data stored in the data
warehouse. Wait for the next scheduled time period to elapse before expecting to
see any summarized data.
Procedure
1. In Manage Tivoli Monitoring Services, right-click Summarization and Pruning
agent.
2. Click on Reconfigure.
3. Click OK in the Warehouse Summarization and Pruning Agent: Advanced
Configuration window.
4. Click OK in the next window.
5. Click Yes in the Warehouse Summarization and Pruning Agent window to
configure the Summarization and Pruning Agent.
6. Enter the Tivoli Data Warehouse database and Tivoli Enterprise Portal server
information in the Sources tab:
a. In the JDBC drivers field, click Add to invoke the file browser window to
select your JDBC driver. Click OK to close the browser and add the JDBC
drivers to the list You can also highlight an entry in the JDBC drivers list
and click Delete to remove a driver. This gives you the ability to collect
JDBC drivers to communicate with your Tivoli Data Warehouse database.
JDBC drivers are installed separately and each database provides a set of
these JDBC drivers.
Note:
Chapter 14. Managing historical data
309
310
311
Procedure
1. In the Tivoli Enterprise Portal, click the History Collection Configuration
window button that is located on the toolbar.
2. Select the Product.
3. Select one or more Attribute Groups.
4. Click the Unconfigure Groups button.
Procedure
v Open the event log where the warehouse proxy errors are listed:
312
Procedure
1. Create a history child directory of Install_dir\tmaitm6\logs\.
2. Create a k?? child directory of Install_dir\tmaitm6\logs\history where ?? is
the two-character product code. For example, c:\ibm\itm\tmaitm6\logs\
history\k3z would be the path to IBM Tivoli Monitoring Agent for Active
Chapter 14. Managing historical data
313
Directory short-term history files. The system user ID for this agent must have
read and write permission for this directory.
3. Open the Install_dir\tmaitm6\k??cma.ini agent configuration file (where ?? is
the two-character product code) in a text editor. See your monitoring product
user's guide for the name of the file used for agent configuration.
4. Locate the CTIRA_HIST_DIR=@LogPath@ parameter and append with
\history\k?? (where ?? is the two-character product code). For example,
CTIRA_HIST_DIR=@LogPath@\history\knt specifies c:\ibm\itm\tmaitm6\logs\
history\knt for Windows OS agent historical data collection on this computer.
5. Save the k??cma.ini configuration file.
6. Copy the Install_dir\tmaitm6\logs\khdexp.cfg warehouse upload status file
to the \history\k?? directory. If this file is not copied to the new agent history
directory, your existing history data might be warehoused more than once. It is
possible that this file does not exist if the history warehousing option has never
been enabled.
7. Copy any .hdr files and their base name counterparts (no file extension) for the
agent to the new location. For example, the c:\ibm\itm\tmaitm6\logs\history\
knt directory might look like this:
khdexp.cfg
netwrkin
netwrkin.hdr
ntprocssr
ntprocssr.hdr
wtlogcldsk
wtlogcldsk.hdr
wtmemory
wtmemory.hdr
wtphysdsk
wtphysdsk.hdr
wtserver
wtserver.hdr
wtsystem
wtsystem.hdr
Please note that you might be copying history data files from the tmaitm6\logs
directory that are not managed by the target agent. For example, the directory
might contain Oracle database history data, but you are copying the files to the
new Windows OS agent history directory. The copied files that are not used by
the Windows OS agent will not be needed and can safely be deleted.
8. In Manage Tivoli Monitoring Services, right-click the monitoring agent service
and click Reconfigure, click OK twice to accept the settings in the
configuration windows, then
314
-o
-o
-o
-o
memory.txt wtmemory
physdsk.txt wtphysdsk
process.txt wtprocess
system.txt wtsystem
Location of the Windows executable files and historical data collection table
files:
This section discusses the location of Windows programs needed for converting
historical data.
The programs are in these locations:
v <itm_install_dir>\cms directory on the Tivoli Enterprise Monitoring Server.
v <itm_install_dir>\tmaitm6 directory on the remote managed systems where the
agents were installed.
If your agent history data has been configured to be stored at the agent computer
and you want to store your history files on a disk that provides more storage
capacity than the default history data file location provides, this location can be
Chapter 14. Managing historical data
315
Attributes formatting
Some attributes need to be formatted for display purposes. For example, floating
point numbers that specify a certain number of precision digits to be printed to the
left of a decimal point. These display formatting considerations are specified in
product attribute files.
When you use the krarloff rolloff program to roll off historical data into a text file,
any attributes that require format specifiers as indicated in the attribute file are
ignored. Only the raw number is seen in the rolled off history text file. Thus,
instead of displaying 45.99% or 45.99, the number 4599 displays.
The warehouse proxy inserts data according to the type, length, and data precision
specified in the attribute files. However, the Tivoli Data Warehouse database
displays the correct attribute formatting only for those attributes that use integers
with floating point number formats.
Note: The krarloff program will not output values that contain UTF8 data. All
attributes that might contain UTF8 data will output the value BLANK.
316
Default Value
Description
-h
off
-d
tab
-g
off
-m
source-file.hdr
-r
source-file.old
-o
source-file.nnn
where nnn is
Julian day
-s
none
317
where the square brackets denote the optional parameters, and the curly braces
denote a required parameter.
If you run the krarloff rolloff program from an i5/OS system in the directory in
which the agent is running, replace qautomonwith the name of the executable for
your agent. For example, the MQ agent uses kmqlib in the command string.
Note: Enter the command on a single line.
318
In the UNIX environment, you use the itmcmd history script to activate and
customize the conversion procedure used to turn selected Tivoli Enterprise
Monitoring short-term historical data tables into a form usable by other software
products. The historical data that is collected is in a binary format and must be
converted to ASCII to be used by third party products. Each short-term file is
converted independently. The historical data collected by the Tivoli Enterprise
Monitoring Server can be at the host location of the Tivoli Enterprise Monitoring
Server or at the location of the reporting agent. Conversion can be run at any time,
whether or not the Tivoli Enterprise Monitoring Server or agents are active.
Conversion applies to all history data collected under the current install_dir
associated with a single Tivoli Enterprise Monitoring Server, whether the data was
written by the Tivoli Enterprise Monitoring Server or by a monitoring agent.
See IBM Tivoli Monitoring: Command Reference for additional information about
itmcmd history.
When you enter:
itmcmd history -h
Note: Certain parameters are required. Items separated with a | vertical bar
denotes mutual exclusivity (for example, Kb|Mb means enter either Kb or Mb, not
both.) Typically, parameters are entered on a single line at the UNIX command
line.
See the Command Reference for all of the parameters used with this command.
319
Use itmcmd history to schedule automatic conversions by the UNIX cron facility.
To schedule a basic automatic conversion, enter the following at the command line:
./itmcmd history -A n prod_code
where n is a number from 1-24. This number specifies the number of times per day
the data conversion program runs, rounded up to the nearest divisor of 24. The
product code is also required.
For example, the following command means to run history conversion every three
hours:
itmcmd history -A 7 ux
320
You can run the krarloff rolloff program from the DATA subvolume by entering
the following:
RUN <$VOL>.CCMQEXE.KRARLOFF <parameters>
Note that CCMQDAT and CCMQEXE are defaults. During the installation process,
you can assign your own names for these files.
Attribute formatting:
Some attributes must be formatted for display purposes. For example, floating
point numbers that specify a certain number of precision digits to be printed to the
left of a decimal point. These display formatting considerations are specified in
product attribute files.
When you use the krarloff rolloff program to roll off historical data into a text file,
any attributes that require format specifiers as indicated in the attribute file are
ignored. Only the raw number is seen in the rolled off history text file. Thus,
instead of displaying 45.99% or 45.99, the number 4599 displays.
321
information. Additional information about the persistent data store can be found in
IBM Tivoli Management Services on z/OS: Configuring the Tivoli Enterprise Monitoring
Server on z/OS.
An alternative to the automatic scheduling of conversion is manually issuing the
command to convert the historical data files.
Note: The KBDXTRA process currently does not support UTF8 columns.
Converting files using the KPDXTRA program:
The conversion program, KPDXTRA, is called by the persistent data store
maintenance procedures when the EXTRACT option is specified for maintenance.
This program reads a data set containing the collected historical data and writes
out two files for every table that has data collected for it. The processing of this
data does not interfere with the continuous collection being performed.
Because the process is automatic, a brief overview of the use of the KPDXTRA
program is provided here. For full information about the KPDXTRA program,
review the sample JCL distributed with your Tivoli Monitoring product. The
sample JCL is found as part of the sample job the KPDXTRA program contained in
the sample libraries RKANSAM and TKANSAM.
Attribute formatting:
Some attributes must be formatted for display purposes. For example, floating
point numbers that specify a certain number of precision digits to be printed to the
left of a decimal point. These display formatting considerations are specified in
product attribute files.
When you use KPDXTRA to roll off historical data into a text file, any attributes
that require format specifiers as indicated in the attribute file are ignored. Only the
raw number is seen in the rolled off history text file. Thus, instead of displaying
45.99% or 45.99, the number 4599 displays.
About KPDXTRA:
KPDXTRA program runs in the batch environment as part of the maintenance
procedures. It is capable of taking a parameter that allows the default column
separator to be changed. The z/OS JCL syntax for executing this command is:
// EXEC PGM=KPDXTRA,PARM='PREF=dsn-prefix [DELIM=xx] [NOFF]
Note that DELFILE drops the file only from the PDS; it does not not delete the file.
The file can be added back into the PDS GROUP by issuing a RESUME command:
F stcname,KPDCMD RESUME FILE=DSN:datastorefile
322
If you must run a utility program against an active data store, issue a SWITCH
command prior to issuing this command.
DD names required to be allocated for KPDXTRA:
The following is a summary of the DD names that must be allocated for the
KPDXTRA program. Refer to the sample JCL in the Sample Libraries distributed
with the product for additional information.
Table 51. DD names required
DD name
Description
RKPDOUT
RKPDLOG
PDS messages
RKPDIN
RKPDIN1
RKPDIN2
KPDXTRA parameters:
The following table specifies the parameters of KPDXTRA, along with their default
values and descriptions.
Table 52. KPDXTRA parameters
Parameter
Default Value
Description
PREF=
none
DELIM=
tab
QUOTE
NQUOTE
NOFF
off
323
CCCHIST.PDSGROUP.PDS#1:
Application Name
Table Name
Extract Status
PDSSTATS
PDSCOMM
Excluded
PDSSTATS
PDSDEMO
Included
PDSSTATS
PDSLOG
Included
PDSSTATS
TABSTATS
Included
Table Name
No. of Rows
Oldest Row
Newest Row
PDSSTATS
PDSLOG
431
1997/01/10
05:51:20
1997/02/04
02:17:54
&hilev.&midlev.&dsnlolev.tablename.H
where:
324
v stcname identifies the name of the started task that is running either the Tivoli
Enterprise Monitoring Server or agents.
v cccccccc identifies the group name associated with the persistent data store
allocations. The values for cccccccc can vary based on which products are
installed. The standard group name is GENHIST.
When this command is run, only the tables associated with the group identifier are
extracted. If multiple products are installed, each can be controlled by separate
SWITCH commands.
This switching can be automated by using either an installation scheduling facility
or an automation product.
You can also use the Tivoli Enterprise Portal's advanced automation features to run
the SWITCH command. To do so, define a situation that, when it becomes true,
runs the SWITCH command as the action.
325
326
327
328
DB2
select distinct "VIEWNAME" from SYSCAT.VIEWS where "VIEWNAME" like %V
Oracle
select distinct "VIEW_NAME" from USER_VIEWS where "VIEW_NAME" like %V
MS SQL Server
select distinct "NAME" from SYS.VIEWS where "NAME" like %V
Notes:
1. In Tivoli Common Reporting for Asset and Performance Management,
both BIRT and Cognos report engines can co-exist.
2. Although it is not required, you can install the Eclipse BIRT Report
Designer, Version 2.2.1. Eclipse BIRT Report Designer, along with the
Tivoli Common Reporting: Development and Style Guide, can be used to
edit report templates or create new reports.
For software requirements for running the BIRT Report Designer and to download
it, refer to Business Intelligence and Reporting Tools on the Eclipse web site or the
IBM developerWorks Tivoli Common Reporting space. Download the development
and style guide from the IBM Tivoli Common Reporting for Asset and
Performance Management information center.
329
Note: Tivoli Common Reporting provides enhanced security that enables you to
assign a security string to hypertext links in a report. The Tivoli Common Reporting
User's Guide provides instructions for entering a security set.
Limitations
The limitations of the reports produced by Tivoli Common Reporting are described
in this section.
v Some of the reports do not support the Tivoli Data Warehouse Summarization
and Pruning Agent optional definition of shift hours. Customers can use shift
hour support to flag collected data as being either Peak or Off-Peak periods.
However, some reports will include all data collected between the
customer-selected report start and end times, whether that data was collected
during Peak or Off-Peak periods. See About the summarization and pruning
agent and Changing global configuration settings.
v Reports that cover a long time period or a processing-intensive attribute might
cause SQL arithmetic overflow.
v These reports run against the Tivoli Data Warehouse. DB2 limits the length of
columns to 30 characters. Because the Tivoli Data Warehouse uses attribute
group names as the column headers, attribute names longer than 30 characters
in a DB2 warehouse are replaced with the internal column name, abbreviated
database name for the attribute (for example, CPU_UTIL or DISK_UTIL rather
than CPU Utilization or Disk Utilization).
v The IBM Tivoli Monitoring OS Agents Cognos reports are coded to connect to a
data connection in Tivoli Common Reporting with the name TDW.
330
You will need the database scripts included in the extracted reports package under
the db_scripts directory.
Procedure
v IBM DB2
1. Copy the database scripts (.db2 files) from the reports package to a location
where they can be run against the Tivoli Data Warehouse. The scripts are in
the db_scripts branch of the directory where the reports package was
extracted to.
2. Log in as db2admin. Your user ID must have administrator access to create
the IBM_TRAM schema.
3. Connect to the database that you want to create the dimension tables for.
This is your Tivoli Data Warehouse.
db2 connect to WAREHOUS;
4. If you have an older version of the database scripts already installed clean
up the database:
start clean.db2
After the command completes successfully, several tables are shown under
IBM_TRAM: TIME_DIMENSION, MONTH_LOOKUP, WEEKDAY_LOOKUP,
ComputerSystem, BusinessService, SiteInfo, and so on.
6. Create the stored procedure for generating the time dimension:
db2 -td@ -vf gen_time_dim_granularity_min.db2
where start date and end date are in this format YYYY-MM-DDHH.MM.SS.MILSEC and granularity of data is the frequency in minutes.
For example, the following command generates from 12/31/2009 to
12/31/2010 with 60-minute granularity.
db2 call IBM_TRAM.CREATE_TIME_DIMENSION(2009-12-31-00.00.00.000000,
2010-12-31-00.00.00.000000, 60);
createSchema.sql
createProcedure.sql
clean.sql
populateTimeDimension.sql Also, modify the boundary parameters for
the time dimension and granularity. For example,
Chapter 15. Tivoli Common Reporting
331
@startDate
= 2010-01-01 00:00:00,
@endDate
= 2010-07-08 00:00:00,
@granularity = 60,
If Monday must be the first day of the week, add the fourth parameter
equal to 1; otherwise, release three parameters.
@weekday
= 7
3. If you have an older version of the database scripts already installed, clean
up the database.
sqlcmd -i clean.sql [-U username -P password] [-S hostname]
If you cannot access remotely as sys user, run this command locally at the
Oracle server and provide all the information that the script requires:
@MY_PATH\local_setup_IBM_TRAM.sql
4. Create user IBM_TRAM (the script must be called by a user with system
rights, such as SYS/SYSTEM):
@MY_PATH\create_IBM_TRAM.sql TCR_PASS USER_TBSPC TEMPORARY_TBSPC
where TCR_PASS is the password for the new user, USER_TBSPC is the default
user tablespaces name (must exist), and TEMPORARY_TBSPC is the default
temporary tablespaces name (must exist)
5. Create the IBM_TRAM tables (the script must be called by the IBM_TRAM
user created in the previous step):
@MY_PATH\create_schema.sql USER_TBSPC
332
8. Load the lookup data (the script must be called by the IBM_TRAM user):
@MY_PATH\populateLookup.sql
Results
The shared dimensions and time dimensions tables are complete.
What to do next
Create and populate the resource dimension table.
Attribute group
Table
Summarize
Linux
Linux IP Address
Linux_IP_Address
Daily
UNIX
UNIX IP Address
UNIX_IP_Address
Daily
Windows
Computer Information
NT_Computer_Information
Daily
You can configure historical data collection in the Tivoli Enterprise Portal or in the
Command Line Interface. The following example shows how a local historical
collection for NT Computer Information was created and distributed from the CLI:
tacmd login -s MyComputer -u MyUser -p MyPassword
tacmd tepslogin -s localhost -u sysadmin
tacmd histconfiguregroups -t knt -o "NT Computer Information" -m -d YQMQDH
-p Y=2y,Q=2y,M=1y,W=1y,D=6m,H=14d,R=7d
tacmd histcreatecollection -t knt -o "NT Computer Information"
333
Procedure
v IBM DB2
1. Log in as db2admin. Your user ID must have administrator access to create
the resource dimension.
2. Connect to the database that you want to create the resource dimension table
for. This is your Tivoli Data Warehouse.
db2 connect to WAREHOUS;
After the command completes successfully, a new table is shown under the
ITMUSER schema: ManagedSystem.
4. Create the stored procedure to populate the ManagedSystem table:
db2 -td@ -vf populate_resources.db2
334
begin
POPULATE_OSAGENTS(ITMUSER);
end;
/
Results
The resource dimension table is complete.
What to do next
Install and run IBM Cognos reports.
Procedure
v IBM DB2
1. Make sure you have deployed a DB2 database client on the computer where
the Cognos-based Tivoli Common Reporting engine is installed. The client
should be of the same version as the database that the Tivoli Data Warehouse
is using.
If a DB2 server is installed where the Cognos-based Tivoli
Common Reporting engine is installed, the DB2 client files are already
available. However, you will need to copy the DB2 library file (libdb2.a) to
the Cognos_8_Install_dir/bin directory to allow Cognos to successfully
connect to the database server where the Tivoli Data Warehouse resides.
2. Connect the DB2 database client to the database server by running the DB2
Configuration Assistant, configuring the local net service name configuration,
and restarting your system.
3. Note the name of the connection you have created because it is used in
Tivoli Common Reporting by the report installer.
v Microsoft SQL Server
1. Make sure you have deployed the MS SQL database client on the computer
where the Cognos-based Tivoli Common Reporting engine is installed.
2. Connect the MS SQL client to the database server by running the MS SQL
Management Studio Express, configuring the local net service name
configuration, and restarting your system.
3. Note the name of the connection you have created because it is used in
Tivoli Common Reporting by the report installer.
v Oracle
1. Make sure you have deployed the Oracle database client on the computer
where the Cognos-based Tivoli Common Reporting engine is installed.
2. Connect the Oracle database client to the database server by running the
Oracle Net Configuration Assistant, configuring the local net service name
configuration, and restarting your system.
3. Note the name of the connection you have created because it is used in
Tivoli Common Reporting by the report installer.
335
Results
You can now import and run reports.
Procedure
1. From the Cognos reports disk or the directory where the report package was
extracted, launch the setup script:
setup.bat tcr_install_dir. (If Tivoli Common Reporting is
v
installed in the default directory, you do not need to specify an installation
directory.)
./setup.sh tcr_install_dir.
v
2. Click Next on the installer welcome page.
3. Select OS Agents Reporter from the Cognos: available report sets field and
move it to the To be installed field.
4. Read all instructions that appear in the next window to check if your system
meets all prerequisites for installing the reports. Proceed according to the
instructions. Click Next.
5. Specify a set of parameters and click Next:
v Enter the Cognos name space. (OS Agents reports do not have their own
namespace; they use what is assigned by Tivoli Common Reporting.)
v Enter the Cognos user name and password. Example: tipadmin/tippass
v Specify the Cognos dispatcher URL. Example of the URL for the VMware
VI monitoring agent: http://
VMMProvider:tipadmin:tippass@localhost:16315/tarf/servlet/dispatch.
The port number is 16316 for https or might be different if Tivoli Common
Reporting V1.3 was installed in an independent install directory (for
example, the user chose not to upgrade) on a computer that Tivoli Common
Reporting V1.2 is currently installed on. For that scenario, the correct http
port is 16345 and the https port is 16346.
6. This step lets you skip defining the required data sources. Select the check box
if you want to do so. Do not skip defining the data sources unless you already
have them created. They are required for the agent reports to work properly.
7. Unless you have chosen to skip this step in the previous window, set the data
source parameters in the window that appears:
336
v Data source type: Oracle, Microsoft SQL Server (ODBC) or DB2. After you
have chosen the data source type, the Copy button automatically enters
default values in the JDBC driver class name, JDBC URL value, and JDBC
user ID fields.
v DB2 Database Name, Oracle Database Name, or Microsoft SQL Server
Database Name depending on the data source type you have specified in
the previous field
v Data source user name
v Data source password
8. Click Next. This installation step takes some time to complete.
9. After the summary information is displayed, read it carefully to check if the
information is correct. If it is, click Install. Use the Back button if you want to
change any of the previously specified parameters. A window appears that
shows the progress of your installation.
10. After the post-installation report appears, check that the installation was
successfully completed, and click Finish.
Results
OS Agent Reports are now installed on your Tivoli Common Reporting server.
What to do next
You can now use the reports to display monitoring data gathered by the OS
Monitoring Agents. To learn more on how to run, administer, and edit Cognos
reports in Tivoli Common Reporting, see the Working with reports topics.
Procedure
1. Install and configure the Tivoli Data Warehouse and warehouse agents:
Warehouse Proxy agent and Summarization and Pruning agent. (See IBM Tivoli
Monitoring Installation and Setup Guide.)
2. Set up historical collection using the Historical Collection Configuration feature
in the Tivoli Enterprise Portal. (See Historical collection configuration.) For
z/OS-based monitoring agents, configure the persistent data store using the
337
What to do next
After starting the Tivoli Data Warehouse, the warehouse agents, and data
collection, allow enough time for the Tivoli Data Warehouse to save historical data
for your requested report time period or the appropriate amount of data for a
summarized report. For example, if you want a monthly report, you need at least a
month's worth of stored data.
Procedure
1. Launch the Tivoli Integrated Portal administrative console and log in.
In the navigation tree, expand the Reporting item.
Click Common Reporting with BIRT.
In the report navigation window, click the Navigation tab (default).
Right-click the root node of the navigation tree (Report Sets) and click Import
Report Package.
6. Specify the location and file name of the report package .zip file to import. You
must specify the name of a security set. You can type directly in the entry field
or click Browse to open a file selection window from which you can select the
report package file. If you want to overwrite existing reports, select
Overwrite to indicate that any existing file with the same name as an
imported file is to be overwritten.
2.
3.
4.
5.
338
Results
The Navigation tree shows an item for the reports and items for subsets of the
reports.
What to do next
Changing the data source in a report will change the data sources for all reports.
You do not need to repeat the change for all reports.
Related reference
Tivoli Common Reporting Information Center - Importing a report package
Procedure
1. Locate the JDBC driver files:
IBM DB2 db2jcc.jar and db2jcc.license_cu.jar
C:\Program Files\IBM\SQLLIB\java
db2_installdir/java
For example, the default DB2 on the workstation Version 9 installation
directory is /usr/opt/db2_09_01 on AIX and /opt/IBM/db2/V9.1 on
Linux and Solaris.
The JDBC drivers are typically found in this default DB2 installation
path or in the java directory of whatever alternate path you specified
for DB2 installation.
You can also download the IBM DB2 Driver for JDBC and SQLJ from
the IBM website.
Microsoft SQL Server sqljdbc.jar
Download the Microsoft SQL Server JDBC Driver from the Microsoft
website. The SQL Server 2005 JAR file name and location after
installation is mssql2005installdir/sqljdbc_1.1/enu/sqljdbc.jar.
Oracle oraclethin.jar
Obtain the JDBC Type 4 driver from the Oracle website. The Oracle
JDBC driver JAR file name and location after installation is
oracleinstalldir/jdbc/lib/oraclethin.jar.
2. Copy the JDBC driver to your Tivoli Common Reporting installation directory:
v tcr_install_dir/products/tcr/lib/birt-runtime-2_2_1/ReportEngine/
plugins/ org.eclipse.birt.report.data.oda.jdbc_2.2.1.r22x_v20070919/
drivers
339
v For a DB2 data source, copy the DB2 JDBC drivers as well as the license jar
file to the same location. You can copy db2jcc.jar and db2jcc_licence_cu.jar
file on the db2 server system from db2_installdir/javalocation (for
example, C:\Program Files\IBM\SQLLIB\java).
3. Right-click the name of a report and click Data Sources.
4. Click Edit in the Report Data Sources dialog. Open the Enabling a JDBC Driver
list to see the location for the JDBC drivers.
5. In the JDBC Driver field, enter the path to the JDBC driver:
IBM DB2
com.ibm.db2.jcc.DB2Driver
Oracle
oracle.jdbc.driver.OracleDriver
Example: jdbc:sqlserver://
tivreporting.raleigh.ibm.com:1433;databasename=WAREHOUS;
Oracle
jdbc:oracle:thin:@<HOSTNAME>:<DBPORT>:<DBNAME>
Example:
jdbc:oracle:thin:@tivreporting.raleigh.ibm.com:1521:WAREHOUS
7. Change your username and password in the window to be the same as your
database manager login ID (for example, your DB2 username).
8. Click Save.
What to do next
For additional information, refer to the JDBC driver section of the IBM Tivoli
Common Reporting: Development and Style Guide on IBM developerWorks Tivoli
Common Reporting space.
For more information about Tivoli Data Warehouse connectivity issues, refer to
Part 5. Setting up data warehousing in IBM Tivoli Monitoring Installation and
Setup Guide.
340
Procedure
1. Launch the Tivoli Common Reporting Browser. From the Start menu, select All
Programs > Tivoli Common Reporting > Launch Reporting Browser and log
into the Tivoli Integrated Portal.
2. In the navigation tree on the left, expand the Reporting item.
3. Click Common Reporting with BIRT. All the reports available (all the report
packages that you have imported) are displayed in the text area of the screen.
4. On the Navigation tab, expand the Tivoli Products item.
5. Select the Tivoli product whose reports you want to use from the list of
available products.
6. If this is the first time you have run reports based on data from the Tivoli Data
Warehouse, perform the following steps:
a. Define the Tivoli Data Warehouse as the data source for your reports. For
information about data sources, refer to the IBM Tivoli Common Reporting
User's Guide or the online help for Tivoli Common Reporting.
b. Copy the required JDBC drivers from the local or remote database manager
that you are using to run the Tivoli Data Warehouse into the Tivoli
Common Reporting server directory.
You might need to increase the default heap size for the Java Virtual Machine
(JVM) on the Java command to start the Tivoli Common Reporting server. If
you see these messages displayed when you create a report, default heap size
might be your problem:
Processing has ended because of an unexpected error.
See the Tivoli Common Reporting log files for more information.
See OMEGAMON XE and Tivoli Management Services on z/OS: Reports for Tivoli
Common Reporting for information on how to increase the default heap size.
7. Click the icon beside a report name to launch the parameters window and
produce a report in the desired format. You can select from these report format
by right-clicking the report name and selecting one of these report formats:
HTML (the default), PDF, Microsoft Word, Microsoft Excel, or Adobe Postscript.
When you select a report from Tivoli Common Reporting, you are presented
with a Report Parameters window that prompts you for information that will
be used to generate the report. The title of the parameters window indicates the
type of report that will be generated. For a description of the types of reports,
see the Agent user's guide or Product reporting guide for the agent or product
with which you are working.
A Report Parameters window contains some fields common to all reports (for
example, timeframe). Other fields are specific to the agent running the reports.
For most reports, you select a timeframe, resources, the summarization level of
the data, and the attributes to graph, or press Enter to accept all displayed
defaults.
8. Click Run to generate a report matching your parameter definitions.
Results
You will see an hour glass while Tivoli Common Reporting gathers report data and
creates formatted output. After processing finishes, the report viewer opens in a
new browser tab or instance, displaying the formatted report using the appropriate
browser plug-in. You can view the report in your browser or save the formatted
output using the browser or plug-in capabilities.
341
What to do next
If no report is generated or you see a message indicating that the requested data is
unavailable, refer to the IBM Tivoli Common Reporting User's Guide for information
about defining a data source.
If you are viewing an HTML or PDF report, you can also click any embedded links
to open drill-through reports. Clicking a drill-through embedded link causes the
report to link back to itself with the newly passed parameters or to a secondary
(drill-down or summarized) report. Examples of drill-through links include clicking
on a bar or line chart or on a table heading.
342
343
344
Procedure
v
1. Open a command prompt window: Start Run, enter CMD.
2. Change to the Install_dir\CNPS directory.
3. Enter: migrate-export
The migrate-export script generates a file named saveexport.sql in the
Install_dir\CNPS\sqllib subdirectory. It contains all the Tivoli Enterprise Portal
Server data.
v
1. On the source system, open a terminal window.
2. Change to the bin subdirectory of your IBM Tivoli Monitoring installation,
such as: cd /opt/IBM/ITM/bin
3. Enter: ./itmcmd execute cq "runscript.sh migrate-export.sh" Be sure to
use the " double-quote symbol and not ' single-quote.
The migrate-export script generates a file named saveexport.sql in the
Install_dir/$platform/cq/sqllib subdirectory. It contains all the Tivoli
Enterprise Portal Server data.
345
Procedure
1. Stop the portal server on the target system.
2. On the source system, open a command prompt: Click Start Run, and enter
CMD.
3. Copy file saveexport.sql that was generated by the migrate-export.bat script
from the source system to Install_dir\CNPS\sqllib on the destination system,
where <mapped drive on destination system> is the disk drive on the source
system where this file resides. Example:
copy <mapped drive on destination system>:\IBM\ITM\CNPS\sqllib
\saveexport.sql c:\ibm\itm\cnps\sqllib
If a drive is not already defined, you must map a drive to the source system
from the destination system with the net use command.
4. On the target system, change to the Install_dir\CNPS directory and enter:
migrate-import. Running the migrate-import process stops the portal server if
it is currently running.
5. If you are using the migrate-import function to move the TEPS database from
one release to another, perform this task after migrating the database to add
application support:
a. Open <install_dir>\CNPS\kfwalone in a text editor.
b. Set KFW_MIGRATE_FORCE=Y, then save and close the file.
c. Invoke this script to apply the current portal server application support to
the newly migrated TEPS database: <install_dir>\CNPS\
buildpresentation.bat
6. Restart the portal server.
Procedure
1. Stop the portal server on the target system.
2. On the source system, open a command prompt: Click Start Run, and enter
CMD.
3. Copy saveexport.sql that was generated by the migrate-export.bat script from
the source Windows system to the target system's Install_dir/$platform/cq/
sqllib directory, where $platform is li6243 for Intel Linux or ls3263 for zSeries
Linux on the destination system.
4. Open a terminal window on the target system.
5. Change to the bin subdirectory of the Tivoli Monitoring installation:
Install_dir/bin. For example,
346
cd /opt/IBM/ITM/bin
8. Restart the portal server from the Install_dir/bin directory with the following
command:
./itmcmd agent start cq
Procedure
1. Stop the portal server on the target system.
2. Copy file saveexport.sql that was generated by the migrate-export script from
the source Linux or UNIX system ( /opt/IBM/ITM/$platform/cq/sqllib) to
Install_dir\CNPS\sqllib on the target system.
3. On the target system, change to the Install_dir\CNPS directory and enter:
migrate-import. Running the migrate-import process stops the portal server if
it is currently running.
4. If you are using the migrate-import function to move the TEPS database from
one release to another, perform this task after migrating the database to add
application support:
a. Open <install_dir>\CNPS\kfwalone in a text editor.
b. Set KFW_MIGRATE_FORCE=Y, then save and close the file.
c. Invoke this script to apply the current portal server application support to
the newly migrated TEPS database: <install_dir>\CNPS\
buildpresentation.bat
Chapter 16. Replicating the Tivoli Enterprise Portal Server database
347
Procedure
1. Stop the portal server on the target system.
2. Copy file saveexport.sql that was generated by the migrate-export script from
the source Linux or UNIX system Install_dir/$platform/cq/sqllib directory
to the same directory on the target system, where Install_dir is the installation
directory on the destination system, such as /opt/IBM/ITM/, and $platform is
the operating system, such as li6243 for Intel Linux or ls3263 for zSeries Linux.
3. Open a terminal window on the target system.
4. Change to the bin subdirectory of the Tivoli Monitoring installation:
Install_dir/bin. For example,
cd /opt/IBM/ITM/bin
Be sure to use the " double-quote symbol and not ' single-quote. The script
processes a file named saveexport.sql in the IBM/ITM/$platform/cq/sqllib
subdirectory. Depending on the contents of the saveexport.sql file, this process
can completely replace the existing portal server data.
6. If you are using the migrate-import function to move the TEPS database from
one release to another, perform this task after migrating the database to add
application support:
a. Open Install_dir/cq/bin/lnxenvnocms in a text editor.
b. Set KFW_MIGRATE_FORCE=Y, then save and close the file.
c. Invoke the following script to apply the current portal server application
support to the newly migrated TEPS database: Install_dir/bin/itmcmd
execute cq InstallPresentation.sh. For example,
/opt/IBM/ITM/bin/itmcmd execute cq InstallPresentation.sh
7. Restart the portal server from the Install_dir/bin directory with the following
command:
./itmcmd agent start cq
348
Defining hubs
The procedure below describes how you can use the Manage Tivoli Monitoring
Services to activate the SOAP server and define the hubs with which the SOAP
server communicates.
Copyright IBM Corp. 2005, 2010
349
Procedure
1. On the computer where the hub monitoring server is installed, start Manage
Tivoli Monitoring Services:
Click Start Programs IBM Tivoli Monitoring Manage
a.
Tivoli Monitoring Services.
or
Change directory to <itm_install_dir>/bin and
b.
enter: ./itmcmd manage
2. Right-click Tivoli Enterprise Monitoring Server and click Reconfigure.
3. Select or clear the Security: Validate User field.
4. Open Manage Tivoli Monitoring Services.
5. Right-click Tivoli Enterprise Monitoring Server.
6. Click Advanced Configure SOAP Server Hubs.
7. Click Add Hub. The Hub Specification window is displayed.
8. Select the communications protocol to be used with the from the Protocol
menu.
9. Specify an alias name in the Alias field (for example: HUB2). Alias names can
be a minimum of 3 characters and a maximum of 8 characters.
10. Perform one of the following steps:
a. If you are using TCP/IP or TCP/IP Pipe communications, complete the
following fields:
Table 53. TCP/IP Fields in Hub Specification Dialog
Field
Description
Hostname or IP Address
Port
Description
Network Name
LU Name
LU6.2 LOGMODE
TP Name
350
Adding users
Define users on each hub and specify access rights for each user (query or update)
by following the procedure below.
Procedure
1. Select the server (click anywhere within the server tree displayed), if required.
2. Under Add User Data, type the user name. User IDs must be identical to those
specified for monitoring server logon validation. Access is restricted to only
that monitoring server to which a user has access.
Note: If you do not supply a user ID, all users are given permission to update
data.
3. Click the type of user access: Query or Update.
4. Click Add User. The server tree is updated, showing the user and type of
access.
5. To delete a user: Select the user name from the tree and click Delete Item.
6. To delete a hub: Click anywhere within the hub's tree and click Clear Tree.
Procedure
1. Change to the <itm_install_dir>/bin directory and start Manage Tivoli
Monitoring Services by entering the following command:
./itmcmd manage
351
b. Specify an alias name in the Alias field. Alias names can be a minimum of 3
characters and a maximum of 8 characters (for example, HUB2).
c. Select the communications protocol to be used with the hub from the
Transport menu.
6. Click Add Host. The server tree is displayed, with the newly defined hub.
Procedure
Access a user account that has root privileges and issue the following command:
no -p -o tcp_nodelayack=1
Results
The following output is typical:
Setting tcp_nodelayack to 1
Setting tcp_nodelayack to 1 in nextboot file
This is a dynamic change that takes effect immediately. The -p flag makes the
change persistent, so that it is still in effect the next time you start the operating
system.
352
User IDs
At installation and configuration time, you are asked to supply user IDs for those
who need access to monitoring server data. If no user IDs are supplied, all users
are given permission to update data.
User IDs must be identical to those specified for monitoring server logon
validation. Access is restricted to only that monitoring server to which a user has
access.
You can also make changes at a later time to add or to remove users' access to
monitoring server data. See the IBM Tivoli Monitoring: Installation and Setup Guide
for details.
353
Note: Before you can access newly created Universal Agent objects, the hub
monitoring server where the SOAP server is running must be recycled. See the
IBM Tivoli Monitoring Installation and Setup Guide for instructions on configuring the
hub monitoring server.
Procedure
1. Start Internet Explorer version 5 or higher or Mozilla Firefox . Be sure to enable
the Access data sources across domains option in Internet Explorer's security
settings.
2. In the Address field, type the URL for the SOAP client, where localhost can be
used literally when accessing the SOAP server running on the same system or
changed to the proper host name or network address of a SOAP server running
on a different system:
http://localhost:1920///cms/soap/kshsoap.htm
What to do next
When issuing a CT_Get request against a particular agent type, the monitoring
server where the SOAP server is running must be configured and have the
application support for that agent type. For example, when issuing a CT_Get
request for a z/OS agent connected to an z/OS monitoring server, the monitoring
server running the SOAP server must be configured and have the application
support for that z/OS agent.
354
Procedure
v
1. On the Tivoli Enterprise Monitoring Server system where the SOAP server is
installed, change to the Install_dir\cms directory.
2. Create a text file named SOAPREQ.txtand type the following SOAP request:
<CT_Get><object>ManagedSystem</object></CT_Get>
3. Create another text file named URLS.txt containing the URLs to receive the
SOAP request. In this example, affiliatecompanylocalhost is the name of the
receiving system and where the hub monitoring server is installed:
http://affiliatecompanylocalhost:1920///cms/soap
4. At the command line, enter kshsoap SOAPREQ.txt URLS.txt
Run the kshsoap script located in the Install_dir/interp/ms/bin
v
directory.
v When running the kshsoap command on systems that have APPN installed, you
might encounter an error message stating that an APPN file needs to be
configured. To resolve this situation, modify the environment variable
KDE_WAPPC32 from the command line window that you are going to run the
kshsoap command in:
SET KDE_WAPPC32=none
Results
The kshsoap utility processes the SOAPREQ file and displays the URL destination
and request. It sends the SOAP request to each URL listed in the URLS file, then
displays the URL and the response message received.
where:
CT_Execute is the name of the SOAP method that allows you to run a SOAP
request that is stored in a file.
SOAPREQ is the name of the file you created that contains the CT_EMail
SOAP request
For example, SOAPREQ might contain:
355
<CT_EMail><server>n-smtpmta</server>
<sender>[email protected]</sender>
<receiver>[email protected]</receiver>
<subject>AFDATA untouched by human hands</subject>
<attachmenttitle>AFData.htm</attachmenttitle>
<request><attach>res.pfx</attach></request>
<request id="XMLID">
<CT_Redirect endpoint="http://sp22.ibm.com:18882">
<SOAP-ENV:Envelope xmlns:SOAP-ENV=
"http://schemas.xmlsoap.org/soap/envelope/"
xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" >
<SOAP-ENV:Body><AF_Execute><Exec>SOAP0002</Exec></AF_Execute></SOAP-ENV:Body>
</SOAP-ENV:Envelope></CT_Redirect></request>
<request><attach>res.sfx</attach></request></CT_EMail>
SOAP methods
Use the predefined SOAP methods to compose requests for invocation by PERL,
Javascript, VBSCRIPT, JSCRIPT, C++, Java, and through a browser. With each
method is a list of supported tags and usage examples. Each SOAP method
provided by IBM and its supported tags is described here.
CT_Acknowledge
Send an event acknowledgement into the IBM Tivoli Monitoring platform.
<name>
The name of the situation. This is required.
<source>
The source of the event (agent name or monitoring server name). The
acknowledge applies to all the active sources of the named alert if the
source is not supplied.
<data>
"No data was provided" is inserted if not provided.
<item>
Display item.
<userid>
Optional. The user ID to access the hub monitoring server.
"nnn.nnn.nnn.nnn" is inserted if not provided.
<password>
Optional. The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<type>
Optional. Specifies the event type. The value can be "sampled" or "0",
"pure" or "1", and "meta" or "2". Default: sampled
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
<expire>
Optional. Expires the acknowledgement after the number of minutes
entered here.
Example:
356
<CT_Acknowledge>
<hub>z/OSPROD</hub>
<name>situation_from_CT</name>
<source>CT_supported_system</source>
<data>Jack is taking care of this failure</data>
<item>subsystem</item>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
<type>pure</type>
<expire>60</expire>
</CT_Acknowledge>
CT_Activate
Start a situation or a policy running on the IBM Tivoli Monitoring platform.
Note: Situations for agents connecting to a remote Tivoli Enterprise Monitoring
Server cannot be started using this method.
<name>
The name of the situation. This is required.
<type>
The type of object being activated. This is required.
<userid>
Optional. The user ID to access the hub monitoring server.
"nnn.nnn.nnn.nnn" is inserted if not provided.
<password>
The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
Example:
<CT_Activate>
<hub>z/OSPROD</hub>
<name>name_of_situation_or_policy</name>
<type> situation</type>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Activate>
CT_Alert
Send an event into the IBM Tivoli Monitoring platform.
<name>
The name of the situation. This is required.
<source>
The source of the event (agent name or monitoring server name). This is
required
<data>
"No data was provided" is inserted if not provided or if no optional
object.attribute tag provided..
<item>
Display item.
Appendix A. Tivoli Enterprise Monitoring Web Services
357
<userid>
Optional. The user ID to access the hub monitoring server.
"nnn.nnn.nnn.nnn" is inserted if not provided.
<password>
Optional. The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<type>
Optional. Specifies the event type. The value can be "sampled" or "0",
"pure" or "1", and "meta" or "2". Default: sampled
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
<data><object.attribute>
Returns the value of the attribute (or attributes) specified to the Initial
Attributes view of the Event results workspace.
Example:
<CT_Alert>
<hub>z/OSPROD</hub>
<name>situation_from_XXX</name>
<source>XXX_supported_system</source>
<data><NT_Logical_Disk.Disk_Name>
C:</NT_Logical_Disk.Disk_Name></data>
<item>subsystem</item>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Alert>
Note: When you specify object.attribute in the data tag, leave out any
non-alphanumber characters other than the underscore (_). For example,
NT_System.%_Total_Processor_Time is entered as
NT_System.Total_Processor_Time.
CT_Deactivate
Stop a situation or policy on the IBM Tivoli Monitoring platform.
Note: Situations for agents connecting to a remote Tivoli Enterprise Monitoring
Server cannot be stopped with this method.
<name>
The name of the situation or policy. This is required.
<type>
The type of object (situation or policy). This is required.
<userid>
The user ID to access the hub monitoring server. "nnn.nnn.nnn.nnn" is
inserted if not provided.
<password>
The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
358
Example:
<CT_Deactivate>
<hub>z/OSPROD</hub>
<name>name_of_situation_or_policy</name>
<type>situation</type>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Deactivate>
CT_EMail
Send the output from another CT SOAP method, such as CT_Get, using e-mail
through an SMTP server to a defined e-mail address (not available on z/OS).
<server>
The smtp server name/network address is required.
<sender>
Sender's e-mail address is required.
<receiver>
Receiver's e-mail address is required.
<subject>
Optional. E-mail subject.
<message>
Optional. E-mail message.
<attachmenttitle>
Optional. Title of an attachment.
<request>
When specifying a second-level request, such as CT_Get, each sub-request
must be included within a <request> </request> tag.
Optional: An id=" " element added to the <request> tag generates a
<request id="XMLID"> element enclosing the corresponding response for
that sub-request.
Example:
<CT_EMail>
<server>smtp.server</server>
<sender>[email protected] </sender>
<receiver>[email protected] </receiver>
<subject>Heres your data.</subject>
<message>Table data supplied as attachment below. It is
presented in csv format to be used by MS/Excel.</message>
<attachmenttitle>tabledata.csv</attachmenttitle>
<request id=XMLID>
<CT_Get>
<object>NT_Process </object>
<target>TlPrimary:DCSQLSERVER:NT</target>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Get>
</request>
</CT_EMail>
CT_Execute
Runs the SOAP request that is stored in a file.
359
<filename>
Specifies the file name that contains the SOAP request to be run. The file
must reside in the \html directory. On z/OS, it must reside in
RKANDATV. This is required.
Example:
<CT_Execute>
<filename>execute1.xml</filename>
</CT_Execute>
CT_Export
Send the output from another CT SOAP method, such as CT_Get, to a defined file
(not available on z/OS).
<filename>
The name of the file to contain the exported data. This is required.
Note: When inserting the file name tag into a quoted string literal of
certain programming languages, such as C++, back slashes must be
doubled.
To the <filename> tag, you can add an optional date/time stamp variable.
The variable is enclosed in dollar signs ($) and can contain a combination
of yy/mm/dd/hh/mm/ss (for year/month/day/hours/minutes/seconds).
The date/time stamp attributes can be specified in any order, except mm
must be preceded by yy or hh to identify it as either month (after year) or
minutes (after hours). For example:
<filename>g:\exchange\excel\ntprocess$yymmdd$.htm</filename>
<warehouse/>
Specifies that data is to be exported to the Tivoli Enterprise Portal data
warehouse through ODBC. <filename> and <warehouse/> are mutually
exclusive, but one must be supplied.
<request>
When specifying a second-level request, such as CT_Get, each sub-request
must be included within a <request> </request> tag.
Optional: An id=" " element added to the <request> tag generates a
<request id="XMLID"> element enclosing the corresponding response for
that sub-request.
Example:
<CT_Export>
<filename>g:\exchange\excel\ntprocess$yymmddhhmmss$.htm</filename>
<request>
<attach>prefix.xsl</attach>
</request>
<request id="XMLID">
<CT_Get>
<object>NT_Process</object>
<target>Primary:DCSQLSE RVER:NT</target>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Get>
</request>
360
<request>
<attach>suffix.xsl</attach>
</request>
</CT_Export>
CT_Get
Receive a group of XML objects or individual XML objects from any IBM Tivoli
Monitoring platform agent. You can use this to obtain real time data.
Important: When issuing a CT_Get request against a particular agent type, the
monitoring server where the SOAP server is running must be configured and
seeded for that agent type.
<object>
The name of the object to be retrieved. Required (by default, retrieves all
the public elements of an object).
<userid>
The user ID to access the hub monitoring server. "nnn.nnn.nnn.nnn" is
inserted if not provided.
<password>
The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<target>
Name of the agent.
Caution: Defaults to "*ALL". Retrieves all available targets.
<history>
Y retrieves historical data if available.
<results>
PARSE retrieves status history event attributes. Only valid for
Status_History object.Multiple: more than one can be specified.
<attribute>
Attribute name of object. This tag can be specified multiple times.
<hub>
Specifies the alias name of a remote hub that has been configured in the
hubs list. The SOAP request is routed to this hub.
<afilter>
Returns rows meeting filter criteria, such as attribute; operator; value
operators: EQ, NE, GE, GT, LE, LT, LIKE. Like pattern characters: '%'
matches any single character. ' * ' matches one or more characters. Only
supported for character attributes. Multiple afilters are only supported as
conjuncts, for example, using AND to join together.
Example:
<CT_Get>
<hub>z/OSPROD</hub>
<object>NT_System</object>
<target>Primary:DCSQLSERVER:NT</target>
<userid>sysadmin</userid>
<password></password>
<history>Y</history>
<attribute>Server_Name</attribute>
361
<attribute>Processor_Queue_Length</attribute>
<afilter>Write_Time;GT;1020804</afilter>
<afilter>Write_Time;LT;1020805</afilter>
</CT_Get>
Note: When you specify an attribute in the attribute tags, leave out any
non-alphanumeric characters other than the underscore (_). For example,
%_Total_User_Time is entered as Total_User_Time.
CT_Redirect
Reroute a SOAP request to another registered SOAP method outside of the domain
of the IBM Tivoli Monitoring platform.
<request endpoint=" ">
The <request endpoint= " "> value must specify the target of the redirected
SOAP request. The entire XML supplied as the value of the request
element is sent to that endpoint. When CT_Redirect is specified within a
second- level request, such as, CT_Export, the <endpoint=" "> attribute is
specified only within the CT_Redirect method. This is required.
Example:
<CT_Redirect>
<request endpoint= \"http://services.xmethods.net:80/soap/servlet/rpcrouter\">
<SOAP-ENV:Envelope xmlns:SOAP-ENV=\"http://schemas.xmlsoap.org/soap/envelope/\">
<SOAP-ENV:Body>
<ns1:getTemp xmlns:ns1=\"urn:xmethods-Temperature\"SOAP-ENV:
encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\">
<zipcode>93117</zipcode>
</ns1:getTemp>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
</request>
</CT_Redirect>
CT_Reset
Send an event reset (close event) to the IBM Tivoli Monitoring platform.
<name>
The name of the situation. This is required.
<source>
The source of the event (agent name or monitoring server name). The reset
applies to all the active sources of the named alert if the source is not
supplied.
<item>
Display item.
<userid>
Optional. The user ID to access the hub monitoring server.
"nnn.nnn.nnn.nnn" is inserted if not provided.
<password>
Optional. The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
362
<type>
Optional. Specifies the event type. The value can be "sampled" or "0",
"pure" or "1", and "meta" or "2". Default: sampled
Example:
<CT_Reset>
<hub>z/OSPROD</hub>
<name>situation_from_CT</name>
<source>CT_supported_system</source>
<item>subsystem</item>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Reset>
Note: Sampled events can be closed only if the situation has been stopped or
deleted. Use the <type> tag if CT_Reset will be closing a pure event.
CT_Resurface
Resurface an acknowledged event in the IBM Tivoli Monitoring platform.
<name>
The name of the situation. This is required.
<source>
The source of the event (agent name or monitoring server name). The
resurface applies to all the active sources of the named alert if the source is
not supplied.
<item>
Display item.
<userid>
Optional. The user ID to access the hub monitoring server.
"nnn.nnn.nnn.nnn" is inserted if not provided.
<password>
Optional. The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
<type>
Optional. Specifies the event type. The value can be "sampled" or "0",
"pure" or "1", and "meta" or "2". Default: sampled
Example:
<CT_Resurface>
<hub>z/OSPROD</hub>
<name>situation_from_CT</name>
<source>CT_supported_system</source>
<item>subsystem</item>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_Resurface>
CT_WTO
Send a Universal Message into the IBM Tivoli Monitoring Platform.
Appendix A. Tivoli Enterprise Monitoring Web Services
363
<data>
The message to be sent. This is required.
<category>
Optional. Blank is the default.
<severity>
Optional. Blank is the default.
<userid>
Optional. The user ID to access the hub monitoring server.
"nnn.nnn.nnn.nnn" is inserted if not provided.
<password>
Optional. The password to access the hub monitoring server. Required for
monitoring server/hub logon validation.
<hub>
Optional. Specifies the alias name of a remote hub that has been
configured in the hubs list. The SOAP request is routed to this hub.
Example:
<CT_WTO>
<hub>z/OSPROD</hub>
<data>This is Universal Message</data>
<category>Critical Messages</category>
<severity>High Severity</severity>
<userid>sysadmin</userid>
<password>xxxxxxxx</password>
</CT_WTO>
364
<CT_Export>
<filename>tabledata.htm</filename>
<request>
<attach>prefix.xls</attach>
</request>
<insert>
<insertelement>
<insertdata>
This data has been inserted complements of CT SOAP server.
</insertdata>
</insertelement>
</insert>
<request id="NTDATA">
<CT_Get>
<userid>sysadmin</userid>
<password></password>
<object>NT_System</object>
<target>*ALL</target>
</CT_Get>
</request>
<request>
<CT_Redirect endpoint="http://services.xmethods.net:80/soap/servlet/rpcrouter">
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">
<SOAP-ENV:Body>
<ns1:getTemp xmlns:ns1="urn:xmethods-Temperature" SOAPENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<zipcode>93117</zipcode>
</ns1:getTemp>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
</CT_Redirect>
</request>
<request>
<attach>suffix.xls</attach>
</request>
</CT_Export>
365
<User_Name>SYSTEM</User_Name>
<Operating_System_Type>Windows_NT</Operating_System_Type>
<Operating_System_Version>4.0</Operating_System_Version>
<Network_Address>10.21.2.154</Network_Address>
<Number_of_Processors dt:dt="number">1</Number_of_Processors>
<Processor_Type dt:dt="number">586</Processor_Type>
<Page_Size dt:dt="number">4096</Page_Size>
<_Total_Privileged_Time dt:dt="number">1</_Total_Privileged_Time>
<_Total_Processor_Time dt:dt="number">7</_Total_Processor_Time>
<_Total_User_Time dt:dt="number">6</_Total_User_Time>
<Context_Switches_Sec dt:dt="number">1745</Context_Switches_Sec>
<File_Control_Bytes_Sec dt:dt="number">4500</File_Control_Bytes_Sec>
<File_Control_Operations_Sec dt:dt="number">98
</File_Control_Operations_Sec>
<File_Data_Operations_Sec dt:dt="number">28
</File_Data_Operations_Sec>
<File_Read_Bytes_Sec dt:dt="number">800</File_Read_Bytes_Sec>
<File_Read_Operations_Sec dt:dt="number">27
</File_Read_Operations_Sec>
<File_Write_Bytes_Sec dt:dt="number">9772</File_Write_Bytes_Sec>
<File_Write_Operations_Sec dt:dt="number">1
</File_Write_Operations_Sec>
<Processor_Queue_Length dt:dt="number">0</Processor_Queue_Length>
<System_Calls_Sec dt:dt="number">2368</System_Calls_Sec>
<System_Up_Time dt:dt="number">956388</System_Up_Time>
<Total_Interrupts_Sec dt:dt="number">1076</Total_Interrupts_Sec>
</ROW>
</DATA>
</TABLE>
</SOAP-CHK:Success>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
366
367
368
Report contents
You can design a report to contain both a table and a chart view. You might want
to add a Table/Chart button that allows you to toggle between the chart and the
table view.
369
370
Procedure
To make a create-type IDML book, enter the following command:
Install_dir\CNPS\tmsdla.bat
v
command:
371
Results
The DLA generates the XML output file to the same directory on the portal server.
The name of this file follows the standard Discovery Library file name format. To
use this information in the CCMDB, you must transfer the XML file to the
Discovery Library File Store and then use the Discovery Library Bulk Loader.
Related reference
Tivoli Change and Configuration Management Database
Problems with the Tivoli Monitoring DLA
Tivoli Monitoring Command Reference
372
agentStatusEvent
The agentStatusEvent is a monitoring agent operational status information trap
generated by the Tivoli Autonomous Agent SNMP Event Exporter to inform and
notify about a specific agent operational event.
Specific trap: 20
Access: read-only
Status: mandatory
Table 55. SNMP trap variables for agentStatusEvent
Variable
Description
OID
agentSit-Name
1.3.6.1.4.1.1667.1.2.1.10.1.3
agentSitOriginNode
agentSitLocalTimeStamp
autoSit-Category
1.3.6.1.4.1.1667.1.2.1.10.1.5
373
Description
OID
autoSit-Severity
autoSit-StatusText
autoSit-Interval
1.3.6.1.4.1.1667.1.2.1.9
agentSitSampledEvent
A sampled situation event was detected. This trap was generated by the Tivoli
Autonomous Agent SNMP Event Exporter in response to a situation threshold
being exceeded at the time of the data sampling.
Specific trap: 21
Access: read-only
Status: mandatory
Table 56. SNMP trap variables for agentSitSampledEvent
374
Attribute
Description
OID
agentSitApplication
1.3.6.1.4.1.1667.1.2.1.10.1.1
agentSit-Table
1.3.6.1.4.1.1667.1.2.1.10.1.2
agentSit-Name
1.3.6.1.4.1.1667.1.2.1.10.1.3
agentSitOriginNode
Description
OID
agentSitLocalTimeStamp
agentSit-Context
1.3.6.1.4.1.1667.1.2.1.10.1.6
Unique situation context identifier,
expressed as an integer (-2147483647 to
2147483647). This is the handle number
identifying an agent running request. In
an SNMP environment, trap-direct
polling is typically used whereby a trap
is received and the network manager
polls the originating agent for additional
detailed information. This identifier is
used to supply context for the targeted
agent to correlate the request to the
problem source. Although
agentSit-Context is sent, it is not used in
this release.
agentSitSampleInterval
agentSit-Source
autoSit-Category
1.3.6.1.4.1.1667.1.2.1.10.1.7
375
Description
OID
autoSit-Severity
autoSit-Predicates
sitAttributeList
1.3.6.1.4.1.1667.1.2.1.5
The attribute values for the situation
that is assigned to the monitoring agent,
from 0 to 3200 bytes.
1.3.6.1.4.1.1667.1.2.1.8
agentSitPureEvent
A pure situation event was detected. This trap was generated by the Tivoli
Autonomous Agent SNMP Event Exporter in response to a situation threshold
being exceeded. The variables in a pure event trap are identical to those for a
sampled event trap except there is no agentSit-SampleInterval because pure events
are not sampled; rather the arrival of unsolicited data from the monitored attribute
group causes the situation to become true. A situation created with an attribute
group for a system log, for example, opens a pure event when a log entry arrives.
Specific trap: 22
Access: read-only
Status: mandatory
Table 57. SNMP trap variables for agentSitPureEvent
376
Attribute
Description
OID
agentSitApplication
1.3.6.1.4.1.1667.1.2.1.10.1.1
agentSit-Table
1.3.6.1.4.1.1667.1.2.1.10.1.2
agentSit-Name
1.3.6.1.4.1.1667.1.2.1.10.1.3
agentSitOriginNode
Description
OID
agentSitLocalTimeStamp
agentSit-Context
1.3.6.1.4.1.1667.1.2.1.10.1.6
Unique situation context identifier,
expressed as an integer (-2147483647 to
2147483647). This is the handle number
identifying an agent running request. In
an SNMP environment, trap-direct
polling is typically used whereby a trap
is received and the network manager
polls the originating agent for additional
detailed information. This identifier is
used to supply context for the targeted
agent to correlate the request to the
problem source. Although
agentSit-Context is sent, it is not used in
this release.
agentSit-Source
autoSit-Category
autoSit-Severity
377
378
Attribute
Description
OID
autoSit-Predicates
1.3.6.1.4.1.1667.1.2.1.8
sitAttributeList
Message
Number
Global
Timestamp
Primary:East:NT
KRAIRA005
02/16/2009
12:35:42
Primary:East:NT
KRAIRA005
02/16/2009
12:34:43
Primary:East:NT
KRAIRA005
02/16/2009
12:34:42
379
Server Name
Message
Number
Global
Timestamp
Primary:East:NT
KRAIRA005
02/16/2009
12:34:42
Primary:East:NT
KRAIRA005
02/16/2009
12:34:21
Primary:East:NT
KRAIRA005
02/16/2009
12:32:42
Primary:East:NT
KRAIRA005
02/16/2009
12:32:41
Primary:East:NT
KRAIRA005
02/16/2009
12:31:21
Primary:East:NT
KRAIRA005
02/16/2009
12:29:41
Primary:East:NT
KRAIRA005
02/16/2009
12:29:41
380
Documentation library
This appendix contains information about the publication related to IBM Tivoli
Monitoring and to the commonly shared components of Tivoli Management
Services.
These publications are listed in the following categories:
v IBM Tivoli Monitoring library
v Related publications
See the IBM Tivoli Monitoring Documentation Guide for information about accessing
and using the publications. You can find the Documentation Guide in the IBM Tivoli
Monitoring and OMEGAMON XE Information Center at http://
publib.boulder.ibm.com/infocenter/tivihelp/v15r1/index.jsp. To open the
Documentation Guide in the information center, select Using the publication in the
Contents pane.
To find a list of new and changed publications, click What's new on the Welcome
page of the IBM Tivoli Monitoring and OMEGAMON XE Information Center. To
find publications from the previous version of a product, click Previous versions
under the name of the product in the Contents pane.
381
382
Related publications
You can find useful information about related products in the IBM Tivoli
Monitoring and OMEGAMON XE Information Center at http://
publib.boulder.ibm.com/infocenter/tivihelp/v15r1/index.jsp.
383
384
Support information
If you have a problem with your IBM software, you want to resolve it quickly.
IBM provides ways for you to obtain the support you need.
Online
The following sites contain troubleshooting information:
v Go to the IBM Software Support site at http://www.ibm.com/software/
support/probsub.html and follow the instructions.
v Go to the IBM Tivoli Distributed Monitoring and Application
Management Wiki at http://www.ibm.com/developerworks/wikis/
display/tivolimonitoring/Home. Feel free to contribute to this wiki.
IBM Support Assistant
The IBM Support Assistant (ISA) is a free local software serviceability
workbench that helps you resolve questions and problems with IBM
software products. The ISA provides quick access to support-related
information and serviceability tools for problem determination. To install
the ISA software, go to http://www.ibm.com/software/support/isa.
Troubleshooting Guide
For more information about resolving problems, see the product's
Troubleshooting Guide.
385
Obtaining fixes
A product fix might be available to resolve your problem. To determine which
fixes are available for your Tivoli software product, follow these steps:
1. Go to the IBM Software Support Web site at http://www.ibm.com/software/
support.
2. Under Select a brand and/or product, select Tivoli.
If you click Go, the Search within all of Tivoli support section is displayed. If
you don't click Go, you see the Select a product section.
3. Select your product and click Go.
4. Under Download, click the name of a fix to read its description and, optionally,
to download it.
If there is no Download heading for your product, supply a search term, error
code, or APAR number in the field provided under Search Support (this
product), and click Search.
For more information about the types of fixes that are available, see the IBM
Software Support Handbook at http://www14.software.ibm.com/webapp/set2/sas/
f/handbook/home.html.
386
If you experience problems with the My support feature, you can obtain help in
one of the following ways:
Online
Send an e-mail message to [email protected], describing your problem.
By phone
Call 1-800-IBM-4You (1-800-426-4968).
Support information
387
388
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain
transactions, therefore, this statement might not apply to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
389
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
Such information may be available, subject to appropriate terms and conditions,
including in some cases payment of a fee.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurement may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which
illustrate programming techniques on various operating platforms. You may copy,
modify, and distribute these sample programs in any form without payment to
390
Notices
391
392
Glossary
on and a sound to play for an open event.
Predefined situations are associated
automatically, as are situations created or
edited through the Navigator item pop-up
menu. When you open the Situation
editor from the toolbar, any situations you
create cannot be associated with a
Navigator item during this editing
session. You must close the Situation
editor, then open it again from the pop-up
menu of the Navigator item with which
the situation should be associated.
activity
One phase within a sequence of
predefined steps called a policy that
automate system responses to a situation
that has fired (that is, become true).
administration mode
See workspace administration mode.
affinity
A label that classifies objects by managed
system.
agent
agentless monitor
An agentless monitor uses a standard API
(such as SNMP or CIM) to identify and
notify you of common problems with the
operating system running on the same
computer. Thus, as their name implies,
the agentless monitors can retrieve
monitoring and performance data without
requiring OS agents on the computers
being monitored. The agentless monitors
provide monitoring, data gathering, and
event management for Windows, Linux,
AIX, HP-UX, and Solaris systems.
agentless monitoring server
A computer with an OS agent installed
that has one or more agentless monitors
running on it. Each agentless monitoring
server can support up to 10 active
instances of the various types of agentless
monitors, in any combination. Each
instance can communicate with up to 100
remote nodes, which means a single
agentless monitoring server can support
as many as 1000 monitored systems.
alert
associate
The process of linking a situation with a
Navigator item that enables a light to go
Copyright IBM Corp. 2005, 2010
attribute
(1) A system or application element being
monitored by the , such as Disk Name
and Disk Read/Writes Per Second. (2) A
characteristic of a managed object; that is,
a field in the data structure of a managed
object or in the workspace associated with
that managed object. (3) A field in an
ODBC-compliant database.
attribute group
A set of related attributes that can be
combined in a data view or a situation.
When you open the view or start the
situation, data samples of the selected
attributes are retrieved. Each type of has
its own set of attribute groups.
browser client
The software installed with the that is
downloaded to your computer when you
start in browser mode. The browser client
runs under control of a web browser.
chart
class file
A file containing Java object code for a
single Java object class.
class loader
A Java component that loads Java class
files.
393
client
client/server architecture
An architecture in which the client
(usually a personal computer or
workstation) is the machine requesting
data or services and the server is the
machine supplying them. Servers can be
microcomputers, minicomputers, or
mainframes. The client provides the user
interface and may perform application
processing. In the is the client to the ,
whereas the is the client to the .
A database server maintains the
databases and processes requests from the
client to extract data from or to update
the database. An application server
provides additional business-support
processing for the clients.
Common Object Request Broker Architecture
An industry specification for the design
and standardization of different types of
object request brokers (ORBs). ORBs allow
different computers to exchange object
data; CORBA enables ORBs from different
software vendors (often running under
dissimilar computer systems and
operating systems) to exchange object
data. CORBA is an architecture and
specification that facilitates
communication among program
components in a network using objects.
The is a CORBA implementation.
Configure History permission
Your user ID must have Configure
History permission to open the History
Collection Configuration window for
setting up history files and data rolloff. If
you do not have this permission, you will
not see the menu item or tool for
historical configuration.
CORBA
See Common Object Request Broker
Architecture.
critical state
The indication that a situation associated
with a Navigator item is in an
unacceptable state and that you must take
corrective action. The critical state is
represented by the color red.
Custom Navigator Views permission
Your user ID has a Modify checkbox for
394
DMZ
DSN
endcode
You assign endcodes in a policy as you
connect one activity to another. The
endcode indicates the result of this
activity that will trigger the next activity.
Enterprise Information Base
A database used by the that serves as a
repository of shared objects for all
systems across your enterprise. The EIB
stores all persistent data, including
situations, policies, user definitions, and
managed-object definitions.
enterprise situation
A situation that is created for a Tivoli
Enterprise Monitoring Agent that reports
event indicator
The colored icon that displays over a
Navigator item when an event opens for
a situation.
event item
A Navigator item that shows when you
open the event workspace for a true
situation (by selecting it from the event
flyover listing or from the situation event
console pop-up menu).
event sound
The sound file that plays when an event
opens. This sound file is set in the
Situation editor when the situation is
associated with a Navigator item and can
differ for different Navigator items.
expert advice
A description within the Situation editor
of each situation provided with a
monitoring agent to help you quickly
understand and interpret events arising
from it.
Extensible Markup Language
A data-description language derived from
Standard Generalized Markup Language
(SGML). A tool for encoding messages so
they describe their own fields, XML
allows you to format a document as a
data structure. As program objects, such
documents can have their contents and
data hidden within the object, which
allows you to control who can manipulate
the document and how. In addition,
documents can carry with them the
object-oriented procedures called
methods. The XML standard aids in
exchanging data between applications and
users.
filter criteria
These limit the amount of information
Glossary
395
396
Navigator
The upper-left pane of the window. The
Navigator Physical view shows your
network enterprise as a physical hierarchy
of systems grouped by platform. You can
also create other views to create logical
hierarchies grouped as you specify, such
as by department or function.
Network Address Translation
A scheme used by local-area networks
(LANs) to establish an internal and
external set of IP addresses. Internal IP
addresses are kept private and must be
translated to and from the external
addresses for outbound and inbound
communications. NAT is often used in
firewall configurations.
non-agent bundles
These custom bundles let you remotely
deploy components that need not connect
to a Tivoli Enterprise Monitoring Server,
397
398
sample
The data that the collects for the instance.
The interval is the time between data
samplings.
sampled event
Sampled events happen when a situation
becomes true. Situations sample data at
regular intervals. When the situation
becomes true, it opens an event, which
gets closed automatically when the
situation goes back to false (or when you
close it manually).
server An application that satisfies data and
service requests from clients.
Simple Network Management Protocol
A TCP/IP transport protocol for
exchanging network management data
and controlling the monitoring of network
nodes in a TCP/IP environment. The
SNMP software protocol facilitates
communications between different types
of networks. uses SNMP messaging to
discover the devices on your network and
their availability.
Simple Object Access Protocol
The Simple Object Access Protocol is an
XML-based interface that vendors use to
bridge remote procedure calls between
competing systems. SOAP makes it
unnecessary for sites to choose between
CORBA/Java/EJB and Microsoft's
COM+.
Because XML and SOAP are platformand language-neutral, users can mix
operating systems, programming
languages, and object architectures yet
maintain business-component
interoperability across platforms: using
SOAP, applications can converse with
each other and exchange data over the
Internet, regardless of the platforms on
which they run.
situation
One or more monitored conditions
running on a managed system. The set of
conditions that, when met, creates an
event. A situation comprises an attribute,
function (such as Value of expression or
Percent change in value), a relational
operator such as greater than or equal to,
and a value to be compared. It can be
read as If system condition compared
to value is true. An example of a
symbol
Represents a variable that can be added
to header or footer text for data views,
expert-advice text, or query specification.
The detailed attribute name is enclosed in
dollar signs, such as $ORIGINNODE$,
and resolves to the attribute's value. For
queries, == $NODE$ specifies the managed
systems from which to retrieve data. For
queries to be used in link target
workspaces, you can create symbols for
attributes using the $symbolname$ format.
SNMP
See Simple Network Management
Protocol.
SOAP See Simple Object Access Protocol.
sockets
Refers to the sockets method of passing
data back and forth between a networked
client and server or between program
layers on the same computer.
sound The WAV file that plays whenever a
situation becomes true for the current
Navigator item. Sound is assigned to the
Navigator item for a situation in the same
way a state is assigned.
SQL
state
Take Action
A dialog from which you can enter a
command or choose from a list of
predefined commands. It also lists
systems on which to effect the command,
which is usually a response to an event.
Take Action command
A Take Action command allows you to
send commands to your managed
systems, either automatically, in response
to a situation that has fired (that is,
turned true), or manually, as the operator
requires. With Take Action commands,
you can enter a command or select one of
the commands predefined by your
product and run it on any system in your
managed network. Thus you can issue
Take Action commands either against the
managed system where the situation fired
or a different managed system in your
network.
TCP/IP
See Transmission Control
Protocol/Internet Protocol.
TDW
Glossary
399
400
Glossary
401
402
Index
A
AAGP
See Access Authorization Group
Profile
about this guide xi
Access Authorization Group Profile 228,
261
add managed system 141
additional monitoring server 127
administer users 81
administration
What does a system administrator
do? 15
administration console 72
configure external LDAP server 73
AF REXX 367
agent
slot 102
agent autonomy
activity log 379
agent
operation log 379
capabilities 157
environment variables 160
introduction 157
OMNIbus SNMP probe 208
service interface 227
z/OS 285
Agent Management Services 149
features 149
installation and configuration 151
managing the agent manually 155
monitoring the availability of
agents 155
on system monitor agents 171
take action commands 155
agent operations log
collect history 313
agent service interface
starting 227
Agent Service Interface 227
agent information 232
initiating Centralized
Configuration 283
private history report 234
queries 235
request AGENTINFO 236
request AGENTSTAT 248
request ATTRLIST 238
request CNFGCONTROL 252
request HISTREAD 250
request LISTSUBNODE 238
request PVTCONTROL 246
request READATTR 239
request REPORT 241
request SITSUMMARY 247
request TABLESIT 245
service interface requests 236
situations 233
agent subnodes
private history distribution 175
Copyright IBM Corp. 2005, 2010
B
backing up
queries 343
banner in browser mode 22
BAROC
file generator 117
BAROC event class 110
BIRT reports 337
bootstrap 269
browser client 17, 393
customize the banner 22
enable multiple instances 28
file packages and cookies 21
IE security settings 21
Linux or UNIX
setting browser client
properties 42
setting properties for Linux or
UNIX 42
starting 23
Windows permissions 22
Browser client 19
browser mode
workspace switch delay 38
C
CA certificate
receiving 55
requesting 54
capacity planning
Tivoli Data Warehouse 305
central configuration server
Web server
as central configuration
server 257
Web server as 257
Centralized Configuration 255
AAGP security 228
Disp=Custom security 261
environment variables 270
initiating with a load list file 280
initiating with a service interface
request 283
initiating with agent environment
variables 278
initiating with remote
deployment 281
keywords for load list 267
overview 255
planning 257
sample setup 274
startup 278
XML specification 261
certificate
creating a CA certificate request 54
receiving a CA certificate 55
requesting a CA certificate 54
self-signed certificate, using 55
chart 366
chart view page size 37
CLI 61, 145
client
browser 17
desktop 17
global parameters 35
in an emulation environment 40
Java Web Start 17
using SOAP 353
client/server architecture 394
close
event 108
command line 61
commands
sitconfig.sh 107, 127
common agent package 151
common event console 133
extra column 137
Common Object Request Broker
Architecture 394, 398
communications
heartbeat interval 38
HTTP proxy server 39
pipeline factor 38
components 15
configuration load list 269, 280
environment variables 268
403
D
data conversion
automatic for z/OS systems 321
on a UNIX system 319
using KPDXTRA on the PDS 322
data mart 295
data snapshot 367
data warehouse
capacity planning 305
tuning 305
database server 394
DD names for KPDXTRA
on z/OS 323
ddname KBDXTRA 396
define
monitoring server
See TEMS
delayed acknowledgement 352
delimited flat file 314
desktop client 17, 394
creating a shortcut to launch using
Web Start 27
download from portal server 26
logs, location of 25
multiple instances 28
starting 23
desktop mode
databus parameter 38
Discovery Library Adapter 371
distinguished name
mapping to TEP user ID 88
distinguished names 75, 77
TEPS/e administration console 72
DLA 371
DLL 395
404
duper process 49
duplicate event information 139
Dynamic Link Library 395
EIB 395
EIF 115
event configuration XML 214
event destination XML
specification 221
event mapping XML
specification 216
EIF events
common slots 223
heartbeat 225
heartbeat events 225
life cycle 224
master reset 226
send directly from agent to
receiver 213
enabling tracing for the JRE 25
encrypt 32
Enterprise Information Base 395
Enterprise Integration Facility
Multiple Console Support (MCS 115
TEDGEN tool 115
enterprise monitoring agents 278
enterprise situations and private
situations 172
Environment 24
environment configuration
portal server 44
environment file
portal server 44
environment variables
agent 315
agent autonomy 160
central configuration server and
client 270
configuration load list 268
KCA_CAP_DIR 151
KCA_CMD_TIMEOUT 151
event cache 106
event console 110
event integration facility
enable globalization 103, 126
Event Integration Facility
edit the configuration 129
override the defaults 114, 131
tacmd
createEventDest 129
refreshTECinfo 129
Event Integration FacilitycreateEventDest
edit the configuration 111
tacmd 111
event message 101, 115, 124
event synchronization 107, 127, 139
changing the configuration 107, 127
sitconfig.sh command 107, 127
events
controlling size of attachments 47
synchronizing OMNIbus 126
synchronizing Tivoli Enterprise
Console 106
export
portal server database 344
FIPS support 50
fixes, obtaining 386
from Linux 347
from UNIX 347
from Windows 345, 346
G
generate 366
generic mapping 102, 125
georeferenced map 396
global parameters 35
glossary 393
graphics
customize portal banner 22
GSKit
set the JRE and start Key
Manager 53
H
heartbeat
EIF destination XML 221
historical
file location on Windows 315
historical data
impact of large amounts
collected 294
managing 287, 289
tacmd 289
historical data collection
configure summarization and
pruning 308
performance impact of large data
requests 294
set short-term file size limit 299
historical data conversion 298
on HP NSK 320
on i5/OS 317
on Linux or UNIX 318
on Windows 315
on z/OS 321
historical data files
default tables 299
on z/OS 324
historical reporting
performance impact from large
tables 295
history
about data collection 287
agent operations log 313
best practices 306
change short-term directory 293
convert short-term to flat file 316
data collection 18
exported data logging 303
private 190
See private history
service interface request 250
summarization and pruning 303
history (continued)
warehouse proxy error logging 312
workspace parameter 38
Host-on-Demand 19
hot-standby 396
HP NonStop Kernel 320
HP NSK
using krarloff rolloff program on 321
HTTP
enable proxy server 41
kshsoap command 355
proxy server enablement 41
HTTP server
databus parameter to specify
external 38
hub monitoring server 58, 60
configuring user authentication on
Linux or UNIX 61
configuring user security on
Windows 60
I
i5/OS
historical data conversion 317
IBM Java Web Start
using to download the desktop
client 23
IBM JRE
installing 24
IBM Redbooks 385
IBM Runtime Environments
installing 24
Linux 25
Windows JRE 24
IBM Support Assistant 385
IBM Tivoli Distributed Monitoring and
Application Management Wiki 385
IBM Tivoli Monitoring
components 15
for WebSphere MQ products 320
running on HP NSK systems 320
IBM Tivoli Monitoring Web Services 349
adding users 351
predefined SOAP methods 356
report contents 369
sample CT_Get SOAP request 365
scenarios 366
second-level requests 364
SOAP client 353
SOAP description and URLs 352
SOAP requests as system
commands 355
starting the client 353
user IDs 353
IFS directory 318
import
portal server database 345
portal server database from and to a
Linux or UNIX system 348
importing LTPA keys 76
initiating Centralized Configuration 278
initiating Centralized Configuration by
placing the file 280
install 24
installing 24
integral web server 396
J
Java 24
in an emulation environment 40
JRE on Windows for Java Web
Start 24
Java Database Connectivity 396
Java Runtime Environment 19
for GSKit 53
Java Web Start
download the desktop client 26
using to download the desktop
client 23
Java Web Start client 17
JDBC 396
JRE 24
enabling tracing for 25
K
kcacap.xsd 151
keep 21
key database 53
key database, creating 54
keywords for configuration load list 267
KFW_AUTHORIZATION_
MAX_INVALID_LOGIN 48
KFW_MCS_XML_FILES 115
KFWENV file 44
KHD_HISTSIZE_EVAL_INTERVAL 299,
300
KHD_TOTAL_HIST_MAXSIZE 299, 300
KMS_OMTEC_
GLOBALIZATION_LOC 103, 126
KPDXTRA 322
DDNAMES to be allocated 323
parameters 323
KPDXTRA attribute 322
KPDXTRA program
about 322
messages 324
krarloff 316
krarloff rolloff attribute 321
krarloff rolloff program
converting files on HP NSK 321
HP NonStop Kernel Systems
historical data conversion 320
i5/OS 317
on HP NSK 320
L
launch application 30
LDAP 75
configure an external server 73
portal server configration 68, 71
ldapsearch 62
sample command (no SSL) 63
sample command with SSL 64
ldapsearch command-line options 63
Linux 139, 351
Linux or UNIX
historical data conversion 318
Linux OS lz_situations.xml 186
logon
controlling number of attempts 48
logon error messages 349
LTPA keys 76
M
Manage Tivoli Monitoring Services 61
defining SOAP hubs 350
global parameters 35
managed system
add through the portal 141
apply a patch through the portal 144
configure through the portal 142
description 15
manual conversion 319
map
customizable column 138
customizable columns 138
maximum directory size 300
MCS Attribute Service 115
meta description files 298
MIB for SNMP alerts and agent emits
agentSitPureEvent 208, 373
agentSitSampledEvent 208, 373
agentStatusEvent 208, 373
migrate
authentication 78
migrate-export script 344
migrate-import 345, 346, 347
from Linux or UNIX to Linux or
UNIX 348
migrate-import script 345
monitoring
Agent Management Services 149
monitoring agent 141
apply a patch through the portal 144
assign through the portal 141
configure through the portal 142
Index
405
N
NAT 397
Navigator Physical view 141
Netcool/OMNIbus ObjectServer
See ObjectServer
NetView
console 118
Network Address Translation 397
new in this release 1, 5
administration 4
v6.2.0 11
O
ObjectServer
clearing situation events 128
ODBC 397
OMNIbus 124
configuration 128
EE_HEARTBEAT status events 212
EIF events
OMNIbus heartbeat
automation 212
enabling heartbeat automation 212
enterprise situation event
integration 121
heartbeat automation 212
sample rules for SNMP alerts 210
SNMP alerts
OMNIbus heartbeat
automation 212
OMNIbus alert 121
OMNIbus Connector 136, 138
OMNIbus EIF probe 125
OMNIbus setup to receive SNMP
alerts 208
on the event server
See TEC
one-time conversion 319
online help 30
Open Database Connectivity 397
operation
summary 366
operation log 379
P
parameter
active terminal sessions
406
39
parameter (continued)
agent deploy 36
attachment size 36
databus for desktop mode on an
external HTTP server 38
editing global 35
encoding code set 38
event sound pause 38
heartbeat interval 38
HTTP proxy server 39
mouse drag sensitivity 37
pipeline factor 38
terminal emulator localhost 39
terminal emulator port 39
terminal emulator type 39
terminal script maximum 39
trace calls threaded 40
trace client identifier 36, 40
trace file name 40
trace local or remote 40
trace option 40
trace thread qdepth 40
user.language 40
user.region 41
view change warning prompt 39
view page size 37
Windows task bar 39
workspace history 38
workspace switch delay 38, 39
parameters
See environment variables
password, saving to stash file 56
passwords
encrypt in trap configuration file 207
PDS 325
performance impact
requests for historical data from large
tables 295
warehousing 295
Persistent Data Store 325
Persistent Datastore 396
policy
SOAP requests 355
portal browser client
starting 23
portal client
parameters 36
portal client 36
variables 36
portal desktop client
downloading with IBM Java Web
Start 23
starting 23
portal server
See also TEPS
See also Tivoli Enterprise Portal Server
backup 343
connect to a different 28
distinguished names 77
environment variables 45
export database 344
FIPS enablement 50
import database 345
Linux or UNIX command line to
configure LDAP 71
log onto two from the same
computer 28
Q
qi.ini environment file 44
queries
backing up 343
of k<pc>.atr in the Agent Service
Interface 235
R
reconfigure
browser client 77
recycling a monitoring agent 143
Redbooks 385
release information 1
Remote Procedure Call 398
remove agent 146
replicate the portal server 343
prerequisites 343
RPC 398
rule check utility tool 110
Runtime 24
S
SA IOM REXX application
368
sample
data mart
SQL script 296
sampled situation 108
schedule
history data conversion 319
script
terminal maximum 39
Secure Socket Layer configuration 32
security
See also Access Authorization Group
Profile
portal server for LDAP and SSO 64
security settings 21
self-signed certificate 55
short-term history
data conversion programs 298
limiting file size 299
short-term history file 300, 314
shortcut for launching desktop client 27
Simple Network Management
Protocol 398
Simple Object Access Protocol 398
Simple Object Access Protocol (SOAP)
client requests 349
single sign-on 67, 77
sitconfig.sh command 107, 127
situation
SOAP requests 355
sound parameter 38
situation description 101, 124
situation event 115, 121
situation events
map 99
situation overrides XML 192
situations
autonomous agent behavior 167
duper process 49
event integration with OMNIbus 121
private
See private situations
status in Agent Service Interface 233
SNMP 399
encrypting passkeys 207
MIB agent event types 208, 373
Situation element 203
TrapAttrGroup xml element 202
SNMP alerts 197
configuration 197
from agents with subnodes 168
sample OMNIbus rules 210
sample trap configuration file 197
trap XML specification 199
SNMP element 199
SNMP traps
configuring the OMNIbus
Multi-threaded Trapd probe 208
SOAP 349, 352, 399
browser startup 354
server 351
SOAP client requests 349
SOAP method
CT_Acknowledge 356, 369
CT_Activate 357
CT_Alert 357, 368
CT_Deactivate 358
CT_EMail 359
T
table view page size
tacmd 282
37
tacmd (continued)
bulkExportPcy 343
bulkExportSit 172, 180, 343
bulkImportPcy 343
bulkImportSit 343
createEventDest 131
createSit 172, 349
exportNavigator 343
exportQueries 343
exportSitAssociations 343
exportSysAssignments 343
exportworkspaces 343
histconfiguregroups 160, 303
importNavigator 343
importQueries 343
importSitAssociations 343
importSysAssignments 343
importworkspaces 343
setOverride 160, 192
updateAgent 145
viewSit 180
z/OS
agent environment variables 160
tacmd refreshTECinfo
createEventDest 114
take action
for SOAP requests 355
take action commands
user ID for 95
TCP 352
TCP/IP 399
TDW 399
TEC Connector 134, 138
TEDGEN tool 115
telnet 400
TEP
See Tivoli Enterprise Portal
TEPS database
event pruning 46
TEPS/e administration console
enable 72
SSL between the portal server and
LDAP server 72
start 72
to change base DN 72
terminal view
parameters 39
threshold overrides XML 192
TIP Web Service 32
Tivoli Common Reporting 327
background information 327
BIRT reports 337
installing 336
limitations 330
prerequisites 328
resource dimension table 333
shared dimension tables 330
time dimension table 330
upgrading from a previous
release 329
Tivoli data warehouse
capacity planning 305
tuning 305
Tivoli Data Warehouse 400
configure for Tivoli Common
Reporting 330, 333
Index
407
U
Universal Agent
events to the Tivoli Enterprise
Console 117
408
UNIX 351
UNIX conversion 319
UNIX or Linux
historical data conversion 318
UNIX OS ux_situations.xml 187
update agent 144, 145
URL 21
USE_EGG1_FLAG 43
user administration 81
applications 85
default user 93
granting access to a user 94
major controls 93
managing user groups 90
managing user IDs 86
members 86
Navigator views 86
permissions 82
SYSADMIN logon ID 93
troubleshooting logon error
messages 95
user ID and groups 93
user ID for Take Action
commands 95
Users and User Groups window 82
validating user access 94
workspace administration mode 93
user authentication 58, 60, 61
portal server 64
single sign-on 67
user groups 90
adding 91
removing 92
reviewing and editing 92
viewing memberships 90
user ID 75
enable authentication 57
IBM Tivoli Monitoring Web
Services 353
Windows Users Group 22
user IDs 86
adding a user ID 87
default user 89
removing a user ID 89
viewing and editing a user ID 88
user security
configuring for a hub monitoring
server on Linux or UNIX 61
configuring for a hub monitoring
server on Windows 60
user validation 58
See user authentication
user.language 40
user.region 41
Users Group privileges 22
UTF-8 encoded XML 170
V
version
new in 6.2.0
11
W
warehouse proxy
ATTRLIB directory
302
X
XML 401
See also local configuration files
AGENTINFO 236
AGENTSTAT 248
ATTRLIST 238
CNFGLIST 261
EVENTDEST 214
EVENTMAP 214
HISTREAD 250
LISTSUBNODE 238
private history 175
private situations 175
PVTCONTROL 246
READATTR 239
REPORT 236, 241
SITSUMMARY 236, 247
situation_name (exported) 180
TABLESIT 245
THRESHOLDS 192
TRAPCNFG 197, 199
UTF-8 encoding 170
z/OS
UTF-8 encoded XML 170
Z
z/OS
agent autonomy 157, 285
data conversion using
KPDXTRA 322
Integrated Cryptographic Service
Facility 43, 44
LDAP not supported on hub 57
location of historical data files 324
manual archiving procedure 324
private history and PDS 190
RACF or ACF/2 for user
validation 94
SNMP alerts in PCTRAPS 197
Name
Address
Company or Organization
Phone No.
E-mail address
SC32-9408-03
___________________________________________________________________________________________________
Cut or Fold
Along Line
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ _do
_ _not
_ _ staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
NO POSTAGE
NECESSARY
IF MAILED IN THE
UNITED STATES
PERMIT NO. 40
_________________________________________________________________________________________
Fold and Tape
Please do not staple
Fold and Tape
SC32-9408-03
Cut or Fold
Along Line
Printed in USA
SC32-9408-03