HPE - A00067905en - Us - HPE Insight Remote Support 7.10 Monitored Devices Configuration Guide
HPE - A00067905en - Us - HPE Insight Remote Support 7.10 Monitored Devices Configuration Guide
Copyright Notice
© Copyright 2019 Hewlett Packard Enterprise Development LP
Privacy Policy
www.hpe.com/us/en/privacy/master-policy.html
Trademark Notices
Microsoft® and Windows® are trademarks of the Microsoft group of companies.
UNIX® is a registered trademark of The Open Group.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Red Hat® is a registered trademark of Red Hat, Inc. in the United States and other countries.
Citrix® and XenDesktop® are registered trademarks of Citrix Systems, Inc. and/or one more of its
subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries.
Intel®, Itanium® and Intel® Xeon® are trademarks of Intel Corporation in the U.S. and other countries.
© 2012 Google Inc. All rights reserved. Chrome™ is a trademark of Google Inc.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 2 of 436
Contents
Preface 23
Document purpose and audience 23
Product overview 23
Related documents 24
Document revision history 24
Sign up to receive Insight Remote Support communications 24
Support information 25
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 3 of 436
Configure monitored devices 49
Verify user permissions 49
Configure firewall and port settings 50
Add protocol credentials and start discovery 50
Create a RIBCL protocol credential in the Insight RS Console 50
Define discovery subnets if desired 50
Discover the ProLiant Gen8 or Gen9 server 51
Discovering the ProLiant server from the Insight RS Console 52
Enabling Insight Remote Support for a ProLiant server 52
Verify discovery and device status 53
Test communication from the ProLiant Gen8 or Gen9 server to Insight RS 53
Verify service event monitoring 53
Initiate a data collection 55
Initiating a data collection in the iLO 4 web interface 55
Initiating a data collection in Insight Remote Support 56
Send an Active Health System Report 56
Sending an Active Health System report from the iLO 4 web interface 56
Sending an Active Health System Report from Insight Remote Support 56
Maintenance and troubleshooting 57
Set Maintenance Mode 57
Disable monitoring of a ProLiant Gen8 and Gen9 server 57
Missing IP address during discovery 58
Warranty and contract discrepancy in Insight Online 59
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 4 of 436
Fulfill configuration requirements 67
Install and configure communication software on servers 67
Install and Configure SNMP Agents 67
Install Service Pack for ProLiant 67
Install System Management Homepage 68
Configure SNMP 68
Configure firewall and port settings 72
Add protocol credentials and start discovery 73
Create an SNMP protocol credential in Insight RS Console 73
Discover the device in the Insight RS Console 73
Verify discovery and device status 74
Verify communication between monitored device and Insight RS 74
Send an SNMP test trap to the Hosting Device 74
Viewing test events in the Insight RS Console 74
Verify collections in the Insight RS Console 75
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 5 of 436
Install and configure communication software on servers 89
Install an ESXi image 89
Obtain the HPE ESXi image 89
Obtain bundles to configure the VMware ESXi image 90
Configure firewall and port settings 90
Add protocol credentials and start discovery 90
Create a WBEM protocol credential in the Insight RS Console 90
Discover the device in the Insight RS Console 91
Verify discovery and device status 91
Verify communication between monitored device and Insight RS 91
Verify connectivity by sending a test event to the Hosting Device 91
Viewing test events in the Insight RS Console 92
Verify collections in the Insight RS Console 92
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 6 of 436
Chapter 10: Configuring Integrity Windows 2008 servers 109
Fulfill configuration requirements 109
Install and configure communication software on servers 109
Install WBEM Providers on the monitored device 109
Configure firewall and port settings 110
Add protocol credentials and start discovery 110
Create a WBEM protocol credential in the Insight RS Console 110
Discover the device in the Insight RS Console 111
Verify discovery and device status 111
Verify communication between monitored device and Insight RS 111
Verify connectivity by sending a WBEM test indication 111
Viewing test events in the Insight RS Console 113
Verify collections in the Insight RS Console 113
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 7 of 436
Add the WBEM protocol to the Insight RS Console 133
Option 1: Authenticate Using Username and Password 133
Option 2: Authenticate to HP-UX WBEM using a certificate 133
Option 3: Authenticate to HP-UX WBEM using user defined certificate 135
Discover the device in the Insight RS Console 137
Verify discovery and device status 138
Verify communication between monitored device and Insight RS 138
Verify connectivity by sending a test trap to the Hosting Device 138
Verify collections in the Insight RS Console 138
Maintenance 139
Export certificates 139
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 8 of 436
Configuring Windows partitions 151
Install WBEM providers 151
Create a signed certificate 151
Configure non-administrator users (if required) 151
Configuring VMware vSphere partitions 152
Verify partition status 152
Configure firewall and port settings 153
Add protocol credentials and start discovery 154
Create a WS-Man protocol credential for the OA in the Insight RS Console 154
Create a WS-Man protocol credential for the Linux and Windows partitions in the Insight RS
Console 154
Create a WBEM protocol credential for the VMware vSphere partitions in the Insight RS
Console 155
Discover the Integrity Superdome X server and partitions in the Insight RS Console 155
Verify Integrity Superdome X discovery 155
Verify the Integrity Superdome X OA 156
Verify the Integrity Superdome X partitions 156
Verify communication between monitored device and Insight RS 156
Generating test events 157
Verify collections in the Insight RS Console 157
If desired, configure your Integrity Superdome X as a solution 158
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 9 of 436
Archiving and cleaning the error log 167
Confirm SYSMAN is functioning cluster-wide 167
How to remove ELMC 168
Install the ELMC HPE OpenVMS Software Package on the Monitored Device 168
WCCPROXY command verb reference 170
Install ELMC when a new system is added to an existing ELMC installation 170
Install and configure WBEM or SNMP 171
Option 1: Install the HPE OpenVMS WBEM Services and WBEM Providers 171
Confirm TCP/IP IP address and name resolution is functioning 172
Check if WBEM was previously configured 172
Install WBEMCIM and WBEMPROVIDERS for the first time 173
Upgrade WBEM 177
Option 2: Enable and configure SNMP 182
Confirm TCP/IP IP address and name resolution is functioning 182
Determine if the SNMP service is enabled 183
Enable SNMP 183
Configure read community string 183
Configure dynamic processor resilience 184
Configure firewall and port settings 185
Add protocol credentials and start discovery 185
Create a protocol credential in the Insight RS Console 186
Option 1: Create a WBEM protocol credential in Insight RS Console 186
Option 2: Create an SNMPv1 protocol credential in the Insight RS Console 186
Discover the device in the Insight RS Console 186
Verify discovery and device status 187
Configure SAN configuration collections 187
Verify communication between monitored device and Insight RS 189
Verify service event monitoring 189
Verify collections in the Insight RS Console 189
Optional post-configuration steps 191
Disable WBEM protocol 191
Disable SNMP protocol 191
Troubleshooting 191
WBEM protocol troubleshooting 191
SNMP protocol troubleshooting 193
ELMC protocol troubleshooting 195
SSH protocol troubleshooting 197
Telnet protocol troubleshooting 200
Entitlement troubleshooting 203
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 10 of 436
Fulfilling hardware and software requirements 204
Fulfilling required permissions and access 205
Grant permissions required to install ELMC 205
Grant permissions required to run ELMC 206
Heterogeneous cluster instructions 206
Archiving and cleaning the error log 207
Confirm SYSMAN is functioning cluster-wide 207
How to remove ELMC 207
Install the ELMC VSI OpenVMS Software Package on the Monitored Device 208
WCCPROXY command verb reference 210
Install ELMC when a new system is added to an existing ELMC installation 210
Install the VSI OpenVMS WBEM Services and WBEM Providers 210
Confirm TCP/IP IP address and name resolution is functioning 211
Check if WBEM was previously configured 211
Install WBEMCIM and WBEMPROVIDERS for the first time 212
Upgrade WBEM 216
Configure dynamic processor resilience 221
Configure firewall and port settings 222
Add protocol credentials and start discovery 222
Create a WBEM protocol credential in Insight RS Console 222
Discover the device in the Insight RS Console 223
Verify discovery and device status 223
Verify communication between monitored device and Insight RS 224
Verify service event monitoring 224
Verify collections in the Insight RS Console 224
Optional post-configuration steps 225
Disable WBEM protocol 225
Troubleshooting 225
WBEM protocol troubleshooting 225
ELMC protocol troubleshooting 227
Entitlement troubleshooting 230
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 11 of 436
Install the ELMC HPE OpenVMS Software Package on the Monitored Device 236
WCCPROXY command verb reference 237
Install ELMC when a new system is added to an existing ELMC installation 238
Enable and configure SNMP 238
Confirm TCP/IP IP address and name resolution is functioning 238
Determine if the SNMP service is enabled 238
Enable SNMP 239
Configure read community string 239
Configure firewall and port settings 240
Add protocol credentials and start discovery 240
Create an SNMPv1 protocol credential in the Insight RS Console 240
Discover the device in the Insight RS Console 241
Verify discovery and device status 241
Configure SAN configuration collections 241
Verify communication between monitored device and Insight RS 243
Verify service event monitoring 243
Verify collections in the Insight RS Console 244
Optional post-configuration steps 245
Disable SNMP service 245
Troubleshooting 245
SNMP protocol troubleshooting 245
ELMC protocol troubleshooting 247
SSH protocol troubleshooting 249
Telnet protocol troubleshooting 252
Entitlement troubleshooting 254
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 12 of 436
Verify communication between monitored device and Insight RS 261
Verify collections in the Insight RS Console 262
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 13 of 436
Disable monitoring of a BladeSystem c-Class Enclosure 283
Configuring BladeSystem c-Class Enclosures using SNMP 284
Fulfill configuration requirements 285
Install and configure communication software on enclosures 285
Configure SNMP on the BladeSystem c-Class enclosure 285
Option 1: Configure SNMPv1 285
Option 2: Configure SNMPv3 286
Configure firewall and port settings 288
Add Protocol credentials and start discovery 288
Create an SNMP protocol credential in the Insight RS Console 288
Option 1: SNMPv1 288
Option 2: SNMPv3 289
Discover the device in the Insight RS Console 289
Verify discovery and device status 290
Verify communication between monitored device and Insight RS 290
Verify service event monitoring 290
Verify collections in the Insight RS Console 290
Maintenance and troubleshooting 291
Disable monitoring of a BladeSystem c-Class Enclosure 291
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 14 of 436
Configure firewall and port settings 303
Add protocol credentials and start discovery 304
Create a P6000 Command View protocol credential in the Insight RS Console 304
Create an ELMC protocol credential in the Insight RS Console 305
Create a protocol credential in the Insight RS Console for your management server 305
Discover the EVA in the Insight RS Console 305
Verify discovery and device status 306
Verify warranty and contract information 306
Verify communication between monitored device and Insight RS 306
Sending a test event 306
Verify collections in the Insight RS Console 307
Maintenance and troubleshooting 308
Enable User-Initiated Service Mode in P6000 Command View 308
Perform a remote service test in P6000 Command View 308
Insight RS did not discover the EVA 309
Verify the EVA is managed by P6000 Command View on the target server 309
Troubleshooting the ELMC installation 309
Configuring P6000 and Enterprise Virtual Arrays using Array Based Management 309
Fulfill configuration requirements 309
Configure monitored devices 310
Configure firewall and port settings 310
Add Protocol credentials and start discovery 310
Create a P6000 Command View protocol in the Insight RS Console 310
Discover the ABM in the Insight RS Console 311
Verify discovery and device status 311
Verify communication between monitored device and Insight RS 312
Verify collections in the Insight RS Console 312
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 15 of 436
Verify discovery and device status 326
Verify communication between monitored device and Insight RS 327
Send a test event 327
Verify collections in the Insight RS Console 327
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 16 of 436
Verify communication between monitored device and Insight RS 342
Send a test trap 342
Verify collections 343
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 17 of 436
Discover the Tape Libraries in Insight RS 359
Verify warranty and contract information 360
Verify discovery and device status 360
Verify communication between monitored device and Insight RS 360
Verify collections in the Insight RS Console 360
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 18 of 436
Add protocol credentials and start discovery 379
Create an SNMPv1 protocol credential in the Insight RS Console 379
Discover the device in the Insight RS Console 379
Verify discovery and device status 380
Verify warranty and contract information 380
Verify communication between monitored device and Insight RS 380
Verify collections in the Insight RS Console 380
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 19 of 436
Configure SNMP 391
Add protocol credentials and start discovery 393
Create an SNMP protocol credential in the Insight RS Console 393
Create an SNMPv1 protocol credential in the Insight RS Console 393
Discover the device in the Insight RS Console 394
Add warranty and contract information 394
Verify discovery and device status 394
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 20 of 436
Verify communication between monitored device and Insight RS 406
Verifying SNMP communication 406
Verify collections in the Insight RS Console 406
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 21 of 436
Create local user ID 417
Configure the iLO 417
Configure discovery 417
Add protocol credentials 417
Add the 250-HC as a Solution 418
Glossary 431
Index 436
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 22 of 436
Preface
Document purpose and audience
This document provides the necessary information to configure your monitored devices before discovering the
devices with HPE Insight Remote Support (RS).
This document is for HPE Customers and HPE Support Personnel who are installing, configuring, and using
Insight RS.
Product overview
Insight RS is a software solution that enables reactive and proactive remote support to improve the availability
of supported servers, storage systems, and other devices in your data center. Insight RS relies on several
HPE components and communication between various software applications within the customer enterprise
and between the customer enterprise and HPE to deliver support services. Software components may be
installed on the Hosting Device or on monitored devices depending on their purpose.
For more information about Insight RS, go to: www.hpe.com/services/getconnected.
Important: To configure Insight RS correctly, it is essential that you read this document thoroughly
before proceeding with the installation of Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 23 of 436
Preface
Related documents
For additional Insight RS documentation, go to: www.hpe.com/info/insightremotesupport/docs.
1.1 7.10 April 2019 Update ProLiant Gen10 server user permission
requirements.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 24 of 436
Preface
Support information
HPE recommends you consult the Insight RS documentation to resolve issues. The documentation is
designed to guide you through a successful installation and configuration. However, if you need further
support for Insight RS, help is available through HPE local Response Centers. For contact details, go to:
www.hpe.com/us/en/services/get-connected.html#tehnical.
Before contacting support, you can check if your issue has a solution available. Note that a valid contract and
HPE Passport log on is required to view issue solution documents.
To view Insight RS issue solutions, complete the following steps:
1. Go to www.hpe.com/support/hpesc.
2. In the search field, type Insight Remote Support and click the product name in the suggested results.
3. Click the Documents tab and use the filters to narrow the results to support information, advisories, and
notices.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 25 of 436
Chapter 1: Understanding monitored devices prerequisites
To use Insight Remote Support (RS) you need at least two pieces of hardware: a supported Windows ProLiant server to be used as the Hosting Device
and one or more devices to be monitored by Insight RS. Use the table below to identify what protocols and software components are necessary for your
monitored devices and then go to the information for your specific devices for complete configuration details. Before you get started, verify Insight RS
supports your monitored devices by consulting the HPE Insight Remote Support Release Notes.
Insight RS checks every device’s warranty and contract to make sure it has a valid HPE warranty or contract. If a device has no HPE warranty or
contract, the monitoring health indicator in the Insight RS Console will be red. If this is red, then no service events will be analyzed or sent to HPE.
Important: Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs. Insight RS listens on port 1162 for SNMPv3
traps, and your SNMPv3 passwords must be at least 8 characters long. Refer to your device's documentation to determine the versions of
SNMP your device supports.
l Telnet
l VMware VirtualCenter Web Service Interface
l Web Services Management Protocol (WS-Man)
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 26 of 436
Chapter 1: Understanding monitored devices prerequisites
Important: Not only do you need to configure the protocol on the monitored device, you must also add the protocol within the Insight RS
Console so Insight Remote Support can access the device.
Important: If you change the username/password that Insight RS uses to connect to your monitored devices, or if the credentials expire as
part of your security policies, you must modify those corresponding credentials in the Insight RS Console to continue monitoring your
monitored devices.
Important: Insight RS requires administrator access to the monitored devices. Discovery and collections require privileged access in order to
retrieve information about the monitored devices.
The required protocols and software are determined by your monitored device type. Read the appropriate monitored device section to understand what
configuration is necessary for your specific monitored device. Some monitored device types can use multiple communication protocols. Which protocol
you choose depends on your security strategy and preferences.
In some cases more than one protocol will be required. Some protocols may be used by the Insight RS Console to discover monitored devices while
other protocols may be used to monitor hardware events or retrieve configuration collection information from the monitored devices. The following table
highlights the requirements, but read the section for your monitored device type for more detail.
Assign devices to SAN collections on the Collection Services → Collection Schedules tab of the Insight RS Console in the SAN Configuration
Collection Schedule. See the Help for more information about setting up your SAN collections.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 27 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS
Discovery Monitoring Basic SAN Notes
Collections Collections
HPE Servers
ProLiant Gen10 RIBCL RIBCL RIBCL See "Configuring ProLiant Gen10 servers" on page 39.
ProLiant Gen8 and RIBCL RIBCL RIBCL HPE ProLiant Gen8 and Gen9 servers can be monitored using one
Gen9 of two methods:
l Through the embedded Remote Support functionality available
through iLO 4 and Intelligent Provisioning.
See "Configuring ProLiant Gen8 and Gen9 servers" on page 48.
l Using a diagnostic agent installed on the operating system.
See the ProLiant server row below that corresponds to your
operating system for protocol requirements, however, make sure
you also configure RIBCL credentials in addition to the agent
credentials.
Important: RIBCL credentials are required for all ProLiant Gen8
and Gen9 servers even when the diagnostic agent are used.
Note: If you want to monitor attached devices you need to install the
HPE Service Pack for ProLiant as detailed in the ProLiant server
section that corresponds to the operating system below.
Edgeline EL1000 RIBCL RIBCL RIBCL HPE Edgeline EL1000 and EL4000 systems should be configuring
and EL4000 using the iLO 4 procedure for ProLiant Gen8 and Gen9 servers.
systems
See "Configuring ProLiant Gen8 and Gen9 servers" on page 48.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 28 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
Windows on SNMP SNMP SNMP You must install the HPE Service Pack for ProLiant and all providers
ProLiant or WMI or WMI or WMI that ship with it.
You can choose to use either SNMP or WMI, however to gather SAN
Collections for a ProLiant Windows server, you must use WMI.
Insight RS requires Insight Management WBEM Providers version
2.8 or later, but HPE recommends installing the most recent version
available for your device.
WMI Note: If your ProLiant server is Gen8 or later, RIBCL credentials are
required even when the diagnostic agent are used.
For configuring using WMI, see "Configuring ProLiant Windows
servers using WMI" on page 60.
For configuring using SNMP, see "Configuring ProLiant Windows
servers using SNMP" on page 67.
Linux on ProLiant SNMP SNMP SNMP Must install the HPE Service Pack for ProLiant and all providers that
ship with it.
Note: If your ProLiant server is Gen8 or later, RIBCL credentials are
Telnet or SSH required even when the diagnostic agent are used.
See "Configuring ProLiant Linux servers" on page 76.
VMware® ESX® on SNMP SNMP SNMP Note: If your ProLiant server is Gen8 or later, RIBCL credentials are
ProLiant required even when the diagnostic agent are used.
SSH See "Configuring ProLiant VMware ESX servers" on page 83.
VMware® ESXi™ WBEM WBEM WBEM WBEM Note: If your ProLiant server is Gen8 or later, RIBCL credentials are
on ProLiant required even when the diagnostic agent are used.
See "Configuring ProLiant VMware ESXi servers" on page 89.
Citrix Xen Server on SNMP SNMP SNMP Note: If your ProLiant server is Gen8 or later, RIBCL credentials are
ProLiant required even when the diagnostic agent are used.
Telnet or SSH See "Configuring ProLiant Citrix XenServers" on page 93.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 29 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
Hyper-V Server on SNMP SNMP Configuration collections are not supported on the Hyper-V guest.
ProLiant or WMI or WMI
For monitoring, follow the configuration instructions for a ProLiant
Windows server.
Note: If your ProLiant server is Gen8 or later, RIBCL credentials are
required even when the diagnostic agent are used.
See "Configuring ProLiant Windows servers" on page 60.
Windows 2003 on WMI WMI WMI WMI Must install the Integrity Support Pack and all providers that ship with
Integrity it. This includes the installation of SNMP and WMI.
SNMP SNMP SNMP
See "Configuring Integrity Windows 2003 servers" on page 100.
ELMC
Windows 2008 on WMI WMI WMI WMI Must install the HPE Integrity Support Pack and all providers that
Integrity ship with it.
See "Configuring Integrity Windows 2008 servers" on page 109.
Linux on Integrity WBEM WBEM Configuration collections are not supported, except when the server
is part of a SAN collection. You can choose to use either Telnet or
SSH to gather SAN collections for an Integrity Linux server.
Telnet or SSH
See "Configuring Integrity Linux servers" on page 115.
HP-UX on Integrity WBEM WBEM WBEM Install the proper WBEM providers on HP-UX. These generally are
part of the feature set of HP-UX and will update through patches and
software updates on the device as appropriate.
You can choose to use either Telnet or SSH to gather SAN
Telnet or SSH collections for an Integrity HP-UX server.
See "Configuring Integrity and HP 9000 HP-UX servers" on
page 119.
HPE Integrity WS-Man WS-Man WS-Man Discovery and collections use WS-Man. The OA is monitored using
Superdome 2 WS-Man, but the Superdome 2 partitions are monitored using
Onboard WBEM.
Administrator (OA)
See "Configuring Integrity Superdome 2 servers" on page 141.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 30 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
HPE Integrity WS-Man WS-Man WS-Man The partitions are monitored through the OA using WS-Man.
Superdome X
For collections, Insight RS communicates directly with the partition:
Onboard
Administrator (OA) l Linux partitions communicate using WS-Man.
l Windows partitions communicate using WinRM (WS-Man).
l VMware partitions communicate using WBEM.
See "Configuring Integrity Superdome X servers" on page 147.
HPE Superdome ESA ESA ESA See "Configuring Superdome Flex servers" on page 160.
Flex
HPE OpenVMS on WBEM or WBEM Must install the HPE OpenVMS WBEM provider.
Integrity SNMP
Configuration collections and discovery only works when the WBEM
ELMC providers are installed and the credentials are properly configured.
VSI OpenVMS on WBEM or WBEM Must install the VSI OpenVMS WBEM provider.
Integrity SNMP
Configuration collections and discovery only works when the WBEM
providers are installed and the credentials are properly configured.
ELMC
See "Configuring VSI OpenVMS Integrity servers" on page 204.
HPE OpenVMS on SNMP Configuration collections are not supported, except when the
AlphaServer OpenVMS server is part of a SAN collection.
ELMC
See "Configuring HPE OpenVMS AlphaServers" on page 231 and
Telnet or SSH the special note on support for this platform.
Tru64 UNIX on SNMP Configuration collections are not supported, except when the Tru64
AlphaServer server is part of a SAN collection.
ELMC You can choose to use either Telnet or SSH to gather SAN
Collections for a Tru64 Unix server.
Telnet or SSH See "Configuring Tru64 UNIX servers" on page 256 and the special
note on support for this platform.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 31 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
HP-UX on HP 9000 WBEM WBEM WBEM Install the proper WBEM providers on HP-UX. These generally are
part of the feature set of HP-UX and will update through patches and
software updates on the device as appropriate.
You can choose to use either Telnet or SSH to gather SAN
Telnet or SSH collections for an HP-UX server.
See "Configuring Integrity and HP 9000 HP-UX servers" on
page 119.
E5000 Messaging SNMP or WMI SNMP or WMI SNMP or WMI These devices should be configured the same as a Windows
Systems ProLiant server.
WMI You can choose to use SNMP or WMI, however to gather SAN
Collections, you must use WMI.
Configuration collections for the chassis connector use HTTP.
HTTP
See "Configuring ProLiant Windows servers" on page 60.
HPE NonStop (See Notes) For more details on how to install and configure Insight RS for use in
systems a NonStop environment, see the Insight Remote Support for
NonStop document available at www.hpe.com/info/nonstop-
serviceinfo.
Non-HPE Servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 32 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
HPE BladeSystems
HPE Onboard Registration Registration HPE BladeSystem c-Class Enclosures can be monitored using the
Administrator for c- through the through the embedded management capabilities in the HPE Onboard
Class Enclosures OA OA Administrator (OA) or by configuring SNMP in the OA.
or or See "Configuring BladeSystem c-Class Enclosures" on page 279.
SNMP SNMP For configuring the OA, see "Configuring BladeSystem c-Class
Enclosures through the OA" on page 280.
Registration
through the For configuring using SNMP, see "Configuring BladeSystem c-Class
OA Enclosures using SNMP" on page 284.
or
HTTPS
HPE ProLiant (See Notes) Supported ProLiant BladeSystem servers are monitored
BladeSystem independent of the c-Class Enclosure in which they are installed.
Servers ProLiant BladeSystem servers can be configured using the
instructions for ProLiant servers.
For configuration details, see the ProLiant server section that
corresponds to the operating system installed on the ProLiant
BladeSystem server.
HPE Integrity (See Notes) Supported Integrity BladeSystem servers are monitored independent
BladeSystem of the c-Class Enclosure in which they are installed. Integrity
Servers BladeSystem servers can be configured using the instructions for
Integrity servers.
For configuration details, see the Integrity server section that
corresponds to the operating system installed on the Integrity
BladeSystem server.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 33 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
Virtual Connect SNMP SNMP SNMP SNMP See "Configuring Virtual Connect Modules" on page 292.
Modules
P6000 Enterprise HP P6000 HP P6000 HP P6000 HP P6000 For configuring with Server Based Management, see "Configuring
Virtual Arrays SBM Command Command Command Command P6000 and Enterprise Virtual Arrays using Server Based
View View View View Management" on page 296.
ELMC
P6000 Enterprise HP P6000 HP P6000 HP P6000 HP P6000 For configuring with Array Based Management, see "Configuring
Virtual Arrays ABM Command Command Command Command P6000 and Enterprise Virtual Arrays using Array Based
View View View View Management" on page 309.
HPE StoreVirtual SNMP SNMP See "Configuring StoreVirtual P4000 Storage systems" on page 313.
4xxx (formerly
P4000 SAN
Solutions/ LeftHand LeftHand OS LeftHand OS LeftHand OS
Storage)
HPE MSA 1040 SNMP SNMP Both SNMP and WBEM must be installed and configured.
HPE MSA 2040 See "Configuring P2000 G3, MSA 1040/2040/2050 storage" on
WBEM WBEM WBEM WBEM page 329.
HPE MSA 2050
HPE P2000 G3 SNMP SNMP Both SNMP and WBEM must be installed and configured.
MSA
See "Configuring P2000 G3, MSA 1040/2040/2050 storage" on
WBEM WBEM WBEM WBEM page 329.
StoreEasy Storage WMI WMI WMI WMI See "Configuring StoreEasy Storage systems" on page 334.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 34 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
HPE StoreAll SNMP SNMP SNMP See "Configuring StoreAll Storage systems" on page 339.
Network Storage
Systems (formerly
HPE IBRIX Storage)
HPE XP/P9000 (See Notes) For supported models, see HPE Insight Remote Support Release
Notes.
Registration with Insight RS occurs during the Truststore
configuration on the SVP. Note that XP/P9000 devices are not
serviceable by customers. Support on XP/P9000 devices is
delivered as part of your Mission Critical Support contract. Please
contact your local HPE account representative for help to implement
this solution.
Data Protection
HPE Virtual Library SNMP SNMP Configuration collections are not supported, except when the VLS is
System (VLS) part of a SAN collection.
SSH See "Configuring Virtual Library Systems" on page 348.
HPE StoreEver SNMP SNMP SNMP See "Configuring StoreEver Tape Libraries" on page 351.
MSL (formerly
Modular Systems
Library)
HPE StoreEver ESL SNMP SNMP WBEM is supplied through Command View for Tape Libraries,
(formerly Enterprise installed on the server managing the tape libraries.
Systems Library) WBEM
See "Configuring StoreEver Tape Libraries" on page 351.
Telnet or SSH
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 35 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
HPE StoreEver SNMP SNMP WBEM is supplied through Command View for Tape Libraries,
EML (formerly installed on the server managing the tape libraries.
Enterprise Modular WBEM
See "Configuring StoreEver Tape Libraries" on page 351.
Library) Telnet or SSH
B-Series SAN SNMP SNMP See "Configuring StoreFabric B-Series switches" on page 362.
Switches
Telnet or SSH Telnet or SSH
C-Series SAN SNMP SNMP SNMP SNMP See "Configuring StoreFabric C-Series switches" on page 374.
Switches
H-Series SAN SNMP SNMP SNMP SNMP See "Configuring StoreFabric H-Series switches" on page 378.
Switches
Aruba 3810 (See Notes) Configure Aruba 3810 Switches using the ProVision-based Switch
Switches procedure.
See "Configuring ProVision-based networking switches" on
page 381.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 36 of 436
Chapter 1: Understanding monitored devices prerequisites
Table 1.1 Required monitored device communication protocols and components for Insight RS, continued
Discovery Monitoring Basic SAN Notes
Collections Collections
Mellanox InfiniBand SNMP SNMP SNMP SNMP See "Configuring Mellanox InfiniBand Switches" on page 402.
Switches
Intel Omni-Path SNMP SNMP See "Configuring Intel Omni-Path Switches" on page 407.
Switches
Applications
VMware® VMware VMware Gathers configuration collections on the ESX and ESXi virtual
vCenter™ Server VirtualCenter VirtualCenter machines in the VMware vCenter cluster.
on ProLiant Web Service Web Service
See "Configuring VMware vCenter servers" on page 427.
Interface Interface
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 37 of 436
Chapter 1: Understanding monitored devices prerequisites
Hosting Device l All Microsoft Windows 2003 operating system versions will not be supported on any Insight RS 7.x
versions.
Products that will not be supported by any 7.x l HPE Enterprise Secure Key Manager
version
l HPE Secure Key Manager
l HPE Dynamic Smart Cooling
l HPE SAN Virtualization Services Platform
l HPE Modular Array
l HPE Enterprise Modular Array
l HPE Raid Array
l HPE Enterprise Storage Array
l M-series Switches (McData)
l Carrier-grade Servers (cx2620, cc3310)
l HP 9000 rp2400 series (A-Class), rp5400 series (L-Class), and D,K,R,T,V (Class) servers
l PA-RISC versions of HP 9000 SD-A and SD-B servers
l HPE Neoview Systems
l IBM AIX servers
l Sun Solaris servers
Mission Critical Service Delivery Capabilities to deliver the following mission critical services:
(Insight RSA only)
l HP-UX System Health Check assessments (not available within Insight RS 7.x, but available as a
standalone client)
l TAM-S and CCMon Services
l Unreachable Device Notification
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 38 of 436
Chapter 2: Configuring ProLiant Gen10
servers
The Insight Remote Support (RS) feature available through the iLO 5 web interface provides intelligent event
diagnosis and automatic secure submission of event notifications to HPE and your HPE Authorized Channel
Partner through the Insight RS installation on the Hosting Device.
Note: When connecting to a ProLiant Gen10 server through the iLO, the iLO will maintain a
connection to Insight RS even when the operating system of the server has changed or after an
update to the iLO firmware.
Make sure Insight RS supports your ProLiant server by checking the HPE Required
Insight Remote Support Release Notes.
Make sure the operating system on the ProLiant server is running. Required
Install and configure the Agentless Management Service (AMS) on the Optional
ProLiant server if you want your host name or IP displayed instead of the
device's serial number.
You can download the latest firmware from the HPE website:
www.hpe.com/support/ilo5.
Send a test event to verify connectivity between your ProLiant server and Required
Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 39 of 436
Chapter 2: Configuring ProLiant Gen10 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 40 of 436
Chapter 2: Configuring ProLiant Gen10 servers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 7906 Onboard Hosting Secure HTTP (HTTPS) port used by the listener Required
Administrator Device running on the Embedded Support Device. The
management device connects to the Hosting Device
iLO 5
on this port (e.g. https://<hostname>:7906).
To enable Insight RS to gather Active Health Service collections, you must set up the iLO Remote Insight
Board Command Language (RIBCL) protocol credentials in the Insight RS Console.
To configure RIBCL in the Insight RS Console, complete the following steps:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 41 of 436
Chapter 2: Configuring ProLiant Gen10 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 42 of 436
Chapter 2: Configuring ProLiant Gen10 servers
Note: After registration, you may see both the ProLiant server and the iLO 5 web interface listed in
the Insight RS Console. The iLO 5 web interface will disappear if the ProLiant server and the RIBCL
credentials have been configured correctly.
Note: After discovery, the operating system for the ProLiant server will not appear in the Insight RS
Console. This is expected behavior.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 43 of 436
Chapter 2: Configuring ProLiant Gen10 servers
Note: Sending SNMP test traps from the iLO 5 web interface Administration → Management
page is not supported in Insight Remote Support. To send a test event, do so from the Remote
Support → Service Events page as shown below.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 44 of 436
Chapter 2: Configuring ProLiant Gen10 servers
Insight RS converts the iLO service event Time Generated value to the time zone of the browser
used to access the Insight RS Console.
Note: Test events are automatically closed by HPE since no further actions are required.
To receive email alerts about system events, configure AlertMail. For information, see the iLO 5 User Guide at
www.hpe.com/support/ilo-docs.
Note: Insight Remote Support will run a data collection when the ProLiant server is discovered. If
you manually generate a data collection using one of the methods described below, you will have
two data collections shown for the device in the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 45 of 436
Chapter 2: Configuring ProLiant Gen10 servers
Sending an Active Health System report from the iLO 5 web interface
To send an Active Health System report from the iLO 5 web interface, complete the following steps:
1. Log on to the iLO web interface (https://<iLO hostname or IP address>).
2. Navigate to Remote Support → Data Collections. The Data Collections screen displays.
3. Click Send Active Health System Report.
4. Click OK to confirm the action. When the transmission completes, the Last Active Health System
Reporting Transmission date and time updates.
iLO sends the Active Health System report to Insight RS. In the Insight RS Console you can view the results
on the Collection Services → Basic Collection Results screen.
Note: Maintenance Mode ends once the specified time has elapsed. You can end maintenance
mode early by selecting the Clear Maintenance Mode check box and clicking Apply. A
confirmation message appears.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 46 of 436
Chapter 2: Configuring ProLiant Gen10 servers
Note: Unregistering directly from the iLO 5 web interface is the same as temporarily disabling the
device in the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 47 of 436
Chapter 3: Configuring ProLiant Gen8 and
Gen9 servers
The Insight Remote Support (RS) feature available through the iLO 4 web interface provides intelligent event
diagnosis and automatic secure submission of event notifications to HPE and your HPE Authorized Channel
Partner through the Insight RS installation on the Hosting Device.
Important: If you do not want to use the Remote Support functionality available through the iLO 4
web interface, you need to configure your ProLiant server using SNMP Agents or WBEM Providers.
Consult the information that corresponds to your operating system and follow the configuration
instructions (see "Understanding monitored devices prerequisites" on page 26). If you use SNMP
Agents or WBEM Providers you must still add RIBCL protocol credentials in the Insight RS
Console; RIBCL is required for AHS Collections and for Insight RS to monitor the server.
Note: When connecting to a ProLiant Gen8 or Gen9 server through the iLO, the iLO will maintain a
connection to Insight RS even when the operating system of the server has changed or after an
update to the iLO firmware.
Make sure Insight RS supports your ProLiant server by checking the HPE Required
Insight Remote Support Release Notes.
Make sure the operating system on the ProLiant server is running. Required
Install and configure the Agentless Management Service (AMS) on the Optional
ProLiant server if you want your host name or IP displayed instead of the
device's serial number. For more information, see Known Issue "Missing IP
address during discovery" on page 58.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 48 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
Verify a supported version of the iLO 4 firmware is installed on your ProLiant Required
server. HPE recommends version 2.60.
You can download the latest firmware from the HPE website:
www.hpe.com/support/ilo4.
Send a test event to verify connectivity between your ProLiant server and Required
Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 49 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 7906 Onboard Hosting Secure HTTP (HTTPS) port used by the listener Required
Administrator Device running on the Embedded Support Device. The
management device connects to the Hosting Device
iLO 4
on this port (e.g. https://<hostname>:7906).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 50 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
represents a non-private IP range and the 10. network has the highest preference. If multiple IP addresses
exist within any of the subnets the selection behavior within that subnet is random.
A configuration command has been added to allow you to redefine this preference order and to define it more
discreetly. The command takes the following form:
rsadmin config –set siteipv4subnet.preference=<ipv4>/<prefix>[,<ipv4>/<prefix>…]
where a multiple subnet preference can be defined.
You can use the command to define a more discreet preferred IPv4 subnet, for example: 10.2.x.x over
10.1.x.x.
Example:
rsadmin config –set siteipv4subnet.preference=10.2.0.0/16
You can choose to prefer 192.168.x.x subnet over all others.
Example:
rsadmin config –set siteipv4subnet.preference=192.168.0.0/16
You can also define two or more preferences.
Example:
rsadmin config –set siteipv4subnet.preference=10.2.0.0/16,10.1.0.0/16
If the device is not reachable on the preferred subnet, Insight RS will continue to search the preference list.
For example, if the iLO shows us a 10. network and Insight RS does not have a 10. connection, Insight RS
continues searching.
Note: You can also register for remote support through the Intelligent Provisioning interface. For
more information, see Insight Remote Support and Insight Online Setup Guide for ProLiant
Servers and BladeSystem c-Class Enclosures at:
www.hpe.com/info/insightremotesupport/docs.
Tip: You can use RIBCL XML scripts to register a group of servers. For more information, see the
iLO 4 Scripting and Command Line Guide at www.hpe.com/info/ilo/docs. You can also download
sample scripts for Windows and Linux.
If your device is connected through the iLO, Insight RS will detect if the iLO is registered with another remote
support application (HPE OneView, direct connect to Insight Online, or another Insight RS host). If Insight RS
detects the iLO registered to another remote support application, it will disable the server and not perform a
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 51 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
RIBCL, WMI, WBEM or SNMP subscription. If you are using Agents/Providers and your iLO is not visible,
check to ensure the iLO is not registered to a different remote support application.
Note: After discovery, the operating system for the ProLiant server will not appear in the Insight RS
Console. This is expected behavior.
Important: When setting up your iLO 4 web interface, it is important to set the time zone. If the time
zone is not set, events sent to Insight Remote Support are displayed with a GMT offset. In the iLO 4
web interface, browse to Administration → Network → SNTP Settings to set your time zone.
Use the Remote Support → Registration screen to register and enable Remote Support. You must have the
Configure iLO Settings privilege to modify the Remote Support settings.
To enable a ProLiant server for Insight Remote Support, complete the following steps:
1. Log on to the iLO 4 web interface (https://<iLO hostname or IP address>).
2. In the navigation menu, click Remote Support → Registration. The Register and Enable Automated
Support screen appears.
3. Complete the Hostname or IP address field.
4. In the Port field, type 7906.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 52 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
5. Click Register. The iLO 4 web interface registers the device and a confirmation message appears.
Note: After registration, you may see both the ProLiant server and the iLO 4 web interface listed in
the Insight RS Console. The iLO 4 web interface will disappear if the ProLiant server and the RIBCL
credentials have been configured correctly.
Note: After discovery, the operating system for the ProLiant server will not appear in the Insight RS
Console. This is expected behavior.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 53 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
Note: Sending SNMP test traps from the iLO 4 web interface Administration → Management
page is not supported in Insight Remote Support. To send a test event, do so from the Remote
Support → Service Events page as shown below.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 54 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
5. Check the Insight RS Console to verify that the test event arrived:
a. Log on to the Insight RS Console.
b. In the main menu, select Devices.
c. Find the ProLiant server and click the device name.
d. Click the Service Events tab. All service events submitted against the system display in the
Service Events screen (even if you clear the Service Event Log).
Insight RS converts the iLO service event Time Generated value to the time zone of the browser
used to access the Insight RS Console.
Note: Test events are automatically closed by HPE since no further actions are required.
Note: Insight Remote Support will run a data collection when the ProLiant server is discovered. If
you manually generate a data collection using one of the methods described below, you will have
two data collections shown for the device in the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 55 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
Sending an Active Health System report from the iLO 4 web interface
To send an Active Health System report from the iLO 4 web interface, complete the following steps:
1. Log on to the iLO web interface (https://<iLO hostname or IP address>).
2. Navigate to Remote Support → Data Collections. The Data Collections screen displays.
3. Click Send Active Health System Report.
4. Click OK to confirm the action. When the transmission completes, the Last Active Health System
Reporting Transmission date and time updates.
iLO sends the Active Health System report to Insight RS. In the Insight RS Console you can view the results
on the Collection Services → Basic Collection Results screen.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 56 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
3. In the Expires in drop-down list, select the length of time you will work on the ProLiant server.
4. Click Apply.
Note: Maintenance Mode ends once the specified time has elapsed. You can end maintenance
mode early by selecting the Clear Maintenance Mode check box and clicking Apply. A
confirmation message appears.
Note: Unregistering directly from the iLO 4 web interface is the same as temporarily disabling the
device in the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 57 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
The following known issues apply to ProLiant Gen8 and Gen9 servers:
Note: The 2.60 iLO 4 firmware is a critical update. As such, HPE requires users to update
to this version immediately. Install this update to take advantage of significant
improvements to the write algorithm for the embedded 4 GB non-volatile flash memory (also
known as the NAND). These improvements reduce wear and increase the NAND lifespan.
l AMS—The Agentless Management Service is enabled and the operating system is running.
l RIBCL—The iLO Remote Insight Board Common Language Protocol (RIBCL) credentials for the
server are configured in the Insight RS Console and are assigned to the ProLiant server.
2. Log on to the Insight RS Console.
3. Navigate to Devices → Device Summary.
4. Click the serial number in the Device Name column.
5. On the Device tab, expand the Status section and click Discover Device. When the device is
rediscovered host name or IP address is displayed.
Note: The DNS configuration determines whether the host name or IP address is displayed.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 58 of 436
Chapter 3: Configuring ProLiant Gen8 and Gen9 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 59 of 436
Chapter 4: Configuring ProLiant Windows
servers
Insight Remote Support (RS) must be able to communicate with your ProLiant server before it can be
monitored. Insight RS can communicate with ProLiant servers running Windows with either WMI or SNMP.
The following information describes how to install and configure the communication protocols and other
recommended software components so that it can be monitored by Insight RS.
Use these configuration instructions for Windows Server 2003, Windows Server 2008, and Windows Server
2012. Windows Server 2016 is supported on ProLiant Gen8 and later servers, but you may prefer to connect
them to Insight RS through the iLO. See "Configuring ProLiant Gen8 and Gen9 servers" on page 48.
If both SNMP and WMI are available on the ProLiant Windows monitored device it is recommend that one of
the protocols be disabled from monitoring in the Insight RS Console to prevent dual notification of a single
failing component. Disable SNMP if there are no smart detached storage devices such as MSAs attached to
the monitored device. If smart detached storage devices are installed then disable the WMI protocol in the
Insight RS Console. This is done by deleting the protocol for the monitored device in the Insight RS Console.
Important: To gather SAN Collections for a ProLiant Windows server, you must use WMI and
Service Pack for ProLiant version 2.8 or later.
To configure your ProLiant Windows server using WMI, see "Configuring ProLiant Windows servers using
WMI" below.
To configure your ProLiant Windows server using SNMP, see "Configuring ProLiant Windows servers using
SNMP" on page 67.
Check the HPE Insight Remote Support Release Notes to make sure your ProLiant Windows
server is supported.
Install WBEM/WMI on the ProLiant Windows server, available from the Service Pack for ProLiant
(SPP).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 60 of 436
Chapter 4: Configuring ProLiant Windows servers
Table 4.1 ProLiant Windows server using WMI configuration steps, continued
Task Complete?
Send a test event to verify connectivity between your ProLiant Windows server and Insight RS.
The Service Pack for ProLiant (SPP) is a software bundle that includes drivers, utilities, and management
agents for ProLiant device(s). SPP is included on the HPE SmartStart CD that ships with every ProLiant. The
most current version is also available at: http://www.hpe.com/info/SPP/download.
HPE ProLiant systems running Microsoft Windows are supported by Insight Management Providers (IM
Providers for WBEM/WMI Mapper support). Both providers and agents are available through the same SPP
media.
Important: To gather SAN Collections for a ProLiant Windows server, you must use WMI and
Service Pack for ProLiant version 2.8 or later.
If SNMP is available on the ProLiant Windows monitored device it is recommend that it be disabled from
monitoring in the Insight RS Console to prevent dual notification of a single failing component. This is done by
deleting the SNMP protocol for the monitored device in the Insight RS Console.
Install WMI
IM Providers on the SmartStart CD and/or in the SPP version 8.1 and higher are supported for Insight Remote
Support.
See the HPE Insight Management WBEM Providers web site at: www.hpe.com/info/insight-wbem for more
information about WBEM providers, security, and credentials.
If you are using the Windows WBEM Providers (IM Providers), WBEM credentials must be set for each
monitored device within the Insight RS Console before it can be monitored. If you change your WBEM
credentials at any time, you must modify the entry for those credentials in the Insight RS Console.
The WBEM IM Providers are optional in the SPP install. Make sure you select them while installing SPP.
System Management Homepage (SMH) is also part of the SPP. It provides additional reporting capabilities on
the monitored device itself. While not mandatory for Insight Remote Support, SMH can be used to work with
the WBEM protocol such as sending test events.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 61 of 436
Chapter 4: Configuring ProLiant Windows servers
In Windows Server, WMI fails to connect to the namespace root\WMI if User Account Control (UAC) is
enabled. Use one of the following procedures to disable UAC, depending on which version of Windows Server
you are using. To perform this procedure, you must be logged on as a local administrator or provide the
credentials of a member of the local Administrators group.
To turn off UAC in Windows Server 2008, complete the following steps:
1. Click Start, and then click Control Panel.
2. In Control Panel, click User Accounts.
3. In the User Accounts window, click User Accounts.
4. In the User Accounts tasks window, click Turn User Account Control on or off.
5. If UAC is currently configured in Admin Approval Mode, the User Account Control message appears.
Click Continue.
6. Clear the Use User Account Control (UAC) to help protect your computer check box and click OK.
7. Click Restart Now to apply the change right away, or click Restart Later, then close the User Accounts
tasks window.
To turn off UAC in Windows Server 2008 R2, Windows Server 2012, and Windows Server 2016, complete the
following steps:
1. Click Start, and then click Control Panel.
2. In Control Panel, click User Accounts.
3. In the User Accounts window, click User Accounts.
4. In the User Accounts tasks window, click Change User Account Control settings.
5. If the User Account Control dialog box appears, make sure that the action it displays is what you want,
and then click Yes.
6. On the User Account Control Settings page, disable UAC: move the slider to Never notify and click OK.
7. Restart the server to apply the changes.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 135 Monitored Hosting DCE endpoint resolution. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
TCP 139 Monitored Hosting NETBIOS Session Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 62 of 436
Chapter 4: Configuring ProLiant Windows servers
Table 4.2 ProLiant Microsoft Windows and Hyper-V Connectivity - Firewall/Port Require-
ments, continued
TCP 1024- Monitored Hosting Windows Server 2003 Windows Management Interface Required
65535 Systems Device (WMI) Communications DCOM dynamic port
assignment. Note that the Hosting Device can be
configured to limit this range. The source port will
always be 135.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The monitored
host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
UDP 137 Monitored Hosting NETBIOS Name Service. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
UDP 138 Monitored Hosting NETBIOS Datagram Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
UDP 445 Monitored Hosting Microsoft File Sharing. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 63 of 436
Chapter 4: Configuring ProLiant Windows servers
5. Type the Username and Password you have configured on your device.
6. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 64 of 436
Chapter 4: Configuring ProLiant Windows servers
4. If you chose to install WBEM with SPP, it will be set as your Data Source. In the Test Indication pane,
click Send Test Indication.
5. In the Send Test Indication screen, select an Event ID type (any will work) and click Send.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 65 of 436
Chapter 4: Configuring ProLiant Windows servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 66 of 436
Chapter 4: Configuring ProLiant Windows servers
Check the HPE Insight Remote Support Release Notes to make sure your ProLiant Windows
server is supported.
Install SNMP on the ProLiant Windows server, available from the Service Pack for ProLiant
(SPP).
Send a test event to verify connectivity between your ProLiant Windows server and Insight RS.
The Service Pack for ProLiant (SPP) is a software bundle that includes drivers, utilities, and management
agents for ProLiant device(s). SPP is included on the HPE SmartStart CD that ships with every ProLiant. The
current version is also available at: http://www.hpe.com/info/SPP/download.
HPE ProLiant systems running Microsoft Windows are supported by Insight Management Agents (IM Agents
for SNMP support). Both providers and agents are available through the same SPP media.
If WBEM is available on the ProLiant Windows monitored device it is recommend that it be disabled from
monitoring in the Insight RS Console to prevent dual notification of a single failing component. This is done by
deleting the WMI protocol for the monitored device in the Insight RS Console.
If you are using the Windows SNMP Agents (IM Agents), you must configure SNMP to communicate with the
Hosting Device (see "Configuring SNMP").
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 67 of 436
Chapter 4: Configuring ProLiant Windows servers
System Management Homepage (SMH) is also part of the SPP. It provides additional reporting capabilities on
the monitored device itself. While not mandatory for Insight Remote Support, if you have not configured your
SNMP services correctly to communicate with the Hosting Device during Insight Management Agent
installation you can use SMH to reconfigure those settings. If you have installed both the default SNMP
configuration and the optional WMI configuration while installing the SPP, then SMH will default to the WMI
configuration and you may need to reset it to the SNMP configuration if you choose to get your hardware
events through SNMP.
Configure SNMP
Your monitored devices must be configured to communicate with the Hosting Device. If you choose to use
SNMP the following steps are required to allow the monitored devices to fully communicate with the Hosting
Device.
Monitored devices that use SNMP notifications must include the following:
l All monitored devices must have a working intranet connection, such as through an Ethernet adapter, with
TCP/IP installed and running. Monitored devices must have two-way communication with the Hosting
Device over this connection.
l All monitored devices need the Insight Management Agent software for problem detection and trap
generation. The IM agents are distributed by HPE and are designed to generate SNMP traps with
information that allows for a more complete analysis.
l All monitored devices need to have the IP address of the Hosting Device host defined as a trap destination.
The Hosting Device must be able to communicate with the monitored device, but by default, Windows Server
only accepts SNMP packets from the localhost. To configure Windows Server to send traps to the Hosting
Device, complete the following steps:
1. In a web browser, access System Management Homepage (SMH) on the monitored device: https://
[ipaddress]:2381.
2. Log on using the administrator user name and password for the monitored device.
If you are not prompted for a logon, check the upper right corner of the SMH interface and click the Sign
In link. If you are not logged in as an administrator you will not have all of the relevant configuration
options.
3. In the top menu bar, click Settings.
If Settings displays the below image, this means that WBEM is set as the data source. You will need to
first set your data source to SNMP. If SNMP is already set as your data source, skip to the next step.
To change your data source to SNMP, complete the following steps:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 68 of 436
Chapter 4: Configuring ProLiant Windows servers
a. In the Select SMH Data Source pane, click the Select link.
b. In the Select Data Source pane, click the SNMP option and click Select.
c. In the top menu bar, click Settings. If you changed the data source to SNMP while logged into SMH
remotely, you will have to log on again and click the Settings tab.
4. In the SNMP Webagent pane, click the SNMP & Agent Settings link.
5. In the left menu of the Management Agents Configuration screen, click the Security link.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 69 of 436
Chapter 4: Configuring ProLiant Windows servers
6. In the Security Configuration screen click one of the following options in the Selected Hosts section:
l Accept SNMP packets from any host.
or
l Accept SNMP packets from these hosts and specify the IP address for your Hosting Device in the
text area.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 70 of 436
Chapter 4: Configuring ProLiant Windows servers
7. In the left menu of the Security Configuration screen, click the Trap link.
8. In the Trap Configuration screen, do one of the following:
l Add a Community Name that includes the Hosting Device as a Trap Destination.
or
l Edit the public Community Name to include the Hosting Device as a Trap Destination.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 71 of 436
Chapter 4: Configuring ProLiant Windows servers
Complete the preceding steps for each ProLiant Windows monitored device that uses SNMP to communicate
with the Hosting Device.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 135 Monitored Hosting DCE endpoint resolution. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
TCP 139 Monitored Hosting NETBIOS Session Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
TCP 1024- Monitored Hosting Windows Server 2003 Windows Management Interface Required
65535 Systems Device (WMI) Communications DCOM dynamic port
assignment. Note that the Hosting Device can be
configured to limit this range. The source port will
always be 135.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The monitored
host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 72 of 436
Chapter 4: Configuring ProLiant Windows servers
Table 4.4 ProLiant Microsoft Windows and Hyper-V Connectivity - Firewall/Port Require-
ments, continued
TCP 49152- Monitored Hosting Windows Server 2008/2012/2016 Windows Required
65535 Systems Device Management Interface (WMI) Communications DCOM
dynamic port assignment. Note that the Hosting Device
can be configured to limit this range. The source port
will always be 135.
UDP 137 Monitored Hosting NETBIOS Name Service. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
UDP 138 Monitored Hosting NETBIOS Datagram Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
UDP 445 Monitored Hosting Microsoft File Sharing. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 73 of 436
Chapter 4: Configuring ProLiant Windows servers
3. Expand the IP Addresses section and add the IP address for your device:
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 74 of 436
Chapter 4: Configuring ProLiant Windows servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 75 of 436
Chapter 5: Configuring ProLiant Linux
servers
Important: If you want to configure a Superdome X server, do not use this chapter. Use the
configuration information in "Configuring Integrity Superdome X servers" on page 147.
Make sure Insight RS supports your ProLiant Linux server by checking the HPE Insight Remote
Support Release Notes.
Install SNMP on the ProLiant Linux server, available from the Service Pack for ProLiant (SPP).
Send a test event to verify connectivity between your ProLiant Linux server and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 76 of 436
Chapter 5: Configuring ProLiant Linux servers
Important: SNMP support (including IM Agents and Health Drivers) cannot be supported on the
same monitored device as WBEM (including IM Providers and Health Drivers). WBEM, if installed,
must be removed according to the SPP documentation available at:
http://www.hpe.com/info/spp/docs/.
Note: On your Linux monitored device, the /etc/snmp/snmpd.conf file contains the SNMP
configuration information. During the IM Agents installation script, watch for information about this
file. When the script prompts you about Configuring SNMP access from remote Management
Station(s), be sure to include the Hosting Device IP address. If you do not, you will need to
reconfigure SNMP.
System Management Homepage (SMH) is also part of the SPP. It provides additional reporting capabilities on
the monitored device itself. SMH is not mandatory for Insight Remote Support, but it can be used to
reconfigure SNMP if settings made during Insight Management Agent installation need to be changed.
Configure SNMP
Once you have installed the Insight Management Agents on your monitored devices, use SMH to edit the
snmpd.conf file to add the Hosting Device IP address and the SNMP community string. This enables SNMP
communication from the monitored device to the Hosting Device. You will need to do this for each Linux
monitored device.
Note: You can also edit the snmpd.conf file in a text editor if you are not using SMH.
The Hosting Device must be able to communicate with the monitored device. To configure the monitored
device to send traps to the Hosting Device, complete the following steps:
1. In a web browser, access System Management Homepage (SMH) on the monitored device: https://
[ipaddress]:2381.
2. Log on using the monitored device root username and password.
3. In the top menu bar, click Settings.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 77 of 436
Chapter 5: Configuring ProLiant Linux servers
The trapsink command is required for events to be sent to Insight Remote Support for analysis. If the
trapsink command is not configured, Insight Remote Support will not receive traps.
A rocommunity directive allows SNMP GET and GETNEXT access. It is required for discovery and by the
analysis rules. The format is: rocommunity <community_string>, for example rocommunity public.
The community string used must be the same read community string configured in the Insight RS
Console SNMP protocol assigned to the ProLiant Linux server. The rocommunity is used during analysis
rules trap processing to retrieve additional information not supplied with traps.
The rwcommunity directive allows SNMP GET, GETNEXT, and SET access. It is not required for use by
Insight Remote Support, but may be needed by other applications.
Note: If you do not use the public community string in the trapsink entry, then you must add
a new SNMP protocol for this monitored device in the Insight RS Console that uses the same
community string.
6. For those Linux installations (for example Red Hat 4 or 5) that support the added security of view
statements, add a view systemview included entry. The view systemview included entry allows
Insight Remote Support to read the entire .232 MIB tree and gather all of the analysis data when events
occur. Make the following change to the default settings:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 78 of 436
Chapter 5: Configuring ProLiant Linux servers
a. Scroll down in the SNMP Configuration File to the view systemview included entries.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 79 of 436
Chapter 5: Configuring ProLiant Linux servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 80 of 436
Chapter 5: Configuring ProLiant Linux servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 81 of 436
Chapter 5: Configuring ProLiant Linux servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 82 of 436
Chapter 6: Configuring ProLiant VMware ESX
servers
Fulfill configuration requirements
To configure your ProLiant VMware ESX servers to be monitored by Insight RS, complete the following
sections:
Table 6.1 ProLiant VMware ESX server configuration steps
Task Complete?
Make sure Insight RS supports your ProLiant VMware ESX server by checking the HPE Insight
Remote Support Release Notes.
Send a test event to verify connectivity between your ProLiant VMware ESX server and Insight
RS.
Configure SNMP
Your monitored devices must be configured to communicate with the Hosting Device. VMware ESX uses
SNMP for communication to the Hosting Device. SNMP should be installed by default with VMware ESX, but
you must configure your monitored device SNMP settings to communicate with the Hosting Device.
Monitored devices that participate in SNMP notifications must include the following:
l All monitored devices must have a working intranet connection, such as through an Ethernet adapter, with
TCP/IP installed and running. Monitored devices must have two-way communication with the Hosting
Device over this connection.
l Monitored devices need the Management Agent software for problem detection and trap generation. The IM
agents are distributed by HPE and are designed to generate SNMP traps with information that allows for a
more complete analysis. With VMware ESX the management agents are part of the VMware ESX bundle.
So, if your monitored device is properly configured, the agents will be present on the server.
l Finally, all monitored devices need to have the Hosting Device IP address defined as a trap destination.
SNMP Agents are required for VMware ESX monitored devices. Once you have installed the SNMP Agents
on your monitored devices, use SMH to edit the snmpd.conf file to add the Hosting Device IP address and the
SNMP community string. This enables SNMP communication from the monitored device to the Hosting
Device. You will need to do this for each VMware ESX monitored device.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 83 of 436
Chapter 6: Configuring ProLiant VMware ESX servers
Note: You can also edit the snmpd.conf file in a text editor if you are not using SMH.
The Hosting Device must be able to communicate with the monitored device. To configure the monitored
device to send traps to the Hosting Device, complete the following steps:
1. In a web browser, access System Management Homepage (SMH) on the monitored device: https://
[ipaddress]:2381.
2. Log on using the monitored device root user name and password.
3. In the top menu bar, click Settings.
Note: If you do not use the public community string in the trapsink entry, then you must add
a new SNMP protocol for this monitored device in the Insight RS Console that uses the same
community string.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 84 of 436
Chapter 6: Configuring ProLiant VMware ESX servers
6. For those Linux installations (for example Red Hat 4 or 5) that support the added security of view
statements, add a view systemview included entry. The view systemview included entry allows
Insight Remote Support to read the entire .232 MIB tree and gather all of the analysis data when events
occur. Make the following change to the default settings:
a. Scroll down in the SNMP Configuration File to the view systemview included entries.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 85 of 436
Chapter 6: Configuring ProLiant VMware ESX servers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 86 of 436
Chapter 6: Configuring ProLiant VMware ESX servers
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 87 of 436
Chapter 6: Configuring ProLiant VMware ESX servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 88 of 436
Chapter 7: Configuring ProLiant VMware
ESXi servers
Fulfill configuration requirements
To configure your ProLiant VMware ESXi servers to be monitored by Insight RS, complete the following
sections:
Table 7.1 ProLiant VMware ESXi server configuration steps
Task Complete?
Make sure Insight RS supports your ProLiant VMware ESXi server by checking the HPE Insight
Remote Support Release Notes.
Install and configure WBEM providers on the ESXi server. If using the HPE' ESXi image, all
necessary WBEM providers are included.
Important: If using the HPE ESXi image, then it is not necessary to download and install the
WBEM Providers bundle because the image already has the bundle integrated within.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 89 of 436
Chapter 7: Configuring ProLiant VMware ESXi servers
www.hpe.com/info/esxidownload
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener running Required
Systems Device in the Director's Web Interface. The monitored host
connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 90 of 436
Chapter 7: Configuring ProLiant VMware ESXi servers
5. Type the Username and Password you have configured on your device.
6. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
Important: If you are using the VMware ESXi image you must install the ESXi Utilities Offline
Bundle to send test events. See "Obtain bundles to configure the VMware ESXi image" on the
previous page.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 91 of 436
Chapter 7: Configuring ProLiant VMware ESXi servers
On the monitored device, use one of the following methods to run the hptestevent command:
l Run the command directly on the ESXi host:
/opt/hp/tools/hptestevent
l Use the esxcli to run the command:
esxcli hptestevent execute
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 92 of 436
Chapter 8: Configuring ProLiant Citrix
XenServers
Fulfill configuration requirements
To configure your ProLiant Citrix XenServers to be monitored by Insight RS, complete the following sections:
Table 8.1 ProLiant Citrix XenServer configuration steps
Task Complete?
Make sure Insight RS supports your ProLiant Citrix XenServer by checking the HPE Insight
Remote Support Release Notes.
Install HPE SNMP Agents for Citrix XenServer on the ProLiant Citrix XenServer.
Send a test event to verify connectivity between your ProLiant Citrix XenServer and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 93 of 436
Chapter 8: Configuring ProLiant Citrix XenServers
Note: On your Citrix monitored device, the /etc/snmp/snmpd.conf file contains the current SNMP
configuration. During your configuration of the installation script of SNMP Agents, watch for
information about this file. When the script prompts you about Configuring SNMP access from
remote Management Station(s), be sure to include the Hosting Device IP address. If you do not,
you will need to reconfigure this on the monitored device.
System Management Homepage (SMH) is also included in the HPE SNMP Agents for Citrix XenServer
software package. It provides additional reporting capabilities on the monitored device itself. While not
mandatory for Insight Remote Support, if you configure SNMP services incorrectly to communicate with the
Hosting Device during SNMP Agent installation you will need SMH to reconfigure those settings.
Configure SNMP
SNMP Agents are required for Citrix monitored devices. Once you have installed the SNMP Agents on your
monitored devices, use SMH to edit the snmpd.conf file to add the Hosting Device IP address and the SNMP
community string. This enables SNMP communication from the monitored device to the Hosting Device. You
will need to do this for each Citrix monitored device.
Note: You can also edit the snmpd.conf file in a text editor if you are not using SMH.
The Hosting Device must be able to communicate with the monitored device. To configure the monitored
device to send traps to the Hosting Device, complete the following steps:
1. In a web browser, access System Management Homepage (SMH) on the monitored device: https://
[ipaddress]:2381.
2. Log on using the monitored device root user name and password.
3. In the top menu bar, click Settings.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 94 of 436
Chapter 8: Configuring ProLiant Citrix XenServers
The community string used must be the same read community string configured in the Insight RS
Console SNMP protocol assigned to the ProLiant Citrix server. The rocommunity is used during analysis
rules trap processing to retrieve additional information not supplied with traps.
The rwcommunity directive allows SNMP GET, GETNEXT, and SET access. It is not required for use by
Insight Remote Support, but may be needed by other applications.
Note: If you do not use the public community string in the trapsink entry, then you must add
a new SNMP protocol for this monitored device in the Insight RS Console that uses the same
community string.
6. For those Linux installations (for example Red Hat 4 or 5) that support the added security of view
statements, add a view systemview included entry. The view systemview included entry allows
Insight Remote Support to read the entire .232 MIB tree and gather all of the analysis data when events
occur. Make the following change to the default settings:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 95 of 436
Chapter 8: Configuring ProLiant Citrix XenServers
a. Scroll down in the SNMP Configuration File to the view systemview included entries.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 96 of 436
Chapter 8: Configuring ProLiant Citrix XenServers
string or use a nonstandard port, you must create an SNMP protocol credential in the Insight RS Console.
To configure SNMP in the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Credentials tab.
3. From the Select and Configure Protocol drop-down list, select Simple Network Management Protocol
for the version of SNMP configured on your server.
4. Click New. The New Credential dialog box appears.
5. Type the information configured on your server.
6. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 97 of 436
Chapter 8: Configuring ProLiant Citrix XenServers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 98 of 436
Chapter 8: Configuring ProLiant Citrix XenServers
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the Basic Collection Results tab.
3. Expand the Server Basic Configuration Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 99 of 436
Chapter 9: Configuring Integrity Windows
2003 servers
Event Log Monitoring Collector (ELMC) is responsible for remote support monitoring on Windows 2003
Integrity monitored devices. SNMP is necessary for Discovery, and WBEM is necessary for configuration
collections.
Make sure Insight RS supports your Integrity Windows 2003 server by checking the HPE Insight
Remote Support Release Notes.
Send a test event to verify connectivity between your Windows 2003 Integrity server and Insight
RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 100 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
If ELMC is already installed on the Integrity Windows 2003 server, make sure it is version 6.2 or later. If it's
older than version 6.2, it needs to be upgraded. To check the version of ELMC, run the following command:
wccproxy version.
Note: When upgrading to ELMC version 6.4, the incorrect version number is displayed in the
upgrade window. After performing the upgrade, the correct version number of 6.4 will show in the
Programs and Features window and when you run the wccproxy version command.
Note: WBEM Providers can coexist with SNMP Agents on the monitored device system as long as
they have the same version number. Mismatched versions of HPE Insight Management WBEM
Providers and HPE Insight Management SNMP Agents are not supported.
Windows Integrity servers shipped by HPE manufacturing have the Smart Setup installation files pre-loaded
on the operating system disk. Otherwise the packages can be installed using the Smart Setup CD or
reinstallation media. You can download the Smart Setup CD or Integrity Support Pack at:
http://h20565.www2.hpe.com/hpsc/swd/public/readIndex?sp4ts.oid=3346453&swLangOid=8&swEnvOid=1
060.
For SNMP Agents to communicate to the Hosting Device, you must provide the SNMP credentials within the
Insight RS Console. These actions must occur within the Insight RS Console on the Hosting Device when
you are completing the Insight Remote Support configuration.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 101 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
Integrity WBEM Providers for Windows Server 2003 installed and fully configured on your monitored devices
as directed in the HPE Smart Setup product documentation for the appropriate package.
Note: WBEM Providers can coexist with SNMP Agents on the monitored device system as long as
they have the same version number. Mismatched versions of HPE Insight Management WBEM
Providers and HPE Insight Management SNMP Agents are not supported.
Windows Integrity servers shipped by HPE manufacturing have the Smart Setup installation files pre-loaded
on the operating system disk. Otherwise the packages can be installed using the Smart Setup CD or
reinstallation media. You can download the Smart Setup CD or Integrity Support Pack at:
http://h20565.www2.hpe.com/hpsc/swd/public/readIndex?sp4ts.oid=3346453&swLangOid=8&swEnvOid=1
060.
For WBEM Providers to communicate to the Hosting Device, you must provide the WBEM credentials as
directed in the HPE Insight Remote Support Installation and Configuration Guide. These actions must occur
within the Insight RS Console when you are completing the Insight Remote Support configuration.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 135 Monitored Hosting DCE endpoint resolution. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
TCP 139 Monitored Hosting NETBIOS Session Service. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
TCP 1024- Monitored Hosting Windows Server 2003 Windows Management Interface Required
65535 Systems Device (WMI) Communications DCOM dynamic port
assignment. Note that the Hosting Device can be
configured to limit this range. The source port will
always be 135.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener running Required
Systems Device in the Director's Web Interface. The monitored host
connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
TCP 7920 Hosting Monitored The Insight RS ELMC (formerly WCCProxy) process Required
Device Systems communicates with the Director on this port. This is a
proprietary protocol. Any connections that exchange
username and passwords use SSL. Not all connections
are SSL.
UDP 137 Monitored Hosting NETBIOS Name Service. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 102 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
Table 9.2 Integrity Windows Server 2003 Connectivity - Firewall/Port Requirements, con-
tinued
UDP 138 Monitored Hosting NETBIOS Datagram Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
UDP 445 Monitored Hosting Microsoft File Sharing. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 103 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 104 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
Note: If you are not prompted to log on, check the upper right corner of the SMH interface and
click the Sign In link. If you are not logged in as an administrator for the monitored device you
will not have all of the relevant configuration options.
3. If SNMP is not set as your Data Source, click Settings in the top menu bar.
4. In the Select SMH Data Source box, click the Select link.
5. In the Select Data Source section choose the SNMP option, and then click Select.
6. Once your Data Source is set to SNMP, click the Settings option, and then select the SNMP & Agent
Configuration setting.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 105 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
Note: If you are not prompted to log on, check the upper right corner of the SMH interface and
click the Sign In link. You will not have access to all relevant configuration options if you are
not logged in as an administrator for the monitored device.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 106 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
5. In the Send Test Indication screen, select an Event ID type and click Send.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 107 of 436
Chapter 9: Configuring Integrity Windows 2003 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 108 of 436
Chapter 10: Configuring Integrity Windows
2008 servers
Fulfill configuration requirements
To configure your Integrity Windows 2008 servers to be monitored by Insight RS, complete the following
sections:
Table 10.1 Integrity Windows 2008 server configuration steps
Task Complete?
Make sure Insight RS supports your Integrity Windows 2008 server by checking the HPE Insight
Remote Support Release Notes.
Send a test event to verify connectivity between your Windows 2008 Integrity server and Insight
RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 109 of 436
Chapter 10: Configuring Integrity Windows 2008 servers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 135 Monitored Hosting DCE endpoint resolution. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
TCP 139 Monitored Hosting NETBIOS Session Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The monitored
host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
TCP 49152- Monitored Hosting Windows Server 2008 Windows Management Interface Required
65535 Systems Device (WMI) Communications DCOM dynamic port
assignment. Note that the Hosting Device can be
configured to limit this range. The source port will
always be 135.
UDP 137 Monitored Hosting NETBIOS Name Service. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
UDP 138 Monitored Hosting NETBIOS Datagram Service. Used by DCOM, and Required
Systems Device hence, Windows Management Interface (WMI) and
Insight RS.
UDP 445 Monitored Hosting Microsoft File Sharing. Used by DCOM, and hence, Required
Systems Device Windows Management Interface (WMI) and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 110 of 436
Chapter 10: Configuring Integrity Windows 2008 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 111 of 436
Chapter 10: Configuring Integrity Windows 2008 servers
Note: If you are not prompted for a logon, check the upper right corner of the SMH interface
and click the Sign In link. If you are not logged in as an administrator for the monitored device
you will not have all of the relevant configuration options.
4. If you chose to install WBEM with the Support Pack, it will be set as your Data Source, click the Send
Test Indication option.
5. In the Send Test Indication screen, select an Event ID type and click Send.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 112 of 436
Chapter 10: Configuring Integrity Windows 2008 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 113 of 436
Chapter 10: Configuring Integrity Windows 2008 servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 114 of 436
Chapter 11: Configuring Integrity Linux
servers
Important: Configuration collections are not supported.
Note: nPars are not supported on Linux Integrity servers except on Integrity Superdome X servers.
Make sure Insight RS supports your Integrity Linux server by checking the HPE Insight Remote
Support Release Notes.
Verify that WBEM is installed and configured on the Integrity Linux server.
Send a test event to verify connectivity between your Integrity Linux server and Insight RS.
The HPE WBEM Providers are required on your Integrity Linux monitored device(s). The Integrity Linux HPE
WBEM Providers and the relevant documentation are part of the Support Pack, which is part of the larger HPE
Integrity Essentials Foundation Pack for Linux. HPE recommends installing the HPE Integrity Essentials
Foundation Pack rather than installing the HPE Insight Management Agent or Insight Management WBEM
Provider alone as it contains additional recommended component updates. For more details, visit
www.hpe.com/us/en/servers/mission-critical.html.
You can download the latest version of the HPE Integrity Essentials Foundation Pack for Linux software at:
h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumber=linsstk.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 115 of 436
Chapter 11: Configuring Integrity Linux servers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener running Required
Systems Device in the Director's Web Interface. The monitored host
connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 116 of 436
Chapter 11: Configuring Integrity Linux servers
d. Click Add.
4. Click Start Discovery.
This creates a zero-length file called SMX.test in the tmp directory. The SMX providers will create an
indication to send to the Hosting Device and remove the temporary file that you created in the previous step.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 117 of 436
Chapter 11: Configuring Integrity Linux servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 118 of 436
Chapter 12: Configuring Integrity and HP
9000 HP-UX servers
Before attempting to configure Insight Remote Support for your HP-UX monitored device, read the following
information.
Note: Insight RS supports HP-UX 11i v3 vPars v5 only. vPars v6 are not supported; Insight RS
cannot entitle vPars v6 partitions because they do not have unique serial numbers and are not
registered in the HPE entitlement system.
Make sure Insight RS supports your HP-UX server by checking the HPE Insight Remote Support
Release Notes.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 119 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
already meet the minimum requirements identified in that section, then you do not need to remove or reinstall
those components.
Note: You may be familiar with the variety of SFM providers available in the different SFM offerings.
Insight Remote Support only requires the providers in the standard SFM package(s) as specified in
section "Meeting HP-UX Operating System, Software, and Patch Requirements" below.
Important: On the Hosting Device, discover your HP-UX monitored device and configure the
System Information after you have met the HP-UX prerequisites defined in this chapter.
Important: While not required for HP-UX 11i v1 (11.11), HPE strongly recommends installing
GOLDBASE11i - B.11.11.0612.459 Base Patches for HP-UX (December 2006).
GOLDBASE11i fulfills all system patch requirements and provides a stable supported environment.
The following table identifies the minimum required patches (required if GOLDBASE11i is not
installed).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 120 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Operating System Patch Requirements Any 11i v1 OE is supported, however any 11i v1 OE prior to
June, 2003, must also have patch bundle B.11.11.0306.1
installed.
OpenSSL Secure Network Communications A.00.09.07i.012 product bundle (December, 2006) or later
Protocol
WBEMSvcs (WBEM Services Core Product) A.02.05 product bundle (December, 2006) or later
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 121 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Table 12.2 Required software components for HP-UX 11i v1, continued
Required software Version required
System Management Web (recommended for A.2.2.5 product bundle (December, 2006)
event monitoring, required for configuration
collection)
System Management Web is recommended to take full advantage of SFM's EVWEB GUI component which allows
viewing of events handled by SFM on the host.
If only SysMgmtHomepage version 2.2.6.2 is present on the system, then the following patch must also be
applied:
For HP-UX 11i v1 (11.11) OE apply patch PHSS_36869
Patches can be obtained from the HPE Support Center:
Go to www.hpe.com/support/hpesc and sign in using your HPE Passport account. In the menu, click the Patch
management link. Type the patch name into the Patch Management search box and press Enter.
This is a “sharfile” and must be unpacked by running it as a script (sh PHSS_36869). Be sure to review the patch
installation instructions in the enclosed text file (PHSS_36869.text)
hpuxwsApache A.2.0.49
hpuxwsApache is a requirement only for the Advanced Configuration Collector component that acts as an agent
for the configuration collection element of Remote Support. It is not required for Remote Device Monitoring.
When installing the product hpuxwsAPACHE, it is recommended the entire hpuxwsApache bundle be installed.
For the downloaded depot, the hpuxTomcat and hpuxWebmin bundles are not required.
Important: It is critical that SFM is the final prerequisite software component installed or upgraded from
this list.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 122 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Table 12.2 Required software components for HP-UX 11i v1, continued
Required software Version required
Note: See the System Fault Management Release Notes for more details and additional SFM
prerequisites at www.hpe.com/info/hpux-diagnostics-sfm-docs.
Important: While not required for HP-UX 11i v2 (11.23), HPE strongly recommends installing the
latest QPKBASE patch bundle. QPKBASE fulfills all system patch requirements and provides a stable
supported environment. The following table identifies the minimum required patches (required if
QPKBASE is not installed).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 123 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Table 12.3 Required software components for HP-UX 11i v2, continued
Required software Version required
Operating System Patch Requirements BUNDLE 11i patch bundle B.11.23.0409.3 (September,
2004):
Note: These six additional patches for HP- l PHKL_36288 - 11.23 Cumulative diag2 driver and
UX 11i v2 are not part of the Bundle11i and vPars enablement (use in place of PHKL_32653),
must be installed in addition to it. requires a reboot
l PHKL_34795 - 11.23 Cumulative IPMI driver patch,
requires a reboot
l PHSS_37552 - 1.0 Aries cumulative patch
l PHSS_37947 - 1.0 linker + fdp cumulative patch
l PHSS_35055 - aC++ Runtime (IA: A.06.10, PA:
A.03.71)
l PHSS_36345 - 11.23 Integrity Unwind Library
OpenSSL Secure Network Communications Protocol A.00.09.07i.012 product bundle (December, 2006) or
later
WBEMSvcs (WBEM Services Core Product) A.02.05.08 WBEM Services CORE Product (December,
2007) or later
System Management Web (recommended for event A.2.2.7 HP-UX Web Based System Management User
monitoring, required for configuration collection) Interface (December 2007) or later
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 124 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Table 12.3 Required software components for HP-UX 11i v2, continued
Required software Version required
System Management Web is recommended to take full advantage of SFM's EVWEB GUI component which allows
viewing of events handled by SFM on the host.
If only SysMgmtHomepage version 2.2.6.2 is present on the server, then the following patch must also be
applied:
For HP-UX 11i v2 (11.23) OE apply patch PHSS_36870
Patches can be obtained from the HPE Support Center:
Go to www.hpe.com/support/hpesc and sign in using your HPE Passport account. In the menu, click the Patch
management link. Type the patch name into the Patch Management search box and press Enter.
This is a "sharfile" and must be unpacked by running it as a script (sh PHSS_36870). Be sure to review the patch
installation instructions in the enclosed text file (PHSS_36870.text)
System Fault Management (SFM) B.07.01.01.yy System Fault Management (May, 2009)
or later
Important: It is critical that SFM is the final prerequisite software component installed or upgraded from
this list.
Note: See the System Fault Management Release Notes for more details and additional SFM
prerequisites at www.hpe.com/info/hpux-diagnostics-sfm-docs.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 125 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
l The table lists items in the sequence in which they should be installed in case any of them are
missing and require upgrade or installation.
Online Diagnostics: Diagnostic and Support Tools for B.11.31.01.yy or later (SysFaultMgmt version
HP-UX, including STM version A.49.10 or later and dependency.)
EMS version A.04.20 or later
System Management Web (recommended for event A.2.2.4 HP-UX Web Based System Management User
monitoring, required for configuration collection) Interfaces (December, 2007) or later
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 126 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Table 12.4 Required software components for HP-UX 11i v3, continued
Required software Version required
System Management Web is recommended to take full advantage of SFM's EVWEB GUI component which allows
viewing of events handled by SFM on the host.
If only SysMgmtHomepage version 2.2.6.2 is present on the server, then the following patch must also be
applied:
For HP-UX 11i v3 (11.31) OE apply patch PHSS_36871
Patches can be obtained from the HPE Support Center:
Go to www.hpe.com/support/hpesc and sign in using your HPE Passport account. In the menu, click the Patch
management link. Type the patch name into the Patch Management search box and press Enter.
This is a "sharfile" and must be unpacked by running it as a script (sh PHSS_36871). Be sure to review the patch
installation instructions in the enclosed text file (PHSS_36871.text)
System Fault Management (SFM) C.07.10.08.yy HPUX System Fault Management or later
It is critical that SFM is the final prerequisite software component installed or upgraded from this list.
Note: See the System Fault Management Release Notes for more details and additional SFM
prerequisites at www.hpe.com/info/hpux-diagnostics-sfm-docs.
2. To list registered CIM providers and their current status to make sure that they are all enabled, run the
following command:
# cimprovider –l –s
3. Run the following command to check OnlineDiag is installed and make sure it is version B.11.11.16xx or
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 127 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
later.
# swlist | grep –i OnlineDiag
The output should look similar to the following:
4. Run the following command to check that OnlineDiag is reporting that Event Monitoring is Currently
Enabled and that EMS version is A.04.20 or later and the STM is A.49.10 or later:
# /etc/opt/resmon/lbin/monconfig
The output should look similar to the following:
5. Select 'Q' to exit the EMS Monitoring Request Manager Main Menu.
6. Disable EMS hardware monitors for HP-UX 11i v2 and 11i v3.
Important: HP-UX 11i v1 has only one mode, which means that SFM uses EMS to report the
events. You cannot disable EMS in 11i v1.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 128 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
7. Run the following command to determine the version of the optional, but recommended, SMH component
is at least version A.2.2.6.2:
# swlist SysMgmtWeb SysMgmtHomepage
The output should look similar to the following:
8. Change the startup mode for SMH so that the autostart URL mode is set to OFF and start on boot mode is
set to ON:
# /opt/hpsmh/lbin/hpsmh stop
# /opt/hpsmh/bin/smhstartconfig -a off -b on
# /opt/hpsmh/lbin/hpsmh start
# /opt/hpsmh/bin/smhstartconfig
l VParProvider B.11.31.01.06 – This fileset is available as part of the WBEM Management Bundle,
available at:
h20392.www2.hpe.com/portal/swdepot/displayInstallInfo.do?productNumber=WBEMMgmtBundle.
l HP-UX WBEM Services A.02.07 – This fileset is available as part of the WBEM Management Bundle,
available at:
h20392.www2.hpe.com/portal/swdepot/displayInstallInfo.do?productNumber=WBEMMgmtBundle.
Note that you may have already installed the WBEM Management Bundle when you installed SFM.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 129 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
4. Based on the above output, set the following variables in the CIM planned configuration:
# cimconfig –s enableSubscriptionsForNonprivilegedUsers=true –p
# cimconfig –s enableNamespaceAuthorization=true –p
5. Stop and start the CIM Server to set the configuration changes in the CIM current configuration:
# cimserver –s
# cimserver
6. Verify the settings in the CIM current configuration:
# cimconfig –l -c
Example Output:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 130 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
sslClientVerificationMode=disabled
enableSubscriptionsForNonprivilegedUsers=true
shutdownTimeout=30
authorizedUserGroups=
enableRemoteprivilegedUserAccess=true
enableHttpsConnection=true
enableNamespaceAuthroization=true
enableHttpConnection=false
7. Add read and write authorizations for the user hpirs to each of the namespaces, root/cimv2, root/PG_
InterOp, and root/PG_Internal:
# cimauth –a –u hpirs –n root/cimv2 –R –W
# cimauth –a –u hpirs –n root/PG_InterOp –R –W
# cimauth –a –u hpirs –n root/PG_Internal –R –W
# cimauth –a –u hpirs –n root/cimv2/npar –R –W
# cimauth –a –u hpirs –n root/cimv2/vpar –R –W
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 131 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Note: Only system administrators can modify or create user names in the Insight Remote
Support configuration file. Ensure that the user name exists on the HP-UX system before
configuring in the Insight Remote Support configuration file.
Note: Users configured in the Insight Remote Support configuration file can perform WBEM
operations with root privileges. However, these users can still continue to have system privileges
as defined in the HP-UX /etc/passwd file.
Important: For previous versions of WBEM and that have users configured with the cimauth
command, WBEM Services can stop working after performing the update-ux command (updating
to the September 2011 HP-UX version.) The WBEM bundle is in an Installed state when it should be
in a Configured state. Run swconfig on all filesets to resolve this issue.
Once WBEM version A.02.09.08 is installed, update the WBEM credentials/protocols in Insight RS to reflect
the new user hp_irs, or add the previously created users to the hp_irs_users.conf file.
For more information about WBEM, see the WBEM Services for HP-UX System Administrator Guide.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
TCP 2381 Hosting Monitored SMH secure web server (HTTPS) and RDC from Optional
Device Systems monitored systems.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener running Required
Systems Device in the Director's Web Interface. The monitored host
connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 132 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Important: Repeat these steps one per year. The Jetty certificate is valid for a year, and while it
does automatically renew itself each year, the certificate needs to be moved to the HP-UX server
after it renews. To see when the Jetty certificate expires, change the filename from .pem to .cer
and then open the certificate to see property details.
To copy the certificate to the HP-UX server, complete the following steps:
1. On the Hosting Device, open a Command Prompt window and export the public certificate to a file called
UCACMS.pem, so it can be moved to the HP-UX server:
rsadmin cert –export -out c:\temp\UCACMS.pem
2. FTP the UCACMS.pem file in ASCII format to the cimserver_trust folder on the HP-UX server:
# ftp <hp-ux_server_ip_address>
ftp> cd /etc/opt/hp/sslshare/cimserver_trust/
ftp> ASCII
ftp> put UCACMS.pem
ftp> quit
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 133 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
d. Make sure the fields in red are defined as above. If they are not, change the values and validate them
using the following commands:
i. Set sslClientVerificationMode to optional:
# cimconfig -s sslClientVerificationMode=optional –p
ii. Set enableHttpsConnection to true:
# cimconfig -s enableHttpsConnection=true –p
iii. Stop the cimom daemon:
# cimserver -s
iv. Start the cimom daemon:
# cimserver
6. In the Insight RS Console, add a WBEM certificate credential on the Discovery → Credentials tab.
a. From the Select and Configure Protocol drop-down list, select Web-Based Enterprise
Management (WBEM).
b. Click New. The New Credential dialog box appears.
c. Select Certificate Credential from the Type drop-down list.
d. Leave the File Upload field blank because the certificate is already in the certificate store and it is
identified by using the alias name.
e. Type the Certificate Alias of “jetty”, which is the alias given to the certificate when it was exported
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 134 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
above.
Important: The below OpenSSL commands require the openssl.cnf file. If openssl.cnf is not
present on your Hosting Device, you can get it using one of the following methods:
l If SMH is installed on the Hosting Device, openssl.cnf is available under
C:\hp\hpsmh\conf\openssl.cnf.
l Download openssl.cnf from https://stuff.mit.edu/afs/athena/contrib/crypto/openssl.cnf.
Copy the openssl.cnf file to the <OPENSSL_INSTALL_PATH>\bin\ folder, and add it to the path of
the OPENSSL_CONF environment variable with the following command:
set OPENSSL_CONF=<OPENSSL_INSTALL_PATH>\bin\openssl.cnf
Note: The example uses "hpux" for the alias name, but the name can be any value you
choose.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 135 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
To copy the certificate to the HP-UX server, complete the following steps:
1. On the Hosting Device, open a Command Prompt window and export the public certificate to a file called
UCACMS.pem, so it can be moved to the HP-UX server:
rsadmin cert –export -out c:\temp\UCACMS.pem
2. FTP the UCACMS.pem file in ASCII format to the cimserver_trust folder on the HP-UX server:
# ftp <hp-ux_server_ip_address>
ftp> cd /etc/opt/hp/sslshare/cimserver_trust/
ftp> ASCII
ftp> put UCACMS.pem
ftp> quit
d. Make sure the fields in red are defined as above. If they are not, change the values and validate them
using the following commands:
i. Set sslClientVerificationMode to optional:
# cimconfig -s sslClientVerificationMode=optional –p
ii. Set enableHttpsConnection to true:
# cimconfig -s enableHttpsConnection=true –p
iii. Stop the cimom daemon:
# cimserver -s
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 136 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 137 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 138 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
Maintenance
The following maintenance task is available for HP-UX servers:
Export certificates
Certificates are required for Insight RS to communicate with your HP-UX server. If you choose to use the jetty
certificate, and to prevent communication disruptions when certificates expire, Insight RS sends you email
notifications warning of the pending expiration 7, 14, 30, and 60 days prior to the certificate expiration date.
Insight RS now provides two certificates with a two week overlap. The certificate aliases are jetty and
jetty_next. During this overlap period either certificate on the HP-UX server will function.
Note: HP-UX will not allow a certificate dated in the future to be imported, and it will not allow two
certificates with the same common name to be imported. During this two week overlap period the
old certificate must be removed and the new jetty_next certificate must be imported.
The below procedure exports the certificates in the Insight RS Truststore, which you can then import onto
your monitored devices. If the existing certificates expire soon, you have the option of creating new
certificates with a longer duration before you import them to your monitored devices. By default, the
certificates expire after one year.
1. On your Hosting Device, open a Command Prompt window and export the certificate set so that it can be
imported into the affected monitored devices:
a. Browse to the following folder: %PROGRAM_FILES%HP/RS/BIN.
b. Based on your needs, execute one of the following command to export the certificates:
o To export the existing Insight RS certificates: GenJettyKeystore.bat
o To export the existing Insight RS jetty certificate and create the jetty_next certificate with a
custom duration: GenJettyKeystore.bat <days>
o To create jetty and jetty_next certificates valid for a custom
duration: GenJettyKeystore.bat <days> jetty
Note: Insight RS will begin using the new certificates within 10 minutes of creation or
you can restart the Insight RS services to use them immediately:
net stop hprsmain
net stop hprsreceivers
net start hprsmain
net start hprsreceivers
c. Follow the onscreen instructions and provide a Truststore password for each certificate.
The command exports the following files in the C:/ folder:
o jetty.cer—This is valid for the cert duration, whatever you set that to, but the default is 365.
o jetty_next.cer—This is valid from a few days before Jetty.cer expires and whatever the
duration is after.
o truststore
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 139 of 436
Chapter 12: Configuring Integrity and HP 9000 HP-UX servers
2. Copy these files onto removable media so that you can import them onto the affected monitored devices.
3. Import these certificates onto the affected monitored devices listed in the email.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 140 of 436
Chapter 13: Configuring Integrity Superdome
2 servers
The Superdome 2 system complex has two independent interfaces that report event indications: the HP-UX
partitions and the Superdome 2 Onboard Administrator (OA). HP-UX System Fault Manager (SFM) monitors
the IO devices within the partition domain and generates WBEM indications when it determines an important
event has occurred. The OA monitors the remainder of the system hardware and generates WS-Management
indications when it determines that an important event occurs. To enable complete system monitoring, both
the OA and the partitions must be monitored.
Insight RS requires WS-Man to monitor the Integrity Superdome 2 OA. If you need to send SNMP traps to
another enterprise management application, make sure you do not send the traps to the same Hosting Device
where Insight RS is installed. If the Hosting Devices receives SNMP traps in addition to the required WS-Man
notifications, this will result in duplicate notifications sent to HPE.
Make sure Insight RS supports your Integrity Superdome 2 server by checking the HPE Insight
Remote Support Release Notes.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 141 of 436
Chapter 13: Configuring Integrity Superdome 2 servers
SNMP Agents send redundant event notifications to Insight RS. HPE recommends that Enclosure IP Mode is
enabled.
l VParProvider B.11.31.01.06 – This fileset is available as part of the WBEM Management Bundle,
available at:
h20392.www2.hpe.com/portal/swdepot/displayInstallInfo.do?productNumber=WBEMMgmtBundle.
l HP-UX WBEM Services A.02.07 – This fileset is available as part of the WBEM Management Bundle,
available at:
h20392.www2.hpe.com/portal/swdepot/displayInstallInfo.do?productNumber=WBEMMgmtBundle.
Note that you may have already installed the WBEM Management Bundle when you installed SFM.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 142 of 436
Chapter 13: Configuring Integrity Superdome 2 servers
TCP 443 Hosting Integrity Secured WS-MAN communication to Superdome OA. Required
Device Superdome
2 OA
TCP 7905 Integrity Hosting Secure HTTP (HTTPS) port used by the listener Required
Superdome Device running in the Director's Web Interface. The monitored
2 OA host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
TCP 7905 Integrity Hosting Secure HTTP (HTTPS) port used by the listener Required
Superdome Device running in the Director's Web Interface. The monitored
2 Partitions host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 143 of 436
Chapter 13: Configuring Integrity Superdome 2 servers
Note: If discovery is configured to discover standby OAs, it will populate the Devices screen with
minimal information on these devices because although their network interfaces can be active and
be reachable, they are not monitoring port 443 used for communication and therefore cannot provide
Insight RS with information about themselves. Likewise because they are standby devices Insight
RS will not be able to establish event monitoring subscriptions directly with them. If an OA failover
should occur, the OA will pass the subscription to the new Monarch and Insight RS will continue to
monitor the OA for event indications using that active subscription.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 144 of 436
Chapter 13: Configuring Integrity Superdome 2 servers
Note: The OS Name and OS Version fields will be blank if viewed from the Operating System
section.
Note: Insight RS only monitors the Monarch (Active) OA. Insight RS subscribes to the OA that is
active at the time of Insight RS discovery and uses the subscription to listen for events. If an OA
failover occurs, Insight RS continues to monitor the active subscription once it is passed by the
Active OA to the Standby OA. The Insight RS Console will continue to show that it is actively
monitoring the previously configured Active OA (even though that OA has failed).
Note: A Superdome 2 32s configuration consists of two enclosures joined into a single server
complex. Each enclosure has a primary and a standby OA that manages and monitors that
enclosure. Only one of the two active OAs in the Superdome 2 32s complex is the Monarch OA for
the complex, and only it generates the WS-Man event indications produced by the Error Analysis
Engine. As is the case with Superdome 2 16s complex configurations, Insight RS will only
subscribe to the complex Monarch OA for WS-Man event indications and Insight RS will only
display the Monarch OA on its Managed Entity page.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 145 of 436
Chapter 13: Configuring Integrity Superdome 2 servers
The values reported by the OS Hardware section should be the same values as reported in the OA
Hardware section detailed above. Expand the Warranty & Contract section and verify the values listed
are correct.
4. Expand the Delivery section and verify the information is correct.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 146 of 436
Chapter 14: Configuring Integrity Superdome
X servers
The Integrity Superdome X system has implemented single-source event reporting such that all event
indications are reported through the Integrity Superdome X Onboard Administrator (OA). The OA monitors the
core system hardware and generates WS-Management alert indications when it determines that an important
event occurs. The Linux WS-Man providers, Windows WinRM (WS-Man) providers, and VMware WBEM
providers monitor partition IO devices and report their events through the OA as well.
Although the OA is the sole source for event reporting for the entire system complex, Insight RS still needs to
discover the partitions to support configuration collections.
Insight RS requires WS-Man to monitor the Integrity Superdome X OA.
In the Insight RS Console, add WS-Man protocol credentials for the OA for all supported
operating systems. WS-Man uses port 443 for the OA.
For Linux and Windows partitions, add WS-Man protocol credentials for the partitions. WS-Man
uses port 5986 for the Linux and Windows partitions.
For VMware partitions, add WBEM protocol credentials for the partitions. WBEM uses port 5989
for the VMware partitions.
Verify the Integrity Superdome X OA and the partitions were discovered correctly.
Send an OA and partition test events to verify connectivity to the Hosting Device. Verify a
collection was successfully gathered from the OA and all partitions.
Configuring the OA
To configure your OA, complete the following sections:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 147 of 436
Chapter 14: Configuring Integrity Superdome X servers
Verify the Network Settings are correct, including the DNS server addresses for both the active and standby
OAs, and verify the Protocol Status indicates that WS-Man is enabled.
HPE recommends that Enclosure IP Mode is enabled as it supports the passing of the active OA’s IP address
to the Standby OA should an OA failover occur. If Enclosure IP Mode is disabled then Insight RS should be
configured to discover both the active and the standby OA.
HPE recommends that you check www.hpe.com to make sure your OA is using the latest firmware version.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 148 of 436
Chapter 14: Configuring Integrity Superdome X servers
4. Create an SSL server key with the following script for the openwsman server to use:
/etc/openwsman/owsmangencert.sh
Type the information requested at the prompts.
5. Restart openwsman:
service openwsmand restart
l RHEL 7.x:
systemctl status tog-pegasus
systemctl status openwsmand
systemctl status hpshd
systemctl status hpmgmtbase
service hpsmhd status
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 149 of 436
Chapter 14: Configuring Integrity Superdome X servers
l SLES 11:
service sfcb status
service openwsmand status
service hpshd status
service hpmgmtbase status
service hpsmhd status
l SLES 12:
systemctl status sblim-sfcb
systemctl status openwsmand
systemctl status hpshd
systemctl status hpmgmtbase
systemctl status hpsmhd
Examples:
# service hpshd status
Checking HP Mission Critical Linux System Health Daemon 'hpshd': running
# service sfcb status
Checking for Small Footprint CIM Broker (SFCB): running
# systemctl status hpshd
hpshd.service - HP Mission Critical Linux System Health Daemon
Active: active (running) since Mon 2015-11-09 17:48:41 EST; 1 weeks 0 days ago
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 150 of 436
Chapter 14: Configuring Integrity Superdome X servers
installed:
usermod -G pegasus <username>
Use this non-root user when you set up the WS-Man protocol credential in the Insight RS Console. See
"Create a WS-Man protocol credential for the Linux and Windows partitions in the Insight RS Console" on
page 154.
3. If the computer domain is a workgroup, you must add the domain suffix used in the common name when
you created the certificate:
a. Click Start, right-click Computer, and then click Properties.
b. Under Computer name, domain, and workgroup settings, click Change settings.
c. On the Computer Name tab, click Change, and then click More.
d. Add the primary DNS suffix of the computer.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 151 of 436
Chapter 14: Configuring Integrity Superdome X servers
1. Add a new user, and add the user to the following groups:
l Distributed Com Users
l WinRMRemoteWMIUsers__
l Remote Management Users
2. In Server Manager, open Tools → Computer Management.
3. In the left menu under Services and Applications, right click WMI Control and select Properties.
4. Add the user to Root:
a. In the WMI Control Properties window, on the Security tab, select Root and click Security.
b. Add the new user. Allow the same privileges as the Administrator except for Edit Security.
c. Click Advanced.
d. Select the new user and click Edit.
e. In the Apply to drop-down, select This namespace and subnamespaces.
f. Click OK, OK, OK.
5. Add the user to Interop:
a. In the WMI Control Properties window, on the Security tab, select Interop and click Security.
b. Add the new user if it does not exist. Allow the same privileges as the Administrator except for Edit
Security.
c. Click OK.
6. Add the user to HPQ:
a. In the WMI Control Properties window, on the Security tab, select HPQ and click Security.
b. Add the new user if it does not exist. Allow the same privileges as the Administrator except for Edit
Security.
c. Click OK.
The new user can now be used by Insight RS WS-Man to discover Windows 2012 or Windows 2016 partitions
on Superdome X servers.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 152 of 436
Chapter 14: Configuring Integrity Superdome X servers
1. Telnet or SSH to the OA CLI interface and log on using a user account with administrator privileges.
2. Type the parstatus command. The output shows the partition state and status.
Par State/ Status* # of # of ILM/ Partition Name
Num RunState Blades IOBays SLM (first 15
(GB)** characters)
=== ======================= ======= ====== ====== ============= ===============
1 Active /UP OK 1 0 0.0/128.0 nPar0001
2 Active /UP OK 1 0 0.0/128.0 nPar0002
3 Active /UP OK 1 0 0.0/128.0 nPar0003
4 Active /UP OK 1 0 0.0/128.0 nPar0004
5 Active /UP OK 1 0 0.0/128.0 nPar0005
7 Active /UP OK 1 0 0.0/128.0 nPar0007
3. Verify all partitions indicate Active /UP status. The Active /UP status indicates that the partition WEBM
providers have started and the OS boot has completed.
Note: Note: VMware vSphere partitions will indicate OSBOOT status instead of Active /UP.
TCP 443 Hosting Integrity Secured WS-MAN communication to Superdome OA. Required
Device Superdome
X OA
TCP 7905 Integrity Hosting Secure HTTP (HTTPS) port used by the listener Required
Superdome Device running in the Director's Web Interface. The monitored
X OA host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
TCP 7905 Integrity Hosting Secure HTTP (HTTPS) port used by the listener Required
Superdome Device running in the Director's Web Interface. The monitored
X Linux host connects to the Hosting Device on this port (e.g.
Partitions https://<hostname>:7905).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 153 of 436
Chapter 14: Configuring Integrity Superdome X servers
Note: Create additional WS-Man protocol credentials if your partitions use different credentials.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 154 of 436
Chapter 14: Configuring Integrity Superdome X servers
Note: If discovery is configured to discover standby OAs, it will populate the Devices screen with
minimal information on these devices because although their network interfaces can be active and
be reachable, they are not monitoring port 443 used for communication and therefore cannot provide
Insight RS with information about themselves. Likewise because they are standby devices Insight
RS will not be able to establish event monitoring subscriptions directly with them. If an OA failover
should occur, the OA will pass the subscription to the new Monarch and Insight RS will continue to
monitor the OA for event indications using that active subscription.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 155 of 436
Chapter 14: Configuring Integrity Superdome X servers
Note: The OS Name and OS Version fields reported for the OA will be blank if viewed from the
Operating System section.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 156 of 436
Chapter 14: Configuring Integrity Superdome X servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 157 of 436
Chapter 14: Configuring Integrity Superdome X servers
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the Basic Collection Results tab.
3. Expand the Server Basic Configuration Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
Field Action
Solution Type Select a solution from the drop-down list of supported HPE solutions.
This selection will populate the Solution Product Number and Solution
Product Model fields. If you select Other, you must populate those fields.
Solution Serial Number Type the serial number of the solution, which can be found on the hardware
label or in the order information when you purchased the HPE solution.
Solution Product Number The product number of the solution is automatically populated based on what
you selection in the Solution Type drop-down list.
Solution Product Model The product model of the solution is automatically populated based on what
you selection in the Solution Type drop-down list.
Custom Delivery ID Type the optional alphanumeric value that will only be required if it has been
supplied to you by your HPE representative or in setup instructions for the
purpose of customized handling or routing of service events sent to HPE.
4. Click Save. The system creates and displays the new solution in the List of Solutions pane. The
assigned devices pane appears where you can assign devices to the new solution.
5. Assign devices or partitions in the assigned devices pane. The default view shows devices not assigned
to the solution. To show additional devices, click the Not Assigned to this Solution or All Devices
options. To show devices in a specific device group, select a device group from the Filter by device
group drop-down list. To search for a specific device, type the device name into the Search box. The
table displays the devices based on your filter and search criteria.
l To add a device, select the check box next to the device in the devices table.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 158 of 436
Chapter 14: Configuring Integrity Superdome X servers
l To remove a device, clear the check box next to the device in the devices table.
6. Click Save Devices.
The system creates and displays the solution in the List of Solutions pane.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 159 of 436
Chapter 15: Configuring Superdome Flex
servers
The Superdome Flex system can be monitored by Insight RS and discovered as a solution through the Rack
Management Controller (RMC), or, if your solution does not have an RMC, through embedded RMC (eRMC)
software on the Baseboard Management Controller (BMC).
For more information about Superdome Flex servers, go to: www.hpe.com/support/sd-flex-customer-docs.
Make sure Insight RS supports your Superdome Flex server by checking the Required
HPE Insight Remote Support Release Notes.
Verify connectivity between your Superdome Flex server and Insight RS. Required
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 160 of 436
Chapter 15: Configuring Superdome Flex servers
TCP 7906 RMC Hosting Secure HTTP (HTTPS) port used by the listener running on Required
Device the Embedded Support Device. The management device
connects to the Hosting Device on this port (e.g.
https://<hostname>:7906).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 161 of 436
Chapter 15: Configuring Superdome Flex servers
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address of the RMC or the BMC if it is an eRMC configuration.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 162 of 436
Chapter 15: Configuring Superdome Flex servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 163 of 436
Chapter 16: Configuring HPE OpenVMS
Integrity servers
Fulfill configuration requirements
To configure your HPE OpenVMS servers to be monitored by Insight RS, complete the following sections:
Table 16.1 HPE OpenVMS server configuration steps
Task Complete?
Make sure Insight RS supports your Integrity OpenVMS server by checking the HPE Insight
Remote Support Release Notes.
Install and configure ELMC for HPE OpenVMS on the OpenVMS server.
Install the HPE OpenVMS WBEM Services and WBEM Providers or enable SNMP.
Send a test event to verify connectivity between your OpenVMS server and Insight RS.
Note: Some supported HPE OpenVMS platforms require a minimum version of 8.4. See
h71000.www7.hp.com/openvms/hw_supportchart.html.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 164 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Note: HPE Sustaining Engineering maintains a schedule of support for the HPE OpenVMS
operating system. HPE does not commit to supporting Insight Remote Support when installed on
an operating system version that has exceeded its end-of-support date. For more information, go
to: h71000.www7.hp.com/openvms/hw_supportchart.html.
Note: Other TCP/IP products may work as is, so the Insight RS installation always completes
regardless of what, if any, TCP/IP product is installed.
l LOCALHOST entry: For ELMC to operate correctly, the LOCALHOST entry must be defined in the
OpenVMS TCP/IP HOSTS database. It is defined correctly by default, but it can be removed, which
causes Insight RS to fail.
Type the following command:
$ TCPIP SHOW HOST /LOCAL
Look for LOCALHOST, which should have an IP address of 127.0.0.1. If LOCALHOST does not appear in
the list, type the following command:
$ TCPIP SET HOST LOCALHOST /ADDRESS=127.0.0.1 /ALIAS=LOCALHOST
Type a ping command to verify that LOCALHOST was added:
$ TCPIP PING LOCALHOST
PING LOCALHOST (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=64 time=0 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0 ms
After verifying that LOCALHOST responds to the ping command, you can use Ctrl-C or Ctrl-Y to stop pinging.
l System firmware: In general, users should take advantage of the latest improvements by obtaining the
most recent firmware version available for their platforms.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 165 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l CMKRNL
l DIAGNOSE
l IMPERSONATE
l NETMBX
l OPER
l SYSLCK
l SYSPRV
l TMPMBX
HPE recommends that you install ELMC using the SYSTEM account.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 166 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l If the system disk where the installation was performed is unavailable due to a planned shutdown or crash,
the ELMC application will fail to run on the remaining nodes of the cluster. This means that no monitoring
will occur until the system disk where the installation was performed becomes available again.
The following example illustrates the issue: assume the user has a 2 node cluster with one system running
OpenVMS 8.3-1H1 and another system running OpenVMS 8.4. If ELMC is installed on the system running
OpenVMS 8.3-1H1, the system running OpenVMS 8.4 will have a WCCProxy process running images from
the OpenVMS 8.3-1H1 system disk, which will be using library modules from the OpenVMS 8.4 system disk.
This combination of images and library modules may cause issues. If the user examines the PCSI database
of the OpenVMS 8.4 system disk, there will be no evidence that ELMC is installed and running on this
system. The ELMC root for the OpenVMS 8.4 system will be created on the OpenVMS 8.3-1H1 system disk.
If the OpenVMS 8.3-1H1 system is shutdown, the ELMC application on the OpenVMS 8.4 system will stop
functioning until the OpenVMS 8.3-1H1 system is rebooted.
Caution: After renaming or deleting the existing log, do not install ELMC until the new default log is
present.
If you rename the log, the saved log can be analyzed at a later time.
Aside from starting with a clean log before installing Insight Remote Support, you may want to perform regular
maintenance on the error log. One method is to rename errlog.sys on a monthly basis. For example, you
might rename errlog.sys to errlog.old at 00:01 on the first day of every month. To free space on the
system disk, you then can back up the renamed version to a different volume and delete the file from the
system disk.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 167 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
4. If the WCCPROXY_HOME logical points to a nonexistent disk, then search the system disk for the WCCPROXY_
INSTALL.COM procedure.
$ directory sys$sysdevice:[*...]wccproxy_install.com
5. ELMC can be removed by executing the WCCPROXY_COM procedure found in the ELMC installation
directory.
$ @WCCPROXY_COMMON:[COMMON.WCCPROXY.BIN]wccproxy_install.com "uninstall"
If no WCCPROXY_INSTALL.COM procedure can be located, then use the v6.4 WCCPROXY_INSTALL.COM
procedure.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 168 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
If this returns 0 items found then ELMC has never been installed. If the version of WCCPROXY is anything
other than V6.4, ELMC needs to be upgraded. For how to uninstall older versions of ELMC, see "How to
remove ELMC" on the previous page.
To install the ELMC software package, complete the following steps:
1. In the Insight RS Console, navigate to the Administrator Settings → Software Updates tab and select
the Event Log Monitoring Collector (ELMC) software package.
2. On the Available Version tab, click Download.
3. When the download completes, click Install. The ELMC packages are placed in the %HP_RS_
DATA%\SWM\LANDINGZONE\ELMC folder. This folder defaults to
C:\ProgramData\HP\RS\DATA\SWM\LANDINGZONE\ELMC.
Note: The ProgramData folder is a hidden folder. To view this folder, set the folder options to
show hidden folders.
Note: The command executes the DCL script wccproxy_install.com in the current directory.
Do not run the product install wccproxy command that would normally be used to install a
PCSI-based product. This command aborts and prompts you to run the wccproxy_
install.com script instead. Set your default directory to the one containing the file wccproxy_
install.com, created by extracting the ELMC .exe file in the previous step.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 169 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
When the DCL prompt ($) returns, the install has finished and the ELMC (WCCProxy) process will be
running.
7. Add the WCCPROXY STOP command to SYS$MANAGER:SYSHUTDWN.COM command procedure.
No command has to be added to the site specific boot command procedure since the installation will
have added the following to the SYSMAN utility:
SYSMAN> startup show file WCCPROXY$STARTUP.COM
%SYSMAN-I-COMFIL, contents of component database on node XXXX
Phase Mode File
------------ ------ ---------------------------------
LPMAIN DIRECT WCCPROXY$STARTUP.COM
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 170 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 171 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l Integrity server blades - BL860c i2, BL870c i2, BL890c i2, BL860c, and BL870c
l Non-cell based systems - rx1620, rx2600, rx3600, rx4640, rx6600, and rx2800 i2 servers
l Cell based systems - Superdomes, rx7620, rx8620, and rx8640
l Integrity Virtual Machine running OpenVMS Version 8.4 as a guest
Confirm TCP/IP IP address and name resolution is functioning
Before configuring WBEM Services and WBEM Providers, confirm that TCP/IP is correctly configured. Make
sure that you are able to ping by IP address, system name, and fully qualified name from the Hosting Device
to the OpenVMS system and from the OpenVMS system to the Hosting Device. If the address or name is not
found, add it to the local host file or to the DNS server.
If your OpenVMS system has both a DNS TCP/IP cluster alias name and node specific name that refer to the
same IP address, add the fully qualified name of the node specific name to the local host file of the Insight RS
Hosting Device.
$ SHOW SYS/PROCESS=CIM*
00007227 CIMSERVER HIB 10 197589 0 00:00:39.70 2131 2940 M
$ SHOW SYSTEM/PROCESS=WBEMP*
21000478 WBEMPROV$HOST_P HIB 6 445 0 00:00:01.72 1254 1421 M
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 172 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
3. Has the following command has been added to the system startup? Check files such as SYS$MANAGER:
SYSTARTUP_VMS.COM.
$ @SYS$STARTUP:WBEM_Services$Startup.com
4. Has the WBEM repository has been created on the system disk?
$ DIRECTORY SYS$SYSDEVICE:[*...]repository.dir
Directory SYS$SYSDEVICE:[SYS0.WBEM_Services.var.opt.wbem]
repository.DIR;1
Total of 1 file.
If any of the above checks answered Yes, then go to "Upgrade WBEM" on page 177.
If all of the above checks answered No, then go to "Install WBEMCIM and WBEMPROVIDERS for the first
time" below.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 173 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
3. Configure WBEM Services and create repository. The following command which invokes the utility that
configures and initializes the environment for WBEM Services for OpenVMS including the creation of the
WBEM repository. By default the WBEM repository will be created on the system disk in SYS$SPECIFIC:
[WBEM_Services.var.opt.wbem.repository]. If the system disk is an ODS-2 structured disk, then the
WBEM repository must be created on another disk which is an ODS-5 structured disk.
$ RUN SYS$SYSROOT:[WBEM_Services]WBEM_Services$Config.exe
When prompted to start the CIMserver, answer YES.
In an OpenVMS Cluster, each member that runs WBEM Services for OpenVMS needs its own WBEM
repository. Therefore, you must execute this image on each of those cluster members.
4. Execute the following command procedure that defines WBEM commands and also add this command
to the login.com of the SYSTEM account in the section where interactive commands are invoked:
$ @SYS$COMMON:[wbem_services]WBEM_Services$Define_Commands.com
5. Verify WBEM Services:
a. Check if the CIMSERVER and CIMDAEMON processes exist and are in the HIB state:
$ SHOW SYSTEM/PROCESS=CIM*
20719DB1 CIMSERVER HIB 10 72063 0 00:00:14.27 3171 2905 M
207199C6 CIMDAEMON HIB 10 6449 0 00:00:00.39 1784 260
b. Confirm system knows about the providers created by WBEM Services and that their status is OK.
$ cimprovider –ls
MODULE STATUS
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
If the cimprovider command is unknown:
$ cimprovider
%DCL-W-IVVERB, unrecognized command verb - check validity and spelling
Execute the following command procedure and also add this command to the login.com of the
SYSTEM account in the section where interactive commands are invoked:
$ @SYS$COMMON:[wbem_services]WBEM_Services$Define_Commands.com
c. Verify that the WBEM Services CIMSERVER is responding to requests by using the OSINFO
command:
$ OSINFO
OperatingSystem Information
Host: i64svr
Name: OpenVMS
Version: V8.3-1H1
UserLicense: Unlimited user license
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 174 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
If the OSINFO command does not work then the CIMSERVER process may be hung.
d. Confirm that the CIMSERVER process is using port 5989 by issuing the following commands:
$ TCPIP SHOW DEVICE/PORT=5989
Port Remote
Device_socket Type Local Remote Service Host
bg22708 STREAM 5989 0 *
$ SHOW DEVICE <bg_device_name>/FULL
For example:
$ SHOW DEVICE bg22708/FULL
Device BG22708: device type unknown, is online, mounted, record-oriented
device, network device, mailbox device.
Error count 0 Operations completed 58
Owner process "CIMSERVER" Owner UIC [SYSTEM]
Owner process ID 00007227 Dev Prot S:RWPL,O:RWPL,G:RWPL,W:RWPL
Reference count 1 Default buffer size 256
Note: If you are running V1.7-21 WBEM Providers (HPE OpenVMS 8.3-1H1 version) and do
not have a supported model, avoid performing this step.
$ @SYS$COMMON:[WBEMPROVIDERS]WBEMPROVIDERS$CONFIGURE.COM
Verify WBEM Providers:
a. Verify that the list of WBEM Providers displays the following and that the status of all providers is
OK:
$ cimprovider -ls
MODULE STATUS
EventIndicationConsumerModule OK
EMSWrapperProviderModule OK
HPVMSLANIndicationProviderModule OK
StateChangeIndicationProviderModule OK
ChassisProviderModule OK
cpuprovidermodule OK
MemoryModule OK
FirmwareRevisionProviderModule OK
MPProviderModule OK
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 175 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
EnclosureProviderModule OK
HPHealthStateProviderModule OK
HPVMSLANProviderModule OK
HPVMSLANCSProviderModule OK
CSChassisProviderModule OK
HPVMProviderModule OK
HP_UtilizationProviderModule OK
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
c. Confirm that the WBEMPROV$HOST_P process exists on models that support setting
HOSTINFOPARAMS on the ILO:
$ SHOW SYSTEM/PROCESS=WBEMPROV*
000069F0 WBEMPROV$HOST_P HIB 6 275 0 00:00:00.11 1055 1689 M
7. Create a nonprivileged account and a cimuser user whose username and password corresponds to the
SYSUAF account. This user account will be used by Insight RS when communicating with your
OpenVMS system using the WBEM protocol.
The following is an example of what the OpenVMS account should look like:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 8 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 14-JAN-2010 16:40
Last Login: 23-NOV-2009 10:31 (interactive), 3-FEB-2010 14:07 (non-interactive)
Maxjobs: 0 Fillm: 128 Bytlm: 256000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 150 JTquota: 4096
Prclm: 10 DIOlm: 150 WSdef: 4096
Prio: 4 ASTlm: 300 WSquo: 8192
Queprio: 0 TQElm: 100 WSextent: 16384
CPU: (none) Enqlm: 4000 Pgflquo: 700000
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 176 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Authorized Privileges:
NETMBX TMPMBX
Default Privileges:
NETMBX TMPMBX
Note: The above WBEM account was created with the following commands:
$ mcr authorize add wbem/uic=
[10,266]/flag=nodisuser/nopwdexpired/password=wbem
$ mcr authorize modify wbem/nopwdlifetime/device=sys$sysdevice/directory=
[wbem]
a. Create the cimuser user with the following command. HPE recommends specifying the username in
lowercase and surrounded by quotes.
$ cimuser -a -u "<username>" -w "<password>"
Example:
$ cimuser -a -u "wbem" -w "mypassword"
b. Confirm that the user was created by issuing the command:
$ cimuser -l
wbem
c. Confirm that you can log on to the OpenVMS account.
8. Add WBEM Services and WBEM Providers to system startup and system shutdown to ensure they start
up at system boot and shutdown during a planned system shutdown.
Add the following command to the system startup:
$ @SYS$STARTUP:WBEM_Services$Startup.com
Since it may take a few minutes to startup WBEM Services, in order to not delay your system boot,
consider creating a batch command procedure that includes this command and invoking the batch job
from SYS$MANAGER:SYSTARTUP_VMS.COM.
Add the following command to the system shutdown in SYS$STARTUP:SYSHUTDWN.COM:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
Upgrade WBEM
If you need to upgrade a previously configured environment, HPE recommends that you perform the following
steps to upgrade the software. Note that whenever WBEM Services or WBEM Providers is upgraded, the
modified product needs to be reconfigured.
1. Install WBEM Services and WBEM Providers:
l Issue the following commands if both products need to be upgraded:
$ @SYS$COMMON:[WBEMPROVIDERS]WBEMPROVIDERS$DECONFIGURE.COM
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
$ PRODUCT INSTALL WBEMCIM
$ PRODUCT INSTALL WBEMPROVIDERS
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 177 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 178 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
CIMSERVER process stuck in a MUTEX or WINS state which requires a system reboot to clear, or
frequent CIMSERVER.DMP files which fill up the system disk.
It is unnecessary to install these remedial fixes if WBEMCIM V3.0-3 and WBEMPROVIDERS V2..2-
5 are installed since these remedial fixes are included in the SSL1 compatible versions.
2. Verify WBEM Services:
a. Check if the CIMSERVER and CIMDAEMON processes exist and are in the HIB state:
$ SHOW SYSTEM/PROCESS=CIM*
20719DB1 CIMSERVER HIB 10 72063 0 00:00:14.27 3171 2905 M
207199C6 CIMDAEMON HIB 10 6449 0 00:00:00.39 1784 260
b. Confirm system knows about the providers created by WBEM Services and that their status is OK.
$ cimprovider –ls
MODULE STATUS
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
Execute the following command procedure and also add this command to the login.com of the
SYSTEM account in the section where interactive commands are invoked:
$ @SYS$COMMON:[wbem_services]WBEM_Services$Define_Commands.com
c. Verify that the WBEM Services CIMSERVER is responding to requests by using the OSINFO
command:
$ OSINFO
OperatingSystem Information
Host: i64svr
Name: OpenVMS
Version: V8.3-1H1
UserLicense: Unlimited user license
Number of Users: 2 users
Number of Processes: 28 processes
OSCapability: 64 bit
LastBootTime: Mar 20, 2009 0:41:21 (-0600)
LocalDateTime: Mar 21, 2009 13:58:57 (-0600)
If the OSINFO command does not work then the CIMSERVER process may be hung.
d. Confirm that the CIMSERVER process is using port 5989 by issuing the following commands:
$ TCPIP SHOW DEVICE/PORT=5989
Port Remote
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 179 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Note: If you are running V1.7-21 WBEM Providers (HPE OpenVMS 8.3-1H1 version) and do
not have a supported model, avoid performing this step.
$ @SYS$COMMON:[WBEMPROVIDERS]WBEMPROVIDERS$CONFIGURE.COM
Verify WBEM Providers:
a. Verify that the list of WBEM Providers displays the following and that the status of all providers is
OK:
$ cimprovider -ls
MODULE STATUS
EventIndicationConsumerModule OK
EMSWrapperProviderModule OK
HPVMSLANIndicationProviderModule OK
StateChangeIndicationProviderModule OK
ChassisProviderModule OK
cpuprovidermodule OK
MemoryModule OK
FirmwareRevisionProviderModule OK
MPProviderModule OK
EnclosureProviderModule OK
HPHealthStateProviderModule OK
HPVMSLANProviderModule OK
HPVMSLANCSProviderModule OK
CSChassisProviderModule OK
HPVMProviderModule OK
HP_UtilizationProviderModule OK
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 180 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
c. Confirm that the WBEMPROV$HOST_P process exists on models that support setting
HOSTINFOPARAMS on the ILO:
$ SHOW SYSTEM/PROCESS=WBEMPROV*
000069F0 WBEMPROV$HOST_P HIB 6 275 0 00:00:00.11 1055 1689 M
4. Remove all cimuser accounts and add them back again. The cimuser command is used to define the
WBEM user credentials that will be used by Insight RS when communicating with your OpenVMS
system using the WBEM protocol.
The following example shows how to remove and add a user back in again.
a. Show the user:
$ cimuser -l
wbem
b. Remove the user:
$ cimuser –r –u "wbem"
User removed successfully.
c. Before adding the cimuser account, confirm that the account exists in the SYSUAF and that you can
log into the account. If the user is missing, create a nonprivileged account and a cimuser user whose
username and password corresponds to the SYSUAF account.
The following is an example of what the OpenVMS account should look like:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 8 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 14-JAN-2010 16:40
Last Login: 23-NOV-2009 10:31 (interactive), 3-FEB-2010 14:07 (non-interactive)
Maxjobs: 0 Fillm: 128 Bytlm: 256000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 150 JTquota: 4096
Prclm: 10 DIOlm: 150 WSdef: 4096
Prio: 4 ASTlm: 300 WSquo: 8192
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 181 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Note: The above WBEM account was created with the following commands:
$ mcr authorize add wbem/uic=
[10,266]/flag=nodisuser/nopwdexpired/password=wbem
$ mcr authorize modify wbem/nopwdlifetime/device=sys$sysdevice/directory=
[wbem]
d. Create the cimuser user with the following command. HPE recommends specifying the username in
lowercase and surrounded by quotes.
$ cimuser -a -u "<username>" -w "<password>"
Example:
$ cimuser -a -u "wbem" -w "mypassword"
e. Confirm that the user was created by issuing the command:
$ cimuser -l
wbem
f. Confirm that you can log on to the OpenVMS account.
5. Verify WBEM Services and WBEM Providers are in the system startup and system shutdown to ensure
they start up at system boot and shutdown during a planned system shutdown. If they are not, add them.
Add the following command to the system startup:
$ @SYS$STARTUP:WBEM_Services$Startup.com
Since it may take a few minutes to startup WBEM Services, in order to not delay your system boot,
consider creating a batch command procedure that includes this command and invoking the batch job
from SYS$MANAGER:SYSTARTUP_VMS.COM.
Add the following command to the system shutdown in SYS$STARTUP:SYSHUTDWN.COM:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 182 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l If you see the below output, this means SNMP is not defined or configured. Proceed to "Enable SNMP"
below.
$ TCPIP SHOW SERVICE SNMP
%TCPIP-W-NORECORD, information not found
-RMS-E-RNF, record not found
Enable SNMP
When the SNMP service does not exist it can be enabled by invoking SYS$MANAGER:TCPIP$CONFIG.COM
$ @SYS$MANAGER:TCPIP$CONFIG.COM
Choose option 3 for server components, then choose option 18 for SNMP.
If TCPIP$CONFIG.COM displays that the SNMP service is already enabled, then use the configuration tool to
disable it and re-enable it. Sometimes the display can get out of sync with reality due to commands issued at
the TCPIP prompt instead of in the TCPIP$CONFIG utility.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 183 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Also note that the community string is case sensitive so it must exactly match what you see on the
Hosting Device.
3. Restart SNMP after making any configuration change:
$ @SYS$MANAGER:TCPIP$SNMP_SHUTDOWN.COM
$ @SYS$MANAGER:TCPIP$SNMP_STARTUP.COM
This enables all CPUs to be eligible for Indictment except for CPU 0.
Note: CPU 0 cannot be removed. If you wish to not have some CPU’s eligible, refer to the
HPE OpenVMS documentation for Indictment Service to learn how to modify this procedure to
meet your needs.
To enable the Dynamic Processor Resilience Adapter in the Insight RS Console, complete the following
steps:
1. In the main menu, select Administrator Settings.
2. Click the Integration Adapters tab.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 184 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
3. Click the Dynamic Processor Resilience Adapter for HPE Integrity servers heading to expand the
adapter pane.
4. Select the Enable Dynamic Processor Resilience Adapter for HPE Integrity servers check box.
5. Click Save Adapter Settings.
Insight Remote Support enables the Dynamic Processor Resilience Adapter. (Enabled) now appears next to
the Dynamic Processor Resilience Adapter to indicate it is enabled.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over Required
Device Systems HTTPS/SOAP. This port is used to communicate
with WBEM end point nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The
monitored host connects to the Hosting Device on
this port (e.g. https://<hostname>:7905).
TCP 7920 Hosting Monitored The Insight RS ELMC (WCCProxy) process Required
Device Systems communicates with the Director on this port. This is
a proprietary protocol. Any connections that
exchange username and passwords use SSL. Not
all connections are SSL.
UDP 161 Hosting Onboard SNMP. This is the standard port used by SNMP Required
Device Administrator agents on monitored systems. The Hosting Device
sends requests to devices on this port.
UDP 162 Onboard Hosting SNMP Trap. This is the port used by Insight RS to Required
Administrator Device listen to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 185 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 186 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 187 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l When the TELNET service does not exist, enable it with the following:
$ @SYS$MANAGER:TCPIP$CONFIG.COM
3. Make sure to grant the privileges CMKRNL, SYSLCK, NETMBX, and TMPMBX to the OpenVMS account used to
run SAN Collections. This account is also used in the SSH or TELNET named credential below. These
privileges are required because the SAN Collection issues two OpenVMS commands (ANALYZE/SYSTEM
and PRODUCT SHOW HISTORY) which require these additional privileges.
4. If using SSH, edit the OpenVMS SSH server configuration file. After enabling and starting the SSH
service, edit the OpenVMS SSH server configuration file TCPIP$SSH_DEVICE:
[TCPIP$SSH.SSH2]SSHD2_CONFIG. If the AllowedAuthentications parameter is defined, make sure the
AllowedAuthentications parameter includes password. Also make sure the DenyHosts parameter
does not include a reference to the Windows server.
5. In the Insight RS Console, define a SSH or TELNET Named Credential:
a. In the main menu of the Insight RS Console, select Company Information and click the Named
Credentials tab.
b. Click Add New Credential.
c. Enter a Credential Name similar to OpenVMS-ssh or OpenVMS-telnet.
d. From the Protocol drop-down list, select Secure Shell (SSH) or Telnet depending on which
protocol you are configuring.
e. Enter the Username and Password of a valid OpenVMS account. You can use the same username
and password that you used for the WBEM Named Credential. Note that the user credential can be
an unprivileged account.
f. Click Save.
6. Add the SSH or TELNET protocol to the Insight RS OpenVMS device:
a. In the main menu of the Insight RS Console, select Devices. In the Devices pane, search for the
OpenVMS server name.
b. Click the device name, then the Credentials tab.
c. In the Credentials Information pane, expand the SSH or TELNET protocol you want to add. If
necessary, select the Configure additional Protocols check box to view all available protocols.
d. To add SSH protocol, click on Secure Shell (SSH) → Named Credential. To add the TELNET
protocol click on Telnet → Named Credential. Select the Named Credential created earlier.
e. Click on the Device tab, then click Discover Device.
7. Configure San Configuration Collection Schedule:
a. In the main menu of the Insight RS Console, select Collection Services.
b. Click the Collection Schedules tab.
c. In the List of Collection Schedules pane, select the SAN Configuration Collection Schedule.
d. Assign devices in the assigned devices pane. The default view shows devices assigned to the
schedule. To show additional devices, click the Not Assigned to this Schedule or All Devices
options. To show devices in a specific device group, select a device group from the Filter by device
group drop-down list. To search for a specific device, type the device name into the Search box.
The table displays the devices based on your filter and search criteria.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 188 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Add your OpenVMS device to the SAN Configuration Collection Schedule by selecting the check
box next to the device in the devices table.
e. Click Save Devices.
f. Click Run Now.
8. Confirm the SAN Configuration Collection Schedule ran successfully; see "Verify collections in the
Insight RS Console" below.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 189 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Configuring your OpenVMS server for SAN Configuration Collections is necessary if your system is covered
by a SAN assessments contract. SAN Configuration Collections use the TELNET or SSH protocol and
require that an OpenVMS account with the privileges CMKRNL, SYSLCK, NETMBX, and TMPMBX are configured for
the TELNET or SSH credentials.
To verify the collection ran successfully, complete the following steps:
1. Log on to the Insight RS Console.
2. In the main menu, select Devices.
3. Click the Monitoring & Collections tab, and search for the device you want to view.
4. View the collection status in the appropriate column, depending on if you are using Basic Collections or
SAN Collections. If the collection was successful, a success icon appears ( ). If it failed, an error icon
appears ( ). If an error icon appears, troubleshoot the protocol used for the collection type:
l For Basic Collections, see "WBEM protocol troubleshooting" on the next page.
l For SAN Collections, see "Telnet protocol troubleshooting" on page 200 or "SSH protocol
troubleshooting" on page 197.
If the following error is seen when you click the error icon, it means that Insight RS is unable to detect
the SSH or TELNET protocols on your OpenVMS system.
Protocol: Secure Shell (SSH)
Service: SAN_Configuration_Collection
Type: DEPENDENCY_CHECK
Status: FAILURE
Description: A valid connection could not be made to: <openvms_server_fully_
qualified_name>
Detailed: Please check the credentials for this device. If these credentials are
from a credential group, determine if other devices can use the credentials
successfully. If this device uses certificates for authentication, regenerate the
certificate.
Created: Tuesday, June 09, 2015 12:35:09 PM
Last Updated: Tuesday, June 09, 2015 12:35:09 PM
CollectionView Collection
If you are using SAN Collections and the collection was successful, verify that the collection XML file
contains no DCL errors. If errors exist, the collection was unsuccessful in gathering all of the required data.
Note: This procedure only applies if you have enabled local storage of collections. For details, see
the Online Help.
1. In the Insight RS Console, on the Devices → Monitoring & Collections tab, click the icon.
2. In the collection description, click View Collection.
3. In the Attachments section, click Retrieve File.
4. Click Download File.
5. Open the file in your browser or an XML editor, and verify there are no DCL errors. If you see errors,
troubleshoot the protocol you are using. See "Telnet protocol troubleshooting" on page 200 or "SSH
protocol troubleshooting" on page 197.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 190 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Troubleshooting
WBEM protocol troubleshooting
Check the following items if you are having issues with discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 191 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l Make sure TCPIP IPv6 is not enabled on the OpenVMS server. No process should be found when issuing
this command:
$ show system/process=TCPIP$ND6HOST
l Modify the password in the SYSUAF to the account referenced in the cimuser command so it corresponds to
the password used when issuing the cimuser -a command.
l Confirm that the account referenced by cimuser does not have a flag of disuser in the SYSUAF. Confirm
that you can log into the account.
l Delete the cimuser account on the OpenVMS system with a cimuser –r command and recreate the
cimuser account and password.
l Re-enter the WBEM credentials within the Insight RS Console, making sure that the case matches the
cimuser account and password.
l Confirm that the processes CIMSERVER and CIMDAEMON exist on the OpenVMS server and that they are in
the HIB state. If they are in any other state, contact the HPE Customer Support Center for troubleshooting
assistance.
l Issue the cimprovider –ls command to confirm that all providers listed on the OpenVMS server have a
status of “OK”. If any are in a failed state, stop and restart WBEM Services. If this does not solve the issue
deinstall and reinstall WBEM Services and WBEM Providers.
l Confirm that port 5989 used for the WBEM protocol is not blocked by the firewall.
l Look for CIMSERVER.DMP files on the system disk. They are typically located in SYS$SPECIFIC:[WBEM_
Services]. If you find any current dumps, contact the HPE Customer Support Center for assistance.
l Check to see if data from the WBEM repository can be accessed by issuing the WBEMEXEC command on the
OpenVMS server. Details on this command can be obtained from the article OpenVMS - HPE Insight
Remote Support, How to Locally Test The Namespace Classes Referenced During Discovery. If you see
errors, consider deinstalling and reinstalling WBEM Services and WBEM Providers.
l Restart the services “Pegasus WMI Mapper” and “Pegasus WMIMapper Indications Service” on the
Windows Hosting Device.
l If WBEM Providers is configured, confirm that the OPENVMS_EMS, OPENVMS_UTILD, and WBEMPROV$HOST
processes exist. If these processes are missing, check the following log files in SYS$SPECIFIC:
[WBEMPROVIDERS] for errors:
$ type WBEMPROVIDERS$OPENVMS_EMS.OUT
$ type WBEMPROV$HOST_P.OUT
$ type WBEMPROVIDERS$OPENVMS_UTILD.OUT
l If all other troubleshooting of the WBEM protocol fails to yield results, deinstall and reinstall WBEM
Services and WBEM Providers.
a. Display WBEM logicals to determine where the products are installed:
$ SHOW LOGICAL WBEM*
b. If WBEM Services and WBEM Providers are running, shut them down:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
c. Run PRODUCT REMOVE commands and continue if any errors occur:
$ PRODUCT REMOVE WBEMPROVIDERS
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 192 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
d. Delete any WBEMPROVIDERS.DIR and WBEM_Services.DIR directories and any files left in
SYS$STARTUP. If the products were installed on the system disk, run the following commands:
$ DELETE/TREE SYS$COMMON:[WBEMPROVIDERS…]*.*;*
$ DELETE/TREE SYS$COMMON:[WBEM_Services…]*.*;*
$ DELETE SYS$COMMON:[000000]WBEMPROVIDERS.DIR;1
$ DELETE SYS$COMMON:[000000]WBEM_Services.DIR;1
$ DELETE/TREE SYS$SPECIFIC:[WBEMPROVIDERS…]*.*;*
$ DELETE/TREE SYS$SPECIFIC:[WBEM_Services…]*.*;*
$ DELETE SYS$SPECIFIC:[000000]WBEMPROVIDERS.DIR;1
$ DELETE SYS$SPECIFIC:[000000]WBEM_Services.DIR;1
$ DELETE SYS$STARTUP:WBEMPROVIDER*.*;*
$ DELETE SYS$STARTUP:WBEM_SERVICES*.*;*
$ DELETE SYS$STARTUP:WBEMPROVIDERS*.*;*
Note that the DELETE/TREE qualifier is only available on OpenVMS 8.4. On an OpenVMS 8.3-1H1
system you will need to reissue the DELETE commands multiple times until all subdirectories and files
are deleted.
e. Delete all WBEM Services and WBEM Providers logicals:
$ DEASSIGN/SYSTEM WBEM_BIN
$ DEASSIGN/SYSTEM WBEM_CIMXX_MOF_DIR
$ DEASSIGN/SYSTEM WBEM_ETC
$ DEASSIGN/SYSTEM WBEM_LIB
$ DEASSIGN/SYSTEM WBEM_MOF_DIR
$ DEASSIGN/SYSTEM WBEM_OPT
$ DEASSIGN/SYSTEM WBEM_REPOSITORY_DIR
$ DEASSIGN/SYSTEM WBEM_SBIN
$ DEASSIGN/SYSTEM WBEM_TMP
$ DEASSIGN/SYSTEM WBEM_VAR
$ DEASSIGN/SYSTEM WBEM_VAR_DATA_DIR
$ DEASSIGN/SYSTEM/EXEC WBEM_PRIMARY_OWNER
$ DEASSIGN/SYSTEM/EXEC WBEM_PRIMARY_OWNER_CONTACT
l If reinstalling WBEM Services and WBEM Providers does not resolve the issue, execute the following
command procedure and provide the saveset output to the HPE Customer Support Center: $
@SYS$COMMON:[WBEMPROVIDERS]WBEM$REPORTER.COM
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 193 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l Confirm that the Named Credential read community string specified in Insight RS is identical to the
community string defined on the OpenVMS server and in the SNMP Service Security tab on the Hosting
Device. Note that the community string is case sensitive.
l If the community string is correct, run the following command to confirm that the SNMP service is enabled
on the OpenVMS server:
$ tcpip show service snmp
Service Port Proto Process Address State
SNMP 161 UDP TCPIP$SNMP 0.0.0.0 Enabled
To eliminate this problem, add the following command to the beginning of SYLOGIN.COM:
$ if f$mode() .eqs. "NETWORK" then exit
l Stop and restart the OpenVMS SNMP service to make sure that the configuration displayed is actually in
effect:
$ @sys$startup:tcpip$snmp_shutdown.com
$ @sys$startup:tcpip$snmp_startup.com
l If the SNMP service will not start on the OpenVMS server, confirm that the TCPIP$SNMP account shows
that its UIC identifier in the SYSUAF is TCPIP$SNMP. Also confirm the account does not have the disuser
flag. The following is an example of a properly defined TCPIP$SNMP account:
$ mcr authorize show tcpip$snmp
Username: TCPIP$SNMP Owner: TCPIP$SNMP
Account: TCPIP UIC: [3655,21] ([TCPIP$AUX,TCPIP$SNMP])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[TCPIP$SNMP]
LGICMD: LOGIN
Flags: Restricted
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
Primary 000000000011111111112222 Secondary 000000000011111111112222
Day Hours 012345678901234567890123 Day Hours 012345678901234567890123
Network: ##### Full access ###### ##### Full access ######
Batch: ----- No access ------ ----- No access ------
Local: ----- No access ------ ----- No access ------
Dialup: ----- No access ------ ----- No access ------
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 194 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l Confirm the directory and the files in the directory SYS$SYSDEVICE:[TCPIP$SNMP] are owned by the
TCPIP$SNMP account
$ directory/owner SYS$SYSDEVICE:[000000]TCPIP$SNMP.DIR
$ directory/owner SYS$SYSDEVICE:[TCPIP$SNMP…]*.*
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 195 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Note if the pop-up shows the SNMPv1 protocol, discovery detected the SNMP protocol. The SNMP
protocol cannot be used to monitor OpenVMS devices and this particular entry can be removed by clicking
Clear.
If Insight RS is not able to successfully connect to the OpenVMS system using the ELMC protocol,
continue with the troubleshooting steps below.
l If the ELMC protocol was not discovered, confirm the product WCCPROXY v6.4 is installed on your
OpenVMS system by issuing the following command:
$ product show product wccproxy
If you need to upgrade, the installation media can be found in:
<partition_where_InsightRS_is installed>:\ProgramData\HP\RS\DATA\ELMC
If you do not see the media in this folder, in the Insight RS Console browse to Administrator Settings >
Software Update tab. Click on Event Log Monitoring Collector (ELMC) package. Then on the
Available Version tab, click Install. Copy the media to your OpenVMS server in binary mode and then
issue the following commands when logged into the SYSTEM account:
$ run ELMCV64BL1KIT1_21-JUN-2012_OVMSI64.EXE
$ @wccproxy_install uninstall
$ @wccproxy_install install
l Confirm that the WCCPROXY process is running on the OpenVMS server by issuing the following command
when logged into the SYSTEM account.
$ wccproxy status
If it does not show the WCCProxy is running, issue the command:
$ wccproxy start
l Try restarting the WCCPROXY process on the OpenVMS server by issuing the commands while logged into
the SYSTEM account:
$ wccproxy stop
$ wccproxy start
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 196 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
Port Remote
Device_socket Type Local Remote Service Host
bg285 STREAM 7920 0 *
bg42927 STREAM 7920 59958 1.2.3.4
l Send a test event and examine the Insight RS log file KCT.###.log for evidence on why the events may be
rejected. This is found in:
<partition_where _InsightRS_is_installed>\ProgramData\HP\RS\LOG
In the case that the OpenVMS errlog.sys is corrupt, rename the errlog.sys file and let the operating
system create a new one. Also confirm that the hardware is supported by Insight RS by referring to the
HPE Insight Remote Support Release Notes at www.hpe.com/info/insightremotesupport/docs.
l If no test event is received, examine the time zone of the OpenVMS system, the Hosting Device, and the
time zone defined in Insight RS to see if there is a discrepancy. The time zone within Insight RS can be
determined by browsing to Company Information > Sites > <site_name>.
The time zone of OpenVMS can be determine by issuing the following command:
$ show logical *time*
The time on the OpenVMS system can be determined by issuing the command:
$ show time
l Check that none of the command procedures in WCCPROXY_SPECIFIC:[SPECIFIC.WCCPROXY.DATA] have a
version limit of 32767. If they do, stop WCCPROXY by determining the pid of the WCCPROXY and
issuing STOP/ID=<pid #>. Then delete the files in this directory, and restart WCCPROXY by issuing a
WCCPROXY START command.
l If you continue to have problems with the ELMC protocol, check the log files in WCCPROXY_SPECIFIC:
[SPECIFIC.WCCPROXY.LOGS] for issues.
l If none of the troubleshooting steps shown above have solved the issue, deinstall and reinstall ELMC
(WCCPROXY) on the OpenVMS server:
$ run ELMCV64BL1KIT1_21-JUN-2012_OVMSI64.EXE
$ @wccproxy_install uninstall
$ @wccproxy_install install
l If test events are not working for any OpenVMS system, confirm that ELMC was installed on the Insight
RS server. WCCPROXY 6.4 software should appear in the Control Panel → All Control Panel Items →
Programs and Features. If WCCPROXY is missing, log into the Insight RS Console and navigate to
Administrator Settings → Software Updates. Click on Event Log Monitoring Collector (ELMC), and
on the Available Version tab, click Install. Once the WCCPROXY software is installed, make sure that
the WCCPROXY service is started.
l If test events are not working for any OpenVMS system, determine if Insight Remote Support Advanced
(RSA) A.05.80 or below is installed on the same server running Insight RS 7.x. If Insight RSA A.05.08 or
below appears in Control Panel → All Control Panel Items → Programs and Features, this software
should be removed.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 197 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l Examine the SSH service on the OpenVMS server with the tcpip show service ssh/full command.
Confirm that the number of Active sessions does not exceed the Limit. Also confirm what port is being
used by the SSH service and that the service is enabled.
l Confirm that the TCPIP$SSH account shows that its UIC identifier in the SYSUAF is TCPIP$SSH and the
account does not have the disuser flag. The following is an example of a properly defined TCPIP$SSH
account:
$ mcr authorize show tcpip$ssh
Username: TCPIP$SSH Owner: TCPIP$SSH
Account: TCPIP UIC: [3655,15] ([TCPIP$AUX,TCPIP$SSH])
CLI: DCL Tables: DCLTABLES
Default: TCPIP$SSH_DEVICE:[TCPIP$SSH]
LGICMD: LOGIN
Flags: Restricted
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
Primary 000000000011111111112222 Secondary 000000000011111111112222
Day Hours 012345678901234567890123 Day Hours 012345678901234567890123
Network: ##### Full access ###### ##### Full access ######
Batch: ----- No access ------ ----- No access ------
Local: ----- No access ------ ----- No access ------
Dialup: ----- No access ------ ----- No access ------
Remote: ----- No access ------ ----- No access ------
Expiration: (none) Pwdminimum: 6 Login Fails: 0
Pwdlifetime: 90 00:00 Pwdchange: (pre-expired)
Last Login: (none) (interactive), 16-AUG-2016 19:25 (non-interactive)
Maxjobs: 0 Fillm: 100 Bytlm: 15000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 400 JTquota: 4096
Prclm: 8 DIOlm: 1000 WSdef: 350
Prio: 8 ASTlm: 100 WSquo: 1024
Queprio: 4 TQElm: 50 WSextent: 4000
CPU: (none) Enqlm: 100 Pgflquo: 50000
Authorized Privileges:
NETMBX TMPMBX
Default Privileges:
NETMBX TMPMBX
l Confirm the directory and the files in the directory SYS$SYSDEVICE:[TCPIP$SSH] are owned by the
TCPIP$SSH account.
$ directory/owner SYS$SYSDEVICE:[000000]TCPIP$SSH.DIR
$ directory/owner SYS$SYSDEVICE:[TCPIP$SSH…]*.*
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 198 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
$ @sys$startup:tcpip$ssh_startup.com
$ @sys$startup:tcpip$ssh_client_startup.com
l Confirm that port 22 used by the SSH protocol is not blocked by the firewall.
l Install a SSH client on the Windows Hosting Device. Test if you can log in to OpenVMS system using the
SSH client on the Windows Hosting Device. Use the same credentials as defined in the SSH Named
Credential.
l If port 22 is not blocked by the firewall but you cannot log into the OpenVMS system using the SSH client
on your Windows server, test if you can SSH from the OpenVMS system to itself.
$ SSH localhost
l Check if any other system has SSH access to the OpenVMS server.
l Confirm that the account you are trying to log into does not have the DISUSER flag set and that the
password is not expired. Also make sure that Pwdlifetime field is set to (none).
l Examine the OpenVMS SSH server configuration file TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSH2_
CONFIG. Make sure the AllowedAuthentications parameter includes password. Make sure the
DenyHosts parameter does not include a reference to the Windows server. Make sure there are not any
other configuration errors. For more information about the parameters in this file reference the knowledge
base article OpenVMS - TCPIP SSH: What Are the Parameters in SSH2_CONFIG and Their Default
Values?
l Examine the TCPIP$SSH_DEVICE:TCPIP$SSH_RUN.LOG for clues as to why SSH is not working.
l To enable debug on the OpenVMS SSH server define the following logical:
$ DEFINE/SYSTEM TCPIP$SSH_SERVER_PARAMS "-i -d 5"
After troubleshooting is completed, deassign the logical with the command:
$ DEASSIGN/SYSTEM TCPIP$SSH_SERVER_PARAMS
l If the TCPIP$SSH_RUN.LOG does not exist, reference the knowledge base article OpenVMS - HP TCPIP
SSH, TCPIP$SSH_DEVICE:TCPIP$SSH_RUN.LOG is Missing.
l Confirm the OpenVMS account used for the SAN Collection SSH credentials also has the privileges of
CMKRNL, NETMBX, SYSLCK, and TMPMBX. The following is an example of a properly configured account:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 6 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 26-JAN-2017 17:33
Last Login: 30-JAN-2017 21:45 (interactive), 1-FEB-2017 16:07 (non-interactive)
Maxjobs: 0 Fillm: 100 Bytlm: 64000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 199 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
The following command shows the syntax for granting the required privileges to an OpenVMS account.
$ MCR AUTHORIZE MODIFY <username>/DEFPRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK) -
/PRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK)
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the CMKRNL privilege:
%DCL-W-IVVERB, unrecognized command verb - check validity and spelling
\FC\
## FIBRE CARD INFO FINISHED ##
## Starting SCSI INFORMATION ##
%TYPE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
%DELETE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;*
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
## Finishing SCSI INFORMATION ##
## Starting HARDWARE INFORMATION ##
%TYPE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_CONFIG.TXT;
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
%DELETE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_CONFIG.TXT;*
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the SYSLCK privilege:
Excerpt xml file:
====== PCSI ======
%PCSIUI-E-PRIVCLASS1, operation requires SYSLCK privilege
%PCSIUI-E-ABORT, operation terminated due to an unrecoverable error condition
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 200 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
the account does not have the disuser flag. The following is an example of a properly defined
TCPIP$TELNET account:
$ mcr authorize show tcpip$telnet
Username: TCPIP$TELNET Owner: TCPIP$TELNET
Account: TCPIP UIC: [3655,2] ([TCPIP$AUX,TCPIP$TELNET])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[TCPIP$TELNET]
LGICMD: LOGIN
Flags: Restricted
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
Primary 000000000011111111112222 Secondary 000000000011111111112222
Day Hours 012345678901234567890123 Day Hours 012345678901234567890123
Network: ##### Full access ###### ##### Full access ######
Batch: ----- No access ------ ----- No access ------
Local: ----- No access ------ ----- No access ------
Dialup: ----- No access ------ ----- No access ------
Remote: ----- No access ------ ----- No access ------
Expiration: (none) Pwdminimum: 6 Login Fails: 0
Pwdlifetime: 90 00:00 Pwdchange: (pre-expired)
Last Login: (none) (interactive), (none) (non-interactive)
Maxjobs: 0 Fillm: 1024 Bytlm: 400000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 400 JTquota: 4096
Prclm: 8 DIOlm: 1000 WSdef: 350
Prio: 8 ASTlm: 2448 WSquo: 20000
Queprio: 4 TQElm: 20 WSextent: 20000
CPU: (none) Enqlm: 3000 Pgflquo: 20000
Authorized Privileges:
NETMBX TMPMBX
Default Privileges:
NETMBX TMPMBX
l Confirm the directory and the files in the directory SYS$SYSDEVICE:[TCPIP$TELNET] are owned by the
TCPIP$TELNET account.
$ directory/owner SYS$SYSDEVICE:[000000]TCPIP$TELNET.DIR
$ directory/owner SYS$SYSDEVICE:[TCPIP$TELNET…]*.*
l Confirm that port 23 used by the telnet protocol is not blocked by the firewall.
l Enable the telnet client on the Insight RS Hosting Device. Open up a command prompt on the Windows
Hosting Device, enter telnet <ip_address_OpenVMS_system> and test if you can log into the OpenVMS
system. Use the same credentials as defined in the Telnet Named Credential.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 201 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l If port 23 is not blocked by the firewall but you cannot log into the OpenVMS system from the Hosting
Device, test if you can telnet from the OpenVMS system to itself: $ telnet localhost
l Check if any other system has telnet access to the OpenVMS server.
l Confirm that the account you are trying to log into does not have the DISUSER flag set and that the
password is not expired. Also make sure that Pwdlifetime field is set to (none).
l Confirm the OpenVMS account used for the SAN Collection TELNET credentials also has the privileges of
CMKRNL, NETMBX, SYSLCK, and TMPMBX. The following is an example of a properly configured account:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 6 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 26-JAN-2017 17:33
Last Login: 30-JAN-2017 21:45 (interactive), 1-FEB-2017 16:07 (non-interactive)
Maxjobs: 0 Fillm: 100 Bytlm: 64000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 150 JTquota: 4096
Prclm: 8 DIOlm: 150 WSdef: 2000
Prio: 4 ASTlm: 250 WSquo: 4000
Queprio: 4 TQElm: 10 WSextent: 16384
CPU: (none) Enqlm: 2000 Pgflquo: 50000
Authorized Privileges:
CMKRNL NETMBX SYSLCK TMPMBX
Default Privileges:
CMKRNL NETMBX SYSLCK TMPMBX
The following command shows the syntax for granting the required privileges to an OpenVMS account.
$ MCR AUTHORIZE MODIFY <username>/DEFPRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK) -
/PRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK)
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the CMKRNL privilege:
%DCL-W-IVVERB, unrecognized command verb - check validity and spelling
\FC\
## FIBRE CARD INFO FINISHED ##
## Starting SCSI INFORMATION ##
%TYPE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
%DELETE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;*
-RMS-E-DNF, directory not found
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 202 of 436
Chapter 16: Configuring HPE OpenVMS Integrity servers
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the SYSLCK privilege:
Excerpt xml file:
====== PCSI ======
%PCSIUI-E-PRIVCLASS1, operation requires SYSLCK privilege
%PCSIUI-E-ABORT, operation terminated due to an unrecoverable error condition
Entitlement troubleshooting
Check the following items if you are having entitlement issues with your OpenVMS system.
l If the OpenVMS system does not pass the entitlement check, make sure you have the correct serial
number and product number specified on the contract.
l If the correct serial number and product number have been defined for the device and the entitlement check
continues to fail, confirm that the “Hosting Device Health” has a green check. This can be found in the
header of the Insight RS Console. If it shows a red x, click on “Hosting Device Health” for more details.
l Try stopping the following Window services in this order: 1) “HPE Insight Remote Support” and 2) “HPE
Insight RS Event Receiver” and then restarting them in that order.
l Confirm that port 443 used to communicate with the HPE backend is not blocked by the firewall.
Additional security firewall requirements are detailed in the HPE Insight Remote Support Security White
Paper at www.hpe.com/info/insightremotesupport/docs.
l Open up a browser on the Hosting Device and confirm if you can access this web page:
https://api.support.hpe.com/v1/version/index.html
l Issue a nslookup command and confirm that api.support.hpe.com can be resolved.
If api.support.hpe.com cannot be resolved by your DNS server, then add this address to the Windows
host file on the Hosting Device.
l Lack of connectivity to the HPE backend can sometimes be caused by issues with the HPE backend. For
additional assistance troubleshooting the lack of connectivity, contact the HPE Customer Support.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 203 of 436
Chapter 17: Configuring VSI OpenVMS
Integrity servers
Fulfill configuration requirements
To configure your VSI OpenVMS servers to be monitored by Insight RS, complete the following sections:
Table 17.1 VSI OpenVMS server configuration steps
Task Complete?
Make sure Insight RS supports your Integrity OpenVMS server by checking the HPE Insight
Remote Support Release Notes.
Install and configure ELMC for VSI OpenVMS on the OpenVMS server.
Send a test event to verify connectivity between your OpenVMS server and Insight RS.
Note: Some supported VSI OpenVMS platforms require a minimum version of 8.4-1H1. See
www.vmssoftware.com/updates.html.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 204 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
The ability to resolve the local host name into an IP address must be enabled. Otherwise, the Director
cannot handle ELMC message traffic correctly and fails to start.
ELMC officially supports two TCP/IP products for VSI OpenVMS:
l TCP/IP Services for VSI OpenVMS, version V5.7-13ECO5B or higher
l VSI TCP/IP Version 10.5 (requires VSI OpenVMS 8.4-2L1 or higher)
Note: Other TCP/IP products may work as is, so the Insight RS installation always completes
regardless of what, if any, TCP/IP product is installed.
l LOCALHOST entry: For ELMC to operate correctly, the LOCALHOST entry must be defined in the
OpenVMS TCP/IP HOSTS database. It is defined correctly by default, but it can be removed, which
causes Insight RS to fail.
Type the following command:
$ TCPIP SHOW HOST /LOCAL
Look for LOCALHOST, which should have an IP address of 127.0.0.1. If LOCALHOST does not appear in
the list, type the following command:
$ TCPIP SET HOST LOCALHOST /ADDRESS=127.0.0.1 /ALIAS=LOCALHOST
Type a ping command to verify that LOCALHOST was added:
l For TCP/IP Services for VSI OpenVMS: $ TCPIP PING LOCALHOST
l For VSI TCP/IP Version 10.5: $ IP PING LOCALHOST
PING LOCALHOST (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=64 time=0 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0 ms
After verifying that LOCALHOST responds to the ping command, you can use Ctrl-C or Ctrl-Y to stop pinging.
l System firmware: In general, users should take advantage of the latest improvements by obtaining the
most recent firmware version available for their platforms.
Fulfilling required permissions and access
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 205 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
l OPER
l SYSLCK
l SYSPRV
l TMPMBX
HPE recommends that you install ELMC using the SYSTEM account.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 206 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
the OpenVMS 8.4-1H1 system disk, which will be using library modules from the OpenVMS 8.4-2 system
disk. This combination of images and library modules may cause issues. If the user examines the PCSI
database of the OpenVMS 8.4-2 system disk, there will be no evidence that ELMC is installed and running on
this system. The ELMC root for the OpenVMS 8.4-2 system will be created on the OpenVMS 8.4-1H1 system
disk. If the OpenVMS 8.4-1H1 system is shutdown, the ELMC application on the OpenVMS 8.4-2 system will
stop functioning until the OpenVMS 8.4-1H1 system is rebooted.
Caution: After renaming or deleting the existing log, do not install ELMC until the new default log is
present.
If you rename the log, the saved log can be analyzed at a later time.
Aside from starting with a clean log before installing Insight Remote Support, you may want to perform regular
maintenance on the error log. One method is to rename errlog.sys on a monthly basis. For example, you
might rename errlog.sys to errlog.old at 00:01 on the first day of every month. To free space on the
system disk, you then can back up the renamed version to a different volume and delete the file from the
system disk.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 207 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
If the cluster has multiple system disks, check to see if the system disks are mounted cluster-wide. To avoid
potential problems, all remotely mounted system disks should be dismounted prior to removing ELMC on an
OpenVMS heterogeneous cluster.
1. Stop the WCCPROXY process:
l If this is a standalone system, issue the following command:
$ wccproxy stop
l If this is a cluster, stop WCCPROXY processes by issuing the following commands:
$ mcr sysman
SYSMAN> set env/cluster
SYSMAN> do wccproxy stop
4. If the WCCPROXY_HOME logical points to a nonexistent disk, then search the system disk for the WCCPROXY_
INSTALL.COM procedure.
$ directory sys$sysdevice:[*...]wccproxy_install.com
5. ELMC can be removed by executing the WCCPROXY_COM procedure found in the ELMC installation
directory.
$ @WCCPROXY_COMMON:[COMMON.WCCPROXY.BIN]wccproxy_install.com "uninstall"
If no WCCPROXY_INSTALL.COM procedure can be located, then use the v6.4 WCCPROXY_INSTALL.COM
procedure.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 208 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
3. When the download completes, click Install. The ELMC packages are placed in the %HP_RS_
DATA%\SWM\LANDINGZONE\ELMC folder. This folder defaults to
C:\ProgramData\HP\RS\DATA\SWM\LANDINGZONE\ELMC.
Note: The ProgramData folder is a hidden folder. To view this folder, set the folder options to
show hidden folders.
Note: The command executes the DCL script wccproxy_install.com in the current directory.
Do not run the product install wccproxy command that would normally be used to install a
PCSI-based product. This command aborts and prompts you to run the wccproxy_
install.com script instead. Set your default directory to the one containing the file wccproxy_
install.com, created by extracting the ELMC .exe file in the previous step.
When the DCL prompt ($) returns, the install has finished and the ELMC (WCCProxy) process will be
running.
7. Add the WCCPROXY STOP command to SYS$MANAGER:SYSHUTDWN.COM command procedure.
No command has to be added to the site specific boot command procedure since the installation will
have added the following to the SYSMAN utility:
SYSMAN> startup show file WCCPROXY$STARTUP.COM
%SYSMAN-I-COMFIL, contents of component database on node XXXX
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 209 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 210 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
The following steps configure WBEM Services (WBEMCIM) and WBEM Providers (WBEMPROVIDERS).
Make sure that you are logged into the SYSTEM account; a fully privileged user account is not sufficient for
this activity.
Before installing or upgrading, check what versions of WBEMCIM and WBEMPROVIDERS are installed. An
upgrade of these products will be necessary if you are not running the most recent version. The minimum
version that you should be running are shown below.
To view your version of WBEM, run the following command: PRODUCT SHOW PRODUCT WBEM*
l VSI OpenVMS 8.4-1H1 or 8.4-2
l VSI I64VMS WBEMCIM V3.0-B151019
l VSI I64VMS WBEMPROVIDERS V2.2-5
The installation kits for WBEMCIM V3.0-B151019 and WBEMPROVIDERS V2.2-5 can be found on the
VSI OpenVMS 8.4-2 operating system dvd in the [KITS.WBEMCIM] and [KITS.WBEMPROVIDERS]
directories.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 211 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
install.
1. Are the following processes are running?
$ SHOW SYSTEM/PROCESS=OPEN*
00007252 OPENVMS_UTILD HIB 5 59581523 0 03:57:40.96 532 546
00007253 OPENVMS_EMS HIB 5 3975 0 00:00:01.87 1092 1965 M
$ SHOW SYS/PROCESS=CIM*
00007227 CIMSERVER HIB 10 197589 0 00:00:39.70 2131 2940 M
$ SHOW SYSTEM/PROCESS=WBEMP*
21000478 WBEMPROV$HOST_P HIB 6 445 0 00:00:01.72 1254 1421 M
3. Has the following command has been added to the system startup? Check files such as SYS$MANAGER:
SYSTARTUP_VMS.COM.
$ @SYS$STARTUP:WBEM_Services$Startup.com
4. Has the WBEM repository has been created on the system disk?
$ DIRECTORY SYS$SYSDEVICE:[*...]repository.dir
Directory SYS$SYSDEVICE:[SYS0.WBEM_Services.var.opt.wbem]
repository.DIR;1
Total of 1 file.
If any of the above checks answered Yes, then go to "Upgrade WBEM" on page 216.
If all of the above checks answered No, then go to "Install WBEMCIM and WBEMPROVIDERS for the first
time" below.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 212 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
b. Confirm system knows about the providers created by WBEM Services and that their status is OK.
$ cimprovider –ls
MODULE STATUS
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
If the cimprovider command is unknown:
$ cimprovider
%DCL-W-IVVERB, unrecognized command verb - check validity and spelling
Execute the following command procedure and also add this command to the login.com of the
SYSTEM account in the section where interactive commands are invoked:
$ @SYS$COMMON:[wbem_services]WBEM_Services$Define_Commands.com
c. Verify that the WBEM Services CIMSERVER is responding to requests by using the OSINFO
command:
$ OSINFO
OperatingSystem Information
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 213 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
Host: i64svr
Name: OpenVMS
Version: V8.3-1H1
UserLicense: Unlimited user license
Number of Users: 2 users
Number of Processes: 28 processes
OSCapability: 64 bit
LastBootTime: Mar 20, 2009 0:41:21 (-0600)
LocalDateTime: Mar 21, 2009 13:58:57 (-0600)
If the OSINFO command does not work then the CIMSERVER process may be hung.
d. Confirm that the CIMSERVER process is using port 5989 by issuing the following commands:
o For TCPIP V5.7:
$ TCPIP SHOW DEVICE_SOCKET/PORT=5989
Port Remote
Device_socket Type Local Remote Service Host
bg22708 STREAM 5989 0 *
o For TCPIP 10.5:
$ pipe ip show /conn=process | search /exact sys$pipe "(5989)"
CIMSERVER 0 0 *(5989) *(*)
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 214 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
StateChangeIndicationProviderModule OK
ChassisProviderModule OK
cpuprovidermodule OK
MemoryModule OK
FirmwareRevisionProviderModule OK
MPProviderModule OK
EnclosureProviderModule OK
HPHealthStateProviderModule OK
HPVMSLANProviderModule OK
HPVMSLANCSProviderModule OK
CSChassisProviderModule OK
HPVMProviderModule OK
HP_UtilizationProviderModule OK
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
c. Confirm that the WBEMPROV$HOST_P process exists on models that support setting
HOSTINFOPARAMS on the ILO:
$ SHOW SYSTEM/PROCESS=WBEMPROV*
000069F0 WBEMPROV$HOST_P HIB 6 275 0 00:00:00.11 1055 1689 M
6. Create a nonprivileged account and a cimuser user whose username and password corresponds to the
SYSUAF account. This user account will be used by Insight RS when communicating with your
OpenVMS system using the WBEM protocol.
The following is an example of what the OpenVMS account should look like:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 8 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 14-JAN-2010 16:40
Last Login: 23-NOV-2009 10:31 (interactive), 3-FEB-2010 14:07 (non-interactive)
Maxjobs: 0 Fillm: 128 Bytlm: 256000
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 215 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
Note: The above WBEM account was created with the following commands:
$ mcr authorize add wbem/uic=
[10,266]/flag=nodisuser/nopwdexpired/password=wbem
$ mcr authorize modify wbem/nopwdlifetime/device=sys$sysdevice/directory=
[wbem]
a. Create the cimuser user with the following command. HPE recommends specifying the username in
lowercase and surrounded by quotes.
$ cimuser -a -u "<username>" -w "<password>"
Example:
$ cimuser -a -u "wbem" -w "mypassword"
b. Confirm that the user was created by issuing the command:
$ cimuser -l
wbem
c. Confirm that you can log on to the OpenVMS account.
7. Add WBEM Services and WBEM Providers to system startup and system shutdown to ensure they start
up at system boot and shutdown during a planned system shutdown.
Add the following command to the system startup:
$ @SYS$STARTUP:WBEM_Services$Startup.com
Since it may take a few minutes to startup WBEM Services, in order to not delay your system boot,
consider creating a batch command procedure that includes this command and invoking the batch job
from SYS$MANAGER:SYSTARTUP_VMS.COM.
Add the following command to the system shutdown in SYS$STARTUP:SYSHUTDWN.COM:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
Upgrade WBEM
If you need to upgrade a previously configured environment, HPE recommends that you perform the following
steps to upgrade the software. Note that whenever WBEM Services or WBEM Providers is upgraded, the
modified product needs to be reconfigured.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 216 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
Issue the following command if you have an appropriate operating system version and model for
Configuring WBEM Providers
$ @SYS$COMMON:[WBEMPROVIDERS]WBEMPROVIDERS$CONFIGURE.COM
l Issue the following commands if only WBEM Services needs to be upgraded:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
$ PRODUCT INSTALL WBEMCIM
$ RUN SYS$SYSROOT:[WBEM_Services]WBEM_Services$Config.exe
Issue the following command if you have an appropriate operating system version and model for
Configuring WBEM Providers
$ @SYS$COMMON:[WBEMPROVIDERS]WBEMPROVIDERS$CONFIGURE.COM
2. Verify WBEM Services:
a. Check if the CIMSERVER and CIMDAEMON processes exist and are in the HIB state:
$ SHOW SYSTEM/PROCESS=CIM*
20719DB1 CIMSERVER HIB 10 72063 0 00:00:14.27 3171 2905 M
207199C6 CIMDAEMON HIB 10 6449 0 00:00:00.39 1784 260
b. Confirm system knows about the providers created by WBEM Services and that their status is OK.
$ cimprovider –ls
MODULE STATUS
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
Execute the following command procedure and also add this command to the login.com of the
SYSTEM account in the section where interactive commands are invoked:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 217 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
$ @SYS$COMMON:[wbem_services]WBEM_Services$Define_Commands.com
c. Verify that the WBEM Services CIMSERVER is responding to requests by using the OSINFO
command:
$ OSINFO
OperatingSystem Information
Host: i64svr
Name: OpenVMS
Version: V8.3-1H1
UserLicense: Unlimited user license
Number of Users: 2 users
Number of Processes: 28 processes
OSCapability: 64 bit
LastBootTime: Mar 20, 2009 0:41:21 (-0600)
LocalDateTime: Mar 21, 2009 13:58:57 (-0600)
If the OSINFO command does not work then the CIMSERVER process may be hung.
d. Confirm that the CIMSERVER process is using port 5989 by issuing the following commands:
o For TCPIP 5.7:
$ TCPIP SHOW DEVICE_SOCKET/PORT=5989
Port Remote
Device_socket Type Local Remote Service Host
bg22708 STREAM 5989 0 *
o For TCPIP 10.5:
$ pipe ip show /conn=process | search /exact sys$pipe "(5989)"
CIMSERVER 0 0 *(5989) *(*)
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 218 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
$ cimprovider -ls
MODULE STATUS
EventIndicationConsumerModule OK
EMSWrapperProviderModule OK
HPVMSLANIndicationProviderModule OK
StateChangeIndicationProviderModule OK
ChassisProviderModule OK
cpuprovidermodule OK
MemoryModule OK
FirmwareRevisionProviderModule OK
MPProviderModule OK
EnclosureProviderModule OK
HPHealthStateProviderModule OK
HPVMSLANProviderModule OK
HPVMSLANCSProviderModule OK
CSChassisProviderModule OK
HPVMProviderModule OK
HP_UtilizationProviderModule OK
OperatingSystemModule OK
ComputerSystemModule OK
ProcessModule OK
IPProviderModule OK
c. Confirm that the WBEMPROV$HOST_P process exists on models that support setting
HOSTINFOPARAMS on the ILO:
$ SHOW SYSTEM/PROCESS=WBEMPROV*
000069F0 WBEMPROV$HOST_P HIB 6 275 0 00:00:00.11 1055 1689 M
4. Remove all cimuser accounts and add them back again. The cimuser command is used to define the
WBEM user credentials that will be used by Insight RS when communicating with your OpenVMS
system using the WBEM protocol.
The following example shows how to remove and add a user back in again.
a. Show the user:
$ cimuser -l
wbem
b. Remove the user:
$ cimuser –r –u "wbem"
User removed successfully.
c. Before adding the cimuser account, confirm that the account exists in the SYSUAF and that you can
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 219 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
log into the account. If the user is missing, create a nonprivileged account and a cimuser user whose
username and password corresponds to the SYSUAF account.
The following is an example of what the OpenVMS account should look like:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 8 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 14-JAN-2010 16:40
Last Login: 23-NOV-2009 10:31 (interactive), 3-FEB-2010 14:07 (non-interactive)
Maxjobs: 0 Fillm: 128 Bytlm: 256000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 150 JTquota: 4096
Prclm: 10 DIOlm: 150 WSdef: 4096
Prio: 4 ASTlm: 300 WSquo: 8192
Queprio: 0 TQElm: 100 WSextent: 16384
CPU: (none) Enqlm: 4000 Pgflquo: 700000
Authorized Privileges:
NETMBX TMPMBX
Default Privileges:
NETMBX TMPMBX
Note: The above WBEM account was created with the following commands:
$ mcr authorize add wbem/uic=
[10,266]/flag=nodisuser/nopwdexpired/password=wbem
$ mcr authorize modify wbem/nopwdlifetime/device=sys$sysdevice/directory=
[wbem]
d. Create the cimuser user with the following command. HPE recommends specifying the username in
lowercase and surrounded by quotes.
$ cimuser -a -u "<username>" -w "<password>"
Example:
$ cimuser -a -u "wbem" -w "mypassword"
e. Confirm that the user was created by issuing the command:
$ cimuser -l
wbem
f. Confirm that you can log on to the OpenVMS account.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 220 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
5. Verify WBEM Services and WBEM Providers are in the system startup and system shutdown to ensure
they start up at system boot and shutdown during a planned system shutdown. If they are not, add them.
Add the following command to the system startup:
$ @SYS$STARTUP:WBEM_Services$Startup.com
Since it may take a few minutes to startup WBEM Services, in order to not delay your system boot,
consider creating a batch command procedure that includes this command and invoking the batch job
from SYS$MANAGER:SYSTARTUP_VMS.COM.
Add the following command to the system shutdown in SYS$STARTUP:SYSHUTDWN.COM:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
This enables all CPUs to be eligible for Indictment except for CPU 0.
Note: CPU 0 cannot be removed. If you wish to not have some CPU’s eligible, refer to the VSI
OpenVMS documentation for Indictment Service to learn how to modify this procedure to meet
your needs.
To enable the Dynamic Processor Resilience Adapter in the Insight RS Console, complete the following
steps:
1. In the main menu, select Administrator Settings.
2. Click the Integration Adapters tab.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 221 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
3. Click the Dynamic Processor Resilience Adapter for HPE Integrity servers heading to expand the
adapter pane.
4. Select the Enable Dynamic Processor Resilience Adapter for HPE Integrity servers check box.
5. Click Save Adapter Settings.
Insight Remote Support enables the Dynamic Processor Resilience Adapter. (Enabled) now appears next to
the Dynamic Processor Resilience Adapter to indicate it is enabled.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener running Required
Systems Device in the Director's Web Interface. The monitored host
connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
TCP 7920 Hosting Monitored The Insight RS ELMC (WCCProxy) process Required
Device Systems communicates with the Director on this port. This is a
proprietary protocol. Any connections that exchange
username and passwords use SSL. Not all connections
are SSL.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 222 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
3. From the Select and Configure Protocol drop-down list, select Web-Based Enterprise Management
(WBEM).
Note that if you have more than one OpenVMS server with the same WBEM credentials, you may prefer
to create a Named Credential and use it here.
4. Click New. The New Credential dialog box appears.
5. Type the Username and Password you have configured on your device.
Type the Username and Password that corresponds to the cimuser account defined on the OpenVMS
server. The Username and Password are case sensitive and must match the cimuser credentials defined
on the OpenVMS server.
6. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 223 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 224 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ). If an error icon appears, troubleshoot
the WBEM protocol. See "WBEM protocol troubleshooting" below.
Troubleshooting
WBEM protocol troubleshooting
Check the following items if you are having issues with discovery.
l Make sure TCPIP IPv6 is not enabled on the OpenVMS server. No process should be found when issuing
this command:
$ show system/process=TCPIP$ND6HOST
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 225 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
l Modify the password in the SYSUAF to the account referenced in the cimuser command so it corresponds to
the password used when issuing the cimuser -a command.
l Confirm that the account referenced by cimuser does not have a flag of disuser in the SYSUAF. Confirm
that you can log into the account.
l Delete the cimuser account on the OpenVMS system with a cimuser –r command and recreate the
cimuser account and password.
l Re-enter the WBEM credentials within the Insight RS Console, making sure that the case matches the
cimuser account and password.
l Confirm that the processes CIMSERVER and CIMDAEMON exist on the OpenVMS server and that they are in
the HIB state. If they are in any other state, contact the HPE Customer Support Center for troubleshooting
assistance.
l Issue the cimprovider –ls command to confirm that all providers listed on the OpenVMS server have a
status of “OK”. If any are in a failed state, stop and restart WBEM Services. If this does not solve the issue
deinstall and reinstall WBEM Services and WBEM Providers.
l Confirm that port 5989 used for the WBEM protocol is not blocked by the firewall.
l Look for CIMSERVER.DMP files on the system disk. They are typically located in SYS$SPECIFIC:[WBEM_
Services]. If you find any current dumps, contact the HPE Customer Support Center for assistance.
l Check to see if data from the WBEM repository can be accessed by issuing the WBEMEXEC command on the
OpenVMS server. Details on this command can be obtained from the article OpenVMS - HPE Insight
Remote Support, How to Locally Test The Namespace Classes Referenced During Discovery. If you see
errors, consider deinstalling and reinstalling WBEM Services and WBEM Providers.
l Restart the services “Pegasus WMI Mapper” and “Pegasus WMIMapper Indications Service” on the
Windows Hosting Device.
l If WBEM Providers is configured, confirm that the OPENVMS_EMS, OPENVMS_UTILD, and WBEMPROV$HOST
processes exist. If these processes are missing, check the following log files in SYS$SPECIFIC:
[WBEMPROVIDERS] for errors:
$ type WBEMPROVIDERS$OPENVMS_EMS.OUT
$ type WBEMPROV$HOST_P.OUT
$ type WBEMPROVIDERS$OPENVMS_UTILD.OUT
l If all other troubleshooting of the WBEM protocol fails to yield results, deinstall and reinstall WBEM
Services and WBEM Providers.
a. Display WBEM logicals to determine where the products are installed:
$ SHOW LOGICAL WBEM*
b. If WBEM Services and WBEM Providers are running, shut them down:
$ @SYS$STARTUP:WBEM_Services$Shutdown.com
c. Run PRODUCT REMOVE commands and continue if any errors occur:
$ PRODUCT REMOVE WBEMPROVIDERS
$ PRODUCT REMOVE WBEMCIM
d. Delete any WBEMPROVIDERS.DIR and WBEM_Services.DIR directories and any files left in
SYS$STARTUP. If the products were installed on the system disk, run the following commands:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 226 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
$ DELETE/TREE SYS$COMMON:[WBEMPROVIDERS…]*.*;*
$ DELETE/TREE SYS$COMMON:[WBEM_Services…]*.*;*
$ DELETE SYS$COMMON:[000000]WBEMPROVIDERS.DIR;1
$ DELETE SYS$COMMON:[000000]WBEM_Services.DIR;1
$ DELETE/TREE SYS$SPECIFIC:[WBEMPROVIDERS…]*.*;*
$ DELETE/TREE SYS$SPECIFIC:[WBEM_Services…]*.*;*
$ DELETE SYS$SPECIFIC:[000000]WBEMPROVIDERS.DIR;1
$ DELETE SYS$SPECIFIC:[000000]WBEM_Services.DIR;1
$ DELETE SYS$STARTUP:WBEMPROVIDER*.*;*
$ DELETE SYS$STARTUP:WBEM_SERVICES*.*;*
$ DELETE SYS$STARTUP:WBEMPROVIDERS*.*;*
Note that the DELETE/TREE qualifier is only available on OpenVMS 8.4. On an OpenVMS 8.3-1H1
system you will need to reissue the DELETE commands multiple times until all subdirectories and files
are deleted.
e. Delete all WBEM Services and WBEM Providers logicals:
$ DEASSIGN/SYSTEM WBEM_BIN
$ DEASSIGN/SYSTEM WBEM_CIMXX_MOF_DIR
$ DEASSIGN/SYSTEM WBEM_ETC
$ DEASSIGN/SYSTEM WBEM_LIB
$ DEASSIGN/SYSTEM WBEM_MOF_DIR
$ DEASSIGN/SYSTEM WBEM_OPT
$ DEASSIGN/SYSTEM WBEM_REPOSITORY_DIR
$ DEASSIGN/SYSTEM WBEM_SBIN
$ DEASSIGN/SYSTEM WBEM_TMP
$ DEASSIGN/SYSTEM WBEM_VAR
$ DEASSIGN/SYSTEM WBEM_VAR_DATA_DIR
$ DEASSIGN/SYSTEM/EXEC WBEM_PRIMARY_OWNER
$ DEASSIGN/SYSTEM/EXEC WBEM_PRIMARY_OWNER_CONTACT
l If reinstalling WBEM Services and WBEM Providers does not resolve the issue, execute the following
command procedure and provide the saveset output to the HPE Customer Support Center: $
@SYS$COMMON:[WBEMPROVIDERS]WBEM$REPORTER.COM
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 227 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
Note if the pop-up shows the SNMPv1 protocol, discovery detected the SNMP protocol. The SNMP
protocol cannot be used to monitor OpenVMS devices and this particular entry can be removed by clicking
Clear.
If Insight RS is not able to successfully connect to the OpenVMS system using the ELMC protocol,
continue with the troubleshooting steps below.
l If the ELMC protocol was not discovered, confirm the product WCCPROXY v6.4 is installed on your
OpenVMS system by issuing the following command:
$ product show product wccproxy
If you need to upgrade, the installation media can be found in:
<partition_where_InsightRS_is installed>:\ProgramData\HP\RS\DATA\ELMC
If you do not see the media in this folder, in the Insight RS Console browse to Administrator Settings >
Software Update tab. Click on Event Log Monitoring Collector (ELMC) package. Then on the
Available Version tab, click Install. Copy the media to your OpenVMS server in binary mode and then
issue the following commands when logged into the SYSTEM account:
$ run ELMC_VSI_KIT1_17-MAY-2016_OVMSI64.EXE
$ @wccproxy_install uninstall
$ @wccproxy_install install
l Confirm that the WCCPROXY process is running on the OpenVMS server by issuing the following command
when logged into the SYSTEM account.
$ wccproxy status
If it does not show the WCCProxy is running, issue the command:
$ wccproxy start
l Try restarting the WCCPROXY process on the OpenVMS server by issuing the commands while logged into
the SYSTEM account:
$ wccproxy stop
$ wccproxy start
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 228 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
$ @sys$system:startup.com errfmt
l Confirm that port 7920 used by the ELMC protocol is not blocked by the firewall.
l Issue the following command to check if your Insight RS server is communicating with the ELMC process
by examining port 7920. If it is working correctly you should see your Hosting Device mentioned in the
“Remote Host” column as shown in the following example:
$ tcpip show device/port=7920
Port Remote
Device_socket Type Local Remote Service Host
bg285 STREAM 7920 0 *
bg42927 STREAM 7920 59958 1.2.3.4
l Send a test event and examine the Insight RS log file KCT.###.log for evidence on why the events may be
rejected. This is found in:
<partition_where _InsightRS_is_installed>\ProgramData\HP\RS\LOG
In the case that the OpenVMS errlog.sys is corrupt, rename the errlog.sys file and let the operating
system create a new one. Also confirm that the hardware is supported by Insight RS by referring to the
HPE Insight Remote Support Release Notes at www.hpe.com/info/insightremotesupport/docs.
l If no test event is received, examine the time zone of the OpenVMS system, the Hosting Device, and the
time zone defined in Insight RS to see if there is a discrepancy. The time zone within Insight RS can be
determined by browsing to Company Information > Sites > <site_name>.
The time zone of OpenVMS can be determine by issuing the following command:
$ show logical *time*
The time on the OpenVMS system can be determined by issuing the command:
$ show time
l Check that none of the command procedures in WCCPROXY_SPECIFIC:[SPECIFIC.WCCPROXY.DATA] have a
version limit of 32767. If they do, stop WCCPROXY by determining the pid of the WCCPROXY and
issuing STOP/ID=<pid #>. Then delete the files in this directory, and restart WCCPROXY by issuing a
WCCPROXY START command.
l If you continue to have problems with the ELMC protocol, check the log files in WCCPROXY_SPECIFIC:
[SPECIFIC.WCCPROXY.LOGS] for issues.
l If none of the troubleshooting steps shown above have solved the issue, deinstall and reinstall ELMC
(WCCPROXY) on the OpenVMS server:
$ run ELMCV64BL1KIT1_21-JUN-2012_OVMSI64.EXE
$ @wccproxy_install uninstall
$ @wccproxy_install install
l If test events are not working for any OpenVMS system, confirm that ELMC was installed on the Insight
RS server. WCCPROXY 6.4 software should appear in the Control Panel → All Control Panel Items →
Programs and Features. If WCCPROXY is missing, log into the Insight RS Console and navigate to
Administrator Settings → Software Updates. Click on Event Log Monitoring Collector (ELMC), and
on the Available Version tab, click Install. Once the WCCPROXY software is installed, make sure that
the WCCPROXY service is started.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 229 of 436
Chapter 17: Configuring VSI OpenVMS Integrity servers
l If test events are not working for any OpenVMS system, determine if Insight Remote Support Advanced
(RSA) A.05.80 or below is installed on the same server running Insight RS 7.x. If Insight RSA A.05.08 or
below appears in Control Panel → All Control Panel Items → Programs and Features, this software
should be removed.
Entitlement troubleshooting
Check the following items if you are having entitlement issues with your OpenVMS system.
l If the OpenVMS system does not pass the entitlement check, make sure you have the correct serial
number and product number specified on the contract.
l If the correct serial number and product number have been defined for the device and the entitlement check
continues to fail, confirm that the “Hosting Device Health” has a green check. This can be found in the
header of the Insight RS Console. If it shows a red x, click on “Hosting Device Health” for more details.
l Try stopping the following Window services in this order: 1) “HPE Insight Remote Support” and 2) “HPE
Insight RS Event Receiver” and then restarting them in that order.
l Confirm that port 443 used to communicate with the HPE backend is not blocked by the firewall.
Additional security firewall requirements are detailed in the HPE Insight Remote Support Security White
Paper at www.hpe.com/info/insightremotesupport/docs.
l Open up a browser on the Hosting Device and confirm if you can access this web page:
https://api.support.hpe.com/v1/version/index.html
l Issue a nslookup command and confirm that api.support.hpe.com can be resolved.
If api.support.hpe.com cannot be resolved by your DNS server, then add this address to the Windows
host file on the Hosting Device.
l Lack of connectivity to the HPE backend can sometimes be caused by issues with the HPE backend. For
additional assistance troubleshooting the lack of connectivity, contact the HPE Customer Support.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 230 of 436
Chapter 18: Configuring HPE OpenVMS
AlphaServers
Important: Configuration collections for HPE OpenVMS on AlphaServer are not available except
when the HPE OpenVMS server is part of a SAN collection.
Important: HPE only provides limited remote support for customers using HPE Alpha servers. As
with standard support, Insight Remote Support version 7.x will attempt to discover these products
as remotely monitored HPE products and send information about failure events to HPE.
However, if there are issues with the operation of the remote monitoring features of Insight Remote
Support version 7.x for these specific products, including the remote discovery or the reporting of
failure events to HPE, then HPE will resolve such issues in a commercially reasonable manner but
without guarantee of an immediate response or a resolution. If a failure event is successfully
received at HPE, it is managed according to the support level agreement.
Make sure Insight RS supports your OpenVMS server by checking the HPE Insight Remote
Support Release Notes.
Install and configure ELMC for HPE OpenVMS on the HPE OpenVMS server.
Send a test event to verify connectivity between your HPE OpenVMS server and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 231 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
Note: Other TCP/IP products may work as is, so the Insight RS installation always completes
regardless of what, if any, TCP/IP product is installed.
l LOCALHOST entry: For ELMC to operate correctly, the LOCALHOST entry must be defined in the HPE
OpenVMS TCP/IP HOSTS database. It is defined correctly by default, but it can be removed, which
causes Insight RS to fail.
Type the following command:
$ TCPIP SHOW HOST /LOCAL
Look for LOCALHOST, which should have an IP address of 127.0.0.1. If LOCALHOST does not appear in
the list, type the following command:
$ TCPIP SET HOST LOCALHOST /ADDRESS=127.0.0.1 /ALIAS="localhost"
Type a ping command to verify that LOCALHOST was added:
$ TCPIP PING LOCALHOST
PING LOCALHOST (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=64 time=0 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0 ms
After verifying that LOCALHOST responds to the ping command, you can use Ctrl-C or Ctrl-Y to stop pinging.
l System firmware: The prerequisite system firmware supports the logging of events according to the FRU
Table Version 5 Specification, which is required for Insight Remote Support FRU configuration tree
processing.
All DSxx and ES40 systems must have firmware V5.7–4 or higher.
In general, users should take advantage of the latest improvements by obtaining the most recent firmware
version available for their platforms.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 232 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l ALTPRI
l BUGCHK
l BYPASS
l CMKRNL
l DIAGNOSE
l IMPERSONATE
l NETMBX
l OPER
l SYSLCK
l SYSPRV
l TMPMBX
HPE recommends that you install ELMC using the SYSTEM account.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 233 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l On every node of the cluster the ELMC WCCPROXY process runs the images from the system disk where
the installation was performed. This may be problematic if the other system disks are running different
versions of OpenVMS or have different operating system patches installed.
l If the system disk where the installation was performed is unavailable due to a planned shutdown or crash,
the ELMC application will fail to run on the remaining nodes of the cluster. This means that no monitoring
will occur until the system disk where the installation was performed becomes available again.
The following example illustrates the issue: assume the user has a 2 node cluster with one system running
OpenVMS 8.3 and another system running OpenVMS 8.4. If ELMC is installed on the system running
OpenVMS 8.3, the system running OpenVMS 8.4 will have a WCCProxy process running images from the
OpenVMS 8.3 system disk, which will be using library modules from the OpenVMS 8.4 system disk. This
combination of images and library modules may cause issues. If the user examines the PCSI database of the
OpenVMS 8.4 system disk, there will be no evidence that ELMC is installed and running on this system. The
ELMC root for the OpenVMS 8.4 system will be created on the OpenVMS 8.3 system disk. If the OpenVMS
8.3 system is shutdown, the ELMC application on the OpenVMS 8.4 system will stop functioning until the
OpenVMS 8.3 system is rebooted.
Caution: After renaming or deleting the existing log, do not install ELMC until the new default log is
present.
If you rename the log, the saved log can be analyzed at a later time.
Aside from starting with a clean log before installing Insight Remote Support, you may want to perform regular
maintenance on the error log. One method is to rename errlog.sys on a monthly basis. For example, you
might rename errlog.sys to errlog.old at 00:01 on the first day of every month. To free space on the
system disk, you then can back up the renamed version to a different volume and delete the file from the
system disk.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 234 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
4. If the WCCPROXY_HOME logical points to a nonexistent disk, then search the system disk for the WCCPROXY_
INSTALL.COM procedure.
$ directory sys$sysdevice:[*...]wccproxy_install.com
5. ELMC can be removed by executing the WCCPROXY_COM procedure found in the ELMC installation
directory.
$ @WCCPROXY_COMMON:[COMMON.WCCPROXY.BIN]wccproxy_install.com "uninstall"
If no WCCPROXY_INSTALL.COM procedure can be located, then use the v6.4 WCCPROXY_INSTALL.COM
procedure.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 235 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
Certain GS80, GS160, and GS320 systems did not have their system serial number set correctly at the
factory, and Insight RS only functions when the serial number is set correctly. Affected serial numbers will
begin with the letter "G."
At the SRM console firmware prompt (the prompt when you first power the system on), check the serial
number with the following command:
show sys_serial_num
The serial number shown should match the actual serial number on the model/serial number tag located in the
power cabinet. If necessary, change the serial number with the following command:
set sys_serial_num
Type the six-character serial number provided on the tag in the power cabinet.
Note: This issue also can arise when multiple AlphaServers are ordered, because the factory may
assign an identical serial number to each system. In this scenario, Insight RS does not work
correctly because it requires that each AlphaServer have a unique number. If this is the case,
uniquely identify each AlphaServer by appending –1, –2, –3, and so on, to the serial numbers when
you use the set sys_serial_num command.
Note: Multiple partitions on the same AlphaServer always have the same serial number because
they reside on the same machine. There are no Insight RS conflicts in this case, so do not attempt
to assign unique serial numbers to different partitions on the same machine.
Note: The ProgramData folder is a hidden folder. To view this folder, set the folder options to
show hidden folders.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 236 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l There are no other kits in the directory, especially other versions of ELMC kits.
l There are no old ELMC or WCCProxy files in the directory left over from previous operations.
5. Extract the ELMC installation files:
$ run ELMCV64BL1KIT1_JUN-21-2012_OVMSALP.EXE
6. Run the wccproxy_install.com command procedure to either upgrade or install ELMC. Then follow the
prompts.
l Run the following command to install ELMC on the system disk:
$ @wccproxy_install.com "install"
l Run the following command to install ELMC on a disk other than the system disk:
$ @wccproxy_install.com "install" "<installation directory>"
Example:
$ @wccproxy_install.com "install" "COMMON$DISK:[ELMC]"
The installation asks the following question:
Use the following command to install standalone ELMC/Proxy kit
@WCCPROXY_INSTALL.COM INSTALL masterwebes <installation_path> Do you want to
continue?[NO]:
Note: The command executes the DCL script wccproxy_install.com in the current directory.
Do not run the product install wccproxy command that would normally be used to install a
PCSI-based product. This command aborts and prompts you to run the wccproxy_
install.com script instead. Set your default directory to the one containing the file wccproxy_
install.com, created by extracting the ELMC .exe file in the previous step.
When the DCL prompt ($) returns, the install has finished and the ELMC (WCCProxy) process will be
running.
7. Add the WCCPROXY STOP command to SYS$MANAGER:SYSHUTDWN.COM command procedure.
No command has to be added to the site specific boot command procedure since the installation will
have added the following to the SYSMAN utility:
SYSMAN> startup show file WCCPROXY$STARTUP.COM
%SYSMAN-I-COMFIL, contents of component database on node XXXX
Phase Mode File
------------ ------ ---------------------------------
LPMAIN DIRECT WCCPROXY$STARTUP.COM
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 237 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l WCCPROXY STOP
This command stops the WCCPROXY process.
l WCCPROXY STATUS
This command shows the status of the WCCPROXY process.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 238 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l If you see the below output, this means the TCP/IP service is defined and enabled. Proceed to "Configure
read community string" below.
$ TCPIP SHOW SERVICE SNMP
Service Port Proto Process Address State
SNMP 161 UDP TCPIP$SNMP 0.0.0.0 Enabled
l If you see the below output, this means SNMP is not defined or configured. Proceed to "Enable SNMP"
below.
$ TCPIP SHOW SERVICE SNMP
%TCPIP-W-NORECORD, information not found
-RMS-E-RNF, record not found
Enable SNMP
When the SNMP service does not exist it can be enabled by invoking SYS$MANAGER:TCPIP$CONFIG.COM
$ @SYS$MANAGER:TCPIP$CONFIG.COM
Choose option 3 for server components, then choose option 18 for SNMP.
If TCPIP$CONFIG.COM displays that the SNMP service is already enabled, then use the configuration tool to
disable it and re-enable it. Sometimes the display can get out of sync with reality due to commands issued at
the TCPIP prompt instead of in the TCPIP$CONFIG utility.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 239 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 7920 Hosting Monitored The Insight RS ELMC (WCCProxy) process Required
Device Systems communicates with the Director on this port. This is
a proprietary protocol. Any connections that
exchange username and passwords use SSL. Not
all connections are SSL.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The
monitored host connects to the Hosting Device on
this port (e.g. https://<hostname>:7905).
UDP 161 Hosting Onboard SNMP. This is the standard port used by SNMP Required
Device Administrator agents on monitored systems. The Hosting Device
sends requests to devices on this port.
UDP 162 Onboard Hosting SNMP Trap. This is the port used by Insight RS to Required
Administrator Device listen to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 240 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 241 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 242 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
protocol click on Telnet → Named Credential. Select the Named Credential created earlier.
e. Click on the Device tab, then click Discover Device.
7. Configure San Configuration Collection Schedule:
a. In the main menu of the Insight RS Console, select Collection Services.
b. Click the Collection Schedules tab.
c. In the List of Collection Schedules pane, select the SAN Configuration Collection Schedule.
d. Assign devices in the assigned devices pane. The default view shows devices assigned to the
schedule. To show additional devices, click the Not Assigned to this Schedule or All Devices
options. To show devices in a specific device group, select a device group from the Filter by device
group drop-down list. To search for a specific device, type the device name into the Search box.
The table displays the devices based on your filter and search criteria.
Add your HPE OpenVMS device to the SAN Configuration Collection Schedule by selecting the
check box next to the device in the devices table.
e. Click Save Devices.
f. Click Run Now.
8. Confirm the SAN Configuration Collection Schedule ran successfully; see "Verify collections in the
Insight RS Console" on the next page.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 243 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
$ run TESTLOG.EXE_axp
%TESTLOG-I-ADD, Test Event added to SYS$ERRORLOG:ERRLOG.SYS
If the SAN Collection was successful, verify that the collection XML file contains no DCL errors. If errors
exist, the collection was unsuccessful in gathering all of the required data.
Note: This procedure only applies if you have enabled local storage of collections. For details, see
the Online Help.
1. In the Insight RS Console, on the Devices → Monitoring & Collections tab, click the icon.
2. In the collection description, click View Collection.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 244 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
Troubleshooting
SNMP protocol troubleshooting
l Confirm that SNMP ports 161 and 162 are not blocked by the firewall.
l If the SNMP protocol cannot be discovered, confirm that the addresses on the OpenVMS READ Community
string are correctly defined. The address should either be 0.0.0.0 or 127.0.0.1 (the IP address to the
Hosting Device). You can examine the SNMP configuration by issuing the following command: $ tcpip
show config snmp/full.
l Confirm that the Named Credential read community string specified in Insight RS is identical to the
community string defined on the OpenVMS server and in the SNMP Service Security tab on the Hosting
Device. Note that the community string is case sensitive.
l If the community string is correct, run the following command to confirm that the SNMP service is enabled
on the OpenVMS server:
$ tcpip show service snmp
Service Port Proto Process Address State
SNMP 161 UDP TCPIP$SNMP 0.0.0.0 Enabled
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 245 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
To eliminate this problem, add the following command to the beginning of SYLOGIN.COM:
$ if f$mode() .eqs. "NETWORK" then exit
l Stop and restart the OpenVMS SNMP service to make sure that the configuration displayed is actually in
effect:
$ @sys$startup:tcpip$snmp_shutdown.com
$ @sys$startup:tcpip$snmp_startup.com
l If the SNMP service will not start on the OpenVMS server, confirm that the TCPIP$SNMP account shows
that its UIC identifier in the SYSUAF is TCPIP$SNMP. Also confirm the account does not have the disuser
flag. The following is an example of a properly defined TCPIP$SNMP account:
$ mcr authorize show tcpip$snmp
Username: TCPIP$SNMP Owner: TCPIP$SNMP
Account: TCPIP UIC: [3655,21] ([TCPIP$AUX,TCPIP$SNMP])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[TCPIP$SNMP]
LGICMD: LOGIN
Flags: Restricted
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
Primary 000000000011111111112222 Secondary 000000000011111111112222
Day Hours 012345678901234567890123 Day Hours 012345678901234567890123
Network: ##### Full access ###### ##### Full access ######
Batch: ----- No access ------ ----- No access ------
Local: ----- No access ------ ----- No access ------
Dialup: ----- No access ------ ----- No access ------
Remote: ----- No access ------ ----- No access ------
Expiration: (none) Pwdminimum: 6 Login Fails: 1
Pwdlifetime: 90 00:00 Pwdchange: (pre-expired)
Last Login: (none) (interactive), 17-APR-2015 13:58 (non-interactive)
Maxjobs: 0 Fillm: 100 Bytlm: 52200
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 400 JTquota: 4096
Prclm: 8 DIOlm: 50 WSdef: 350
Prio: 8 ASTlm: 100 WSquo: 1024
Queprio: 4 TQElm: 50 WSextent: 4000
CPU: (none) Enqlm: 100 Pgflquo: 50000
Authorized Privileges:
NETMBX TMPMBX
l Confirm the directory and the files in the directory SYS$SYSDEVICE:[TCPIP$SNMP] are owned by the
TCPIP$SNMP account
$ directory/owner SYS$SYSDEVICE:[000000]TCPIP$SNMP.DIR
$ directory/owner SYS$SYSDEVICE:[TCPIP$SNMP…]*.*
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 246 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
Note if the pop-up shows the SNMPv1 protocol, discovery detected the SNMP protocol. The SNMP
protocol cannot be used to monitor OpenVMS devices and this particular entry can be removed by clicking
Clear.
If Insight RS is not able to successfully connect to the OpenVMS system using the ELMC protocol,
continue with the troubleshooting steps below.
l If the ELMC protocol was not discovered, confirm the product WCCPROXY v6.4 is installed on your
OpenVMS system by issuing the following command:
$ product show product wccproxy
If you need to upgrade, the installation media can be found in:
<partition_where_InsightRS_is installed>:\ProgramData\HP\RS\DATA\ELMC
If you do not see the media in this folder, in the Insight RS Console browse to Administrator Settings >
Software Update tab. Click on Event Log Monitoring Collector (ELMC) package. Then on the
Available Version tab, click Install. Copy the media to your OpenVMS server in binary mode and then
issue the following commands when logged into the SYSTEM account:
$ run ELMCV64BL1KIT1_JUN-21-2012_OVMSALP.EXE
$ @wccproxy_install uninstall
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 247 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
$ @wccproxy_install install
l Confirm that the WCCPROXY process is running on the OpenVMS server by issuing the following command
when logged into the SYSTEM account.
$ wccproxy status
If it does not show the WCCProxy is running, issue the command:
$ wccproxy start
l Try restarting the WCCPROXY process on the OpenVMS server by issuing the commands while logged into
the SYSTEM account:
$ wccproxy stop
$ wccproxy start
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 248 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l If test events are not working for any OpenVMS system, confirm that ELMC was installed on the Insight
RS server. WCCPROXY 6.4 software should appear in the Control Panel → All Control Panel Items →
Programs and Features. If WCCPROXY is missing, log into the Insight RS Console and navigate to
Administrator Settings → Software Updates. Click on Event Log Monitoring Collector (ELMC), and
on the Available Version tab, click Install. Once the WCCPROXY software is installed, make sure that
the WCCPROXY service is started.
l If test events are not working for any OpenVMS system, determine if Insight Remote Support Advanced
(RSA) A.05.80 or below is installed on the same server running Insight RS 7.x. If Insight RSA A.05.08 or
below appears in Control Panel → All Control Panel Items → Programs and Features, this software
should be removed.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 249 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l Confirm the directory and the files in the directory SYS$SYSDEVICE:[TCPIP$SSH] are owned by the
TCPIP$SSH account.
$ directory/owner SYS$SYSDEVICE:[000000]TCPIP$SSH.DIR
$ directory/owner SYS$SYSDEVICE:[TCPIP$SSH…]*.*
l Confirm that port 22 used by the SSH protocol is not blocked by the firewall.
l Install a SSH client on the Windows Hosting Device. Test if you can log in to OpenVMS system using the
SSH client on the Windows Hosting Device. Use the same credentials as defined in the SSH Named
Credential.
l If port 22 is not blocked by the firewall but you cannot log into the OpenVMS system using the SSH client
on your Windows server, test if you can SSH from the OpenVMS system to itself.
$ SSH localhost
l Check if any other system has SSH access to the OpenVMS server.
l Confirm that the account you are trying to log into does not have the DISUSER flag set and that the
password is not expired. Also make sure that Pwdlifetime field is set to (none).
l Examine the OpenVMS SSH server configuration file TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSH2_
CONFIG. Make sure the AllowedAuthentications parameter includes password. Make sure the
DenyHosts parameter does not include a reference to the Windows server. Make sure there are not any
other configuration errors.
l Examine the TCPIP$SSH_DEVICE:TCPIP$SSH_RUN.LOG for clues as to why SSH is not working.
l To enable debug on the OpenVMS SSH server define the following logical:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 250 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
The following command shows the syntax for granting the required privileges to an OpenVMS account.
$ MCR AUTHORIZE MODIFY <username>/DEFPRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK) -
/PRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK)
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the CMKRNL privilege:
%DCL-W-IVVERB, unrecognized command verb - check validity and spelling
\FC\
## FIBRE CARD INFO FINISHED ##
## Starting SCSI INFORMATION ##
%TYPE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
%DELETE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;*
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
## Finishing SCSI INFORMATION ##
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 251 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the SYSLCK privilege:
Excerpt xml file:
====== PCSI ======
%PCSIUI-E-PRIVCLASS1, operation requires SYSLCK privilege
%PCSIUI-E-ABORT, operation terminated due to an unrecoverable error condition
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 252 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l Confirm the directory and the files in the directory SYS$SYSDEVICE:[TCPIP$TELNET] are owned by the
TCPIP$TELNET account.
$ directory/owner SYS$SYSDEVICE:[000000]TCPIP$TELNET.DIR
$ directory/owner SYS$SYSDEVICE:[TCPIP$TELNET…]*.*
l Confirm that port 23 used by the telnet protocol is not blocked by the firewall.
l Enable the telnet client on the Insight RS Hosting Device. Open up a command prompt on the Windows
Hosting Device, enter telnet <ip_address_OpenVMS_system> and test if you can log into the OpenVMS
system. Use the same credentials as defined in the Telnet Named Credential.
l If port 23 is not blocked by the firewall but you cannot log into the OpenVMS system from the Hosting
Device, test if you can telnet from the OpenVMS system to itself: $ telnet localhost
l Check if any other system has telnet access to the OpenVMS server.
l Confirm that the account you are trying to log into does not have the DISUSER flag set and that the
password is not expired. Also make sure that Pwdlifetime field is set to (none).
l Confirm the OpenVMS account used for the SAN Collection TELNET credentials also has the privileges of
CMKRNL, NETMBX, SYSLCK, and TMPMBX. The following is an example of a properly configured account:
$ mcr authorize show wbem
Username: WBEM Owner: WBEM
Account: WBEM UIC: [10,266] ([WBEM])
CLI: DCL Tables: DCLTABLES
Default: SYS$SYSDEVICE:[WBEM]
LGICMD:
Flags:
Primary days: Mon Tue Wed Thu Fri
Secondary days: Sat Sun
No access restrictions
Expiration: (none) Pwdminimum: 6 Login Fails: 0
Pwdlifetime: (none) Pwdchange: 26-JAN-2017 17:33
Last Login: 30-JAN-2017 21:45 (interactive), 1-FEB-2017 16:07 (non-interactive)
Maxjobs: 0 Fillm: 100 Bytlm: 64000
Maxacctjobs: 0 Shrfillm: 0 Pbytlm: 0
Maxdetach: 0 BIOlm: 150 JTquota: 4096
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 253 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
The following command shows the syntax for granting the required privileges to an OpenVMS account.
$ MCR AUTHORIZE MODIFY <username>/DEFPRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK) -
/PRIVILEGES=(NETMBX,TMPMBX,CMKRNL,SYSLCK)
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the CMKRNL privilege:
%DCL-W-IVVERB, unrecognized command verb - check validity and spelling
\FC\
## FIBRE CARD INFO FINISHED ##
## Starting SCSI INFORMATION ##
%TYPE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
%DELETE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_SCSI.TXT;*
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
## Finishing SCSI INFORMATION ##
## Starting HARDWARE INFORMATION ##
%TYPE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_CONFIG.TXT;
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
%DELETE-W-SEARCHFAIL, error searching for SYS$SYSDEVICE:[WBEM]CLUE_CONFIG.TXT;*
-RMS-E-DNF, directory not found
-SYSTEM-W-NOSUCHFILE, no such file
l If the XML file created by the SAN Collection shows DCL errors similar to the following, the OpenVMS
account used for the credentials is missing the SYSLCK privilege:
Excerpt xml file:
====== PCSI ======
%PCSIUI-E-PRIVCLASS1, operation requires SYSLCK privilege
%PCSIUI-E-ABORT, operation terminated due to an unrecoverable error condition
Entitlement troubleshooting
Check the following items if you are having entitlement issues with your OpenVMS system.
l If the OpenVMS system does not pass the entitlement check, make sure you have the correct serial
number and product number specified on the contract.
l If the correct serial number and product number have been defined for the device and the entitlement check
continues to fail, confirm that the “Hosting Device Health” has a green check. This can be found in the
header of the Insight RS Console. If it shows a red x, click on “Hosting Device Health” for more details.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 254 of 436
Chapter 18: Configuring HPE OpenVMS AlphaServers
l Try stopping the following Window services in this order: 1) “HPE Insight Remote Support” and 2) “HPE
Insight RS Event Receiver” and then restarting them in that order.
l Confirm that port 443 used to communicate with the HPE backend is not blocked by the firewall.
Additional security firewall requirements are detailed in the HPE Insight Remote Support Security White
Paper at www.hpe.com/info/insightremotesupport/docs.
l Open up a browser on the Hosting Device and confirm if you can access this web page:
https://api.support.hpe.com/v1/version/index.html
l Issue a nslookup command and confirm that api.support.hpe.com can be resolved.
If api.support.hpe.com cannot be resolved by your DNS server, then add this address to the Windows
host file on the Hosting Device.
l Lack of connectivity to the HPE backend can sometimes be caused by issues with the HPE backend. For
additional assistance troubleshooting the lack of connectivity, contact the HPE Customer Support.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 255 of 436
Chapter 19: Configuring Tru64 UNIX servers
Important: Configuration collections for Tru64 on AlphaServer are not available except when the
Tru64 server is part of a SAN collection.
Important: HPE only provides limited remote support for customers using HPE Alpha servers. As
with standard support, Insight Remote Support version 7.x will attempt to discover these products
as remotely monitored HPE products and send information about failure events to HPE.
However, if there are issues with the operation of the remote monitoring features of Insight Remote
Support version 7.x for these specific products, including the remote discovery or the reporting of
failure events to HPE, then HPE will resolve such issues in a commercially reasonable manner but
without guarantee of an immediate response or a resolution. If a failure event is successfully
received at HPE, it is managed according to the support level agreement.
Make sure Insight RS supports your Integrity Tru64 server by checking the HPE Insight Remote
Support Release Notes.
Install and configure ELMC for Tru64 on the Tru64 UNIX server.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 256 of 436
Chapter 19: Configuring Tru64 UNIX servers
Note: HPE Sustaining Engineering maintains a schedule of support for the Tru64 UNIX operating
system. HPE does not commit to supporting Insight Remote Support when installed on an
operating system version that has exceeded its end-of-support date.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 257 of 436
Chapter 19: Configuring Tru64 UNIX servers
3. Issue similar move commands for any node-specific error logs you wish to save, for example:
# mv /var/cluster/members/<memb>/adm/binary.errlog
/var/cluster/members/<memb>/adm/binary.errlog.2002_06_11
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 258 of 436
Chapter 19: Configuring Tru64 UNIX servers
# mv /var/cluster/members/<memb>/adm/binlog.saved/binary.errlog.saved
/var/cluster/members/<memb>/adm/binlog.saved/binary.errlog.saved.2002_06_11
4. Remove existing error logs, ignoring any No such file or directory errors:
# rm /var/adm/binary.errlog
# rm /var/cluster/members/<memb>/adm/binary.errlog
# rm /var/cluster/members/<memb>/adm/binlog.saved/binary.errlog.saved
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 259 of 436
Chapter 19: Configuring Tru64 UNIX servers
set sys_serial_num
Type the six-character serial number provided on the tag in the power cabinet.
Note: This issue also can arise when multiple AlphaServers are ordered, because the factory may
assign an identical serial number to each system. In this scenario, event rules do not work correctly
because they require that each AlphaServer have a unique number. If this is the case, uniquely
identify each AlphaServer by appending –1, –2, –3, and so on, to the serial numbers when you use
the set sys_serial_num command.
Multiple partitions on the same AlphaServer always have the same serial number because they
reside on the same machine. There are no conflicts in this case, so do not attempt to assign unique
serial numbers to different partitions on the same machine.
Note: If installing in a TruCluster environment, make sure all nodes are up and running before
proceeding.
When your current directory is the one in which you extracted the kit, type the following command to install the
files for the ELMC WCCProxy.
# setld -l kit
Do not run setld -D to direct the ELMC installation to a non-default directory. The default directory is required
for proper ELMC operation.
The kit will install and finish with no user prompting. When you are returned to the shell prompt (#), the install
has finished and the wccproxy process will be running.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 260 of 436
Chapter 19: Configuring Tru64 UNIX servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 261 of 436
Chapter 19: Configuring Tru64 UNIX servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 262 of 436
Chapter 20: Configuring NonStop Servers
Insight Remote Support supports NonStop systems, including HPE Integrity NonStop NS-series servers,
HPE Integrity NonStop BladeSystems, and HPE Integrity NonStop X-series servers. For details, see the
HPE Insight Remote Support Release Notes.
On NonStop systems, NonStop Open System Management (OSM) software performs problem diagnosis and
creates incident reports (IRs). OSM sends these IRs to Insight Remote Support, which in turn forwards them
on to HPE support.
Using Insight Remote Support in the NonStop environment involves requirements and configuration steps
specific to NonStop. For information on how to get started, see the Insight Remote Support for NonStop
document. It is available from the following location:
support.hpe.com/hpsc/doc/public/display?docId=c04623664.
Note: Insight RS supports discovering devices with TCP instead of the default ICMP for customers
whose security policies do not allow ICMP. For details, see the Help.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 263 of 436
Chapter 21: Configuring IBM servers
Insight Remote Support (RS) must be able to communicate with your IBM server before it can be monitored.
Insight RS can communicate with IBM servers running Windows with SNMP. The following information
describes how to install and configure the communication protocols and other recommended software
components so that it can be monitored by Insight RS.
Insight RS supports the following IBM servers:
l IBM System x™ (xSeries®)
l IBM BladeCenter® chassis and BladeCenter® servers
Note: Insight RS supports Microsoft Windows Server 2008 and 2008 R2 operating systems for IBM
servers.
Make sure Insight RS supports your IBM server by checking the HPE Insight Remote Support
Release Notes.
Configure the SNMP trap destination and SNMP read community string.
Add the device's Support Type and Support Identifier to the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 264 of 436
Chapter 21: Configuring IBM servers
2. In the Community name field, type the SNMP community name and click Add to list.
Important: The community name must match the community name as configured in the
Insight RS Console.
3. In the trap destinations field, add the Hosting Device to the list:
a. To open the SNMP Service Configuration window, click Add.
b. Type the host name or IP address of the Hosting Device.
c. Click Add.
4. Click the Security tab and verify that the community name was added to the list of Accepted community
names.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 265 of 436
Chapter 21: Configuring IBM servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 266 of 436
Chapter 21: Configuring IBM servers
Note: If a service processor is installed on the monitored server, complete the following steps:
1. To configure the service processor’s trap destination use the Management Processor
Assistant task in the IBM Director console.
2. Add the IP address of the Hosting Device as a trap destination.
3. Restart the service processor.
3. Select one of the unused items from the Name column. The Remote Alert Recipient page appears.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 267 of 436
Chapter 21: Configuring IBM servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 268 of 436
Chapter 21: Configuring IBM servers
9. In the MM Control section of the left menu, select Network Protocol. The Network Protocol page
appears.
10. Scroll down to SNMP.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 269 of 436
Chapter 21: Configuring IBM servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 270 of 436
Chapter 21: Configuring IBM servers
Note:
l To determine which service processors are installed on an IBM server, refer to the Implementing
Systems Management Solutions using IBM Director document at:
http://www.redbooks.ibm.com/redbooks/pdfs/sg246188.pdf
l A combined device driver for all service processors is available for each operating system at:
http://www.ibm.com/systems/support/.
l No additional driver is needed for servers that have only an ISM processor installed.
Upgrade the service processor firmware to the latest version to ensure that all features of the service
processors are available.
To install the IBM device drivers, complete the following steps:
1. Go to: www.ibm.com/systems/support.
2. From the top navigation bar, select Support & downloads.
3. From the Choose support type drop-down list, select System x.
4. From the Popular links list, select Software and device drivers.
5. Download and install the device driver for your server.
6. Reboot the server(if requested).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 271 of 436
Chapter 21: Configuring IBM servers
Important: For IBM BladeCenter® chassis the Product column is empty by default.
2. Click the Device Name and on the Device tab, type the following information:
Note: The HPE Account Support team must add the entitlement data for IBM servers in the
Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 272 of 436
Chapter 22: Configuring Dell PowerEdge
servers
Insight Remote Support (RS) must be able to communicate with your Dell PowerEdge server before it can be
monitored. Insight RS can communicate with Dell PowerEdge servers with SNMP. The following information
describes how to install and configure the communication protocols and other recommended software
components so that it can be monitored by Insight RS.
Note: Insight RS supports Microsoft Windows Server 2008 and 2008 R2 operating systems for Dell
PowerEdge servers.
Note: If you have a RAID controller installed on your system and you plan to install the storage
management function, ensure that the device drivers for each RAID controller are also installed.
Make sure Insight RS supports your Dell PowerEdge server by checking the HPE Insight Remote
Support Release Notes.
Configure the SNMP trap destination and SNMP read community string.
Add the device's Support Type and Support Identifier to the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 273 of 436
Chapter 22: Configuring Dell PowerEdge servers
2. In the Community name field, type the SNMP community name and click Add to list.
Important: The community name must match the community name as configured in the
Insight RS Console.
3. In the trap destinations field, add the Hosting Device to the list:
a. To open the SNMP Service Configuration window, click Add.
b. Type the host name or IP address of the Hosting Device.
c. Click Add.
4. Click the Security tab and verify that the community name was added to the list of Accepted community
names.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 274 of 436
Chapter 22: Configuring Dell PowerEdge servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 275 of 436
Chapter 22: Configuring Dell PowerEdge servers
Note: You can verify the device driver under Windows by right-clicking My Computer, selecting
Manage, and then clicking Device Manager.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 276 of 436
Chapter 22: Configuring Dell PowerEdge servers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 277 of 436
Chapter 22: Configuring Dell PowerEdge servers
1. In the Insight RS Console, verify the server appears on the Devices page.
Important: For Dell PowerEdge chassis the Product column is empty by default.
2. Click the Device Name and on the Device tab, type the following information:
Note: The HPE Account Support team must configure the entitlement data for Dell Windows
servers in the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 278 of 436
Chapter 23: Configuring BladeSystem c-Class
Enclosures
HPE BladeSystem c-Class Enclosures can be monitored by Insight Remote Support (RS). Configuring the
BladeSystem c-Class Enclosure only enables Insight RS to monitor the enclosure itself. The blades installed
in the BladeSystem c-Class Enclosure need to be configured separately to be monitored by Insight RS. See
"Identify required communication protocols and software components" on page 26 for information about
configuring your individual blade types.
HPE BladeSystem c-Class Enclosures can be monitored using the embedded management capabilities in the
OA or by configuring SNMP in the Onboard Administrator (OA) depending on the OA firmware level:
Important: Do not attempt to use both configuration methods on the same Hosting Device. This is
not supported and monitoring will not work correctly.
l Option 1: OA firmware level 3.60 or above supports the embedded management capabilities. Register
with an Insight Remote Support Hosting Device through the OA to send service events to the Hosting
Device. If you have configured a primary and standby OA in your environment, ensure that the firmware
version for both OAs is 3.60 or higher.
See "Register Remote Support through the Onboard Administrator" on page 281.
l Option 2: All OA firmware levels support connecting to Insight RS using SNMP. Configure the SNMP
protocol to send traps to the Hosting Device. If you have configured a primary and standby OA in your
environment, discover only one of the OAs and not both.
Important: FIPS Top Secret Mode and SNMP are not compatible. If you choose to use SNMP,
you must disable FIPS Top Secret Mode.
l OA firmware level prior to 3.55 requires the use of SNMP. Embedded management is not supported.
l OA firmware level 4.01 or above supports SNMPv3.
Important: Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs.
Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be at
least 8 characters long.
Note: If using OA firmware versions 3.55 or 3.56 HPE recommends you upgrade to version 3.60.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 279 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
2. OA firmware level prior to 3.55: If you have configured a primary and standby OA in your environment,
you should configure the SNMP protocol to send traps to the Hosting Device. Discovery from the Insight
Remote Support Hosting Device should be limited to one of the OAs and not both. If using a firmware
version older than 3.55, see "Configuring BladeSystem c-Class Enclosures using SNMP" on page 284.
Note: If using OA firmware versions 3.55 or 3.56 HPE recommends you upgrade to version 3.60.
The latest firmware software can be found on the HPE website at: www.hpe.com/support/oa.
Make sure Insight RS supports your BladeSystem c-Class enclosure by checking the HPE
Insight Remote Support Release Notes.
Verify the status of the BladeSystem c-Class enclosure in the Insight RS Console.
Send a test event to verify connectivity between your BladeSystem c-Class enclosure and Insight
RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 280 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
ICMP N/A Hosting Monitored Provides system reachability (ping) check Required
Device Systems during system discovery and before other
operations.
TCP 80 Hosting Onboard HTTP used for discovery and data collection. Required
Device Administrator
TCP 443 Hosting Onboard HTTPS used for discovery and data collection. Recommended
Device Administrator
TCP 7906 Onboard Hosting Secure HTTP (HTTPS) port used by the Required
Administrator Device listener running in the Director's Web
Interface. The monitored host connects to the
Hosting Device on this port (e.g.
https://<hostname>:7906).
Important: To address third-party software vulnerabilities, HPE recommends using iLO 4 2.03 or
later. To access the iLO 4 2.03 or later web interface, you must enable TLS in your browser. TLS is
the successor to Secure Sockets Layer (SSL).
Important: If using a primary and standby OA, ensure that the firmware version for both OAs is 3.60
or higher.
Important: When registering for Remote Support through the OA, make sure your trap destination
is set to the same Insight RS Hosting Device as you register with for Remote Support. When the
OA sends service events to the Hosting Device, it also generates SNMP traps that are sent to the
SNMP trap destination. The SNMP trap destination needs to be the same Insight RS Hosting
Device, otherwise duplicate events are reported to HPE.
Registering the enclosure does not register the individual blades installed in the enclosure. You need to
configure each blade separately.
To register for Remote Support through he OA, complete the following steps:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 281 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
1. In a web browser, log on to the HPE BladeSystem Onboard Administrator (https://<OA hostname or
IP address>).
2. Navigate to Enclosure Information → Enclosure Settings → Network Access, and click the
Protocols tab.
3. Make sure the Enable XML Reply check box is selected. If this check box is not selected, the OA
cannot be enabled in Insight RS.
4. Navigate to Enclosure Information → Enclosure Settings → Remote Support, and click the
Registration tab.
5. Click Register this enclosure through an HPE Insight Remote Support centralized hosting
device.
6. Type a host name or IP address.
7. In the Port field, type 7906.
8. Click Register.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 282 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
Note: Test events are automatically closed by HPE since no further actions are required.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 283 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
Important: Disabling the c-Class Enclosure in the Insight RS Console does not unregister the
device in the OA. For the OA to be aware that the device has been disabled, you must unregister the
in the OA instead of disabling the device in the Insight RS Console.
When the un-registration is finished, the Remote Support page shows the following message:
The enclosure is not registered.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 284 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
Make sure Insight RS supports your BladeSystem c-Class enclosure by checking the HPE
Insight Remote Support Release Notes.
Send a test event to verify connectivity between your BladeSystem c-Class enclosure and Insight
RS.
Important: Configuring the enclosure for remote support does not allow Insight RS to monitor the
blades installed in the enclosure. You need to configure each blade separately.
Important: If using a primary and standby OA, limit discovery to one of the OAs and not both.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 285 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
4. On the Settings tab, select the Enable SNMP check box and complete the following steps:
a. Add system location and contact information.
b. Set Read and Write community strings.
c. Click Apply.
5. Add an SNMP alert destination:
a. In the SNMP Alert Destinations section, click New.
b. In the Alert Destination field, type the IP address of the Hosting Device.
c. In the Community String field, type the SNMP community string for the Hosting Device.
d. Click Add Alert.
Important: If using a primary and standby OA, limit discovery to one of the OAs and not both.
Important: Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs.
Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be at least 8
characters long.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 286 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
4. On the Settings tab, select the Enable SNMP check box and complete the following steps:
a. Add system location and contact information.
b. Set Read and Write community strings.
c. Click Apply.
5. Create a user account to be used to send the SNMPv3 trap:
a. On the Users tab, click New.
b. In the User Name field, type a user name.
c. Select the Minimum Security required for operation: noAuthNoPriv, authNoPriv, authPriv. HPE
recommends authPriv. Your Minimum Security selection will alter what you enter for the remaining
steps of the configuration. For example, the noAuthNoPriv setting does not require a password for
either authentication or privacy. Note Minimum Security only applies to local users.
d. Select an Authentication Protocol: MD5 or SHA
e. In the Authentication Password field, type an authentication password. Confirm the password in
the next field.
f. Select a Privacy Protocol algorithm used to encrypt the trap: AES128, DES.
g. In the Privacy Password field, type a privacy password. Confirm the password in the next field.
6. Add an SNMP alert destination:
a. On the Settings tab, in the SNMP Alert Destinations section, click New.
b. In the Alert Destination field, type the IP address of the Hosting Device. Make sure you add the
SNMPv3 port: 1162. For example: <ip_address>:1162.
c. Select the SNMPv3 check box.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 287 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
d. In the User field, select the user account to be used to send the trap. This is the account created in
the previous step.
e. Select the Security level used to send the trap: noAuthNoPriv, authNoPriv, authPriv. Make sure
this matches the Minimum Security setting you selected for the user.
f. Click Add Alert.
ICMP N/A Hosting Monitored Provides system reachability (ping) check Required
Device Systems during system discovery and before other
operations.
TCP 80 Hosting Onboard HTTP used for discovery and data collection. Required
Device Administrator
TCP 443 Hosting Onboard HTTPS used for discovery and data collection. Recommended
Device Administrator
TCP 7906 Onboard Hosting Secure HTTP (HTTPS) port used by the Required
Administrator Device listener running in the Director's Web
Interface. The monitored host connects to the
Hosting Device on this port (e.g.
https://<hostname>:7906).
UDP 161 Hosting Onboard SNMP. This is the standard port used by Required
Device Administrator SNMP agents on monitored systems. The
Hosting Device sends requests to devices on
this port.
UDP 162 Onboard Hosting SNMP Trap. This is the port used by Insight Required*
Administrator Device RS to listen to SNMP traps.
UDP 1162 Onboard Hosting SNMPv3 Trap. This is the port used by Insight Required*
Administrator Device RS to listen to SNMPv3 traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 288 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
Option 2: SNMPv3
Create an SNMPv3 protocol credential in the Insight RS Console so Insight RS can communicate with your
device.
To configure SNMPv3 in the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Credentials tab.
3. From the Select and Configure Protocol drop-down list, select Simple Network Management Protocol
Version 3 (SNMPv3).
4. Click New. The New Credential dialog box appears.
5. Either use the default port of 161 or clear the Use default check box and type a new port number.
6. In the SNMP Account Credential fields, add:
a. Type the Username for the user on your device.
b. Select an Account Authentication Protocol: MD5 or SHA. Make sure these settings match what you
defined for the user in "Option 2: Configure SNMPv3" on page 286.
c. Type the Account Authentication Password.
d. Select an Account Privacy Protocol: DES, AES128. Make sure these settings match what you
defined for the user in "Option 2: Configure SNMPv3" on page 286.
e. Type the Account Privacy Passphrase.
f. Leave the Context Name blank.
7. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
Note: If there is an issue with HTTPS (SSL) communication, discovery will attempt to use HTTP to
discover the device.
To discover the device from the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Sources tab.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 289 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
3. Expand the IP Addresses section and add the IP address for your device:
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 290 of 436
Chapter 23: Configuring BladeSystem c-Class Enclosures
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 291 of 436
Chapter 24: Configuring Virtual Connect
Modules
HPE Virtual Connect Modules require SNMP for event monitoring and collections.
Make sure Insight RS supports your Virtual Connect Module by checking the HPE Insight
Remote Support Release Notes.
Configure SNMP in the HPE Virtual Connect Manager that manages your Virtual Connect
Modules.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 292 of 436
Chapter 24: Configuring Virtual Connect Modules
5. In the SNMP Trap Destinations section, add the trap destination for your Insight RS Hosting Device.
6. Click Apply.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 293 of 436
Chapter 24: Configuring Virtual Connect Modules
string or use a nonstandard port, you must create an SNMP protocol credential in the Insight RS Console.
To configure SNMP in the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Credentials tab.
3. From the Select and Configure Protocol drop-down list, select Simple Network Management Protocol
Version 1, V2C (SNMPv1, SNMPv2C).
4. Click New. The New Credential dialog box appears.
5. Type the Community String you have configured on your device.
6. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 294 of 436
Chapter 24: Configuring Virtual Connect Modules
Collection Services → Collection Schedules tab. For more information about scheduling collections, see the
Insight RS Help.
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the Basic Collection Results tab.
3. Expand the Server Basic Configuration Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 295 of 436
Chapter 25: Configuring P6000 and
Enterprise Virtual Arrays
The P6000 Command View server can be either a standalone server with the Command View and SMI-S
software installed (referred to as Server Based Management - SBM) or it can be built in to the EVA device
itself, referred to as Array Based Management ABM.
l To configure a P6000 or EVA using Server Based Management, see "Configuring P6000 and Enterprise
Virtual Arrays using Server Based Management" below
l To configure a P6000 or EVA using Array Based Management, see "Configuring P6000 and Enterprise
Virtual Arrays using Array Based Management" on page 309
Important: HP P6000 Command View 10.3.8 introduced the ability to disable TLS 1.0 and 1.1
protocols, but Insight RS does not support TLS 1.2 exclusive access. For more information, see the
HP P6000 Command View Suite User Guide at: www.hpe.com/support/hpesc.
Note: HPE highly recommends that you enable the Email Adapter on the Administrator Settings
→ Integration Adapters tab and, at the minimum, select the following notifications: Case Opened,
Application Failure, Entitlement Expiration, and Device Change.
Make sure Insight RS supports your P6000 disk array by checking the HPE Insight Remote
Support Release Notes.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 296 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
Table 25.1 P6000 and Enterprise Virtual Array using SBM configuration steps, continued
Task Complete?
Verify HP P6000 Command View is installed and configured on the management server.
Create a protocol credential in the Insight RS Console for the management server.
Verify the EVA's warranty and contract information in the Insight RS Console.
Send a test event to verify connectivity between your EVA and Insight RS.
Note: A P6000 Command View standard installation is the preferred baseline for Insight RS
supportability.
Insight RS supports two options for where P6000 Command View can be installed:
l Installed on a separate management server.
l Installed on the Insight RS Hosting Device, coexisting with the Insight RS software. Environments with
multiple instances of P6000 Command View can have one instance on the Hosting Device and other
instances of P6000 Command View on other monitored devices.
Multiple instances of P6000 Command View can share the management role of common attached EVA arrays
in the environment. This can be for the purpose of fault tolerance or load balancing, for example. Although
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 297 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
there can be multiple instances of P6000 Command View capable of managing the EVA array, only one
instance of P6000 Command View can be the active manager of that array. Other instances of P6000
Command View that are not active in managing the array are considered to be passive.
Caution: Removing SMI-S from a host system also forces the removal of Command View for Tape
Libraries (TL). The version of Command View TL must match the firmware used in the tape library.
If the version of SMI-S installed by Command View TL is older than the one being used by P6000
Command View, then install or upgrade P6000 Command View after Command View TL to avoid a
conflict.
Additionally, the credentials used by each software application are overwritten by the other when it
installs. Therefore, use the same account for both.
Refer to the following P6000 Command View documentation for setting up your management server and
array. Documentation is available at: www.hpe.com/support/hpesc. Search for P6000 Command View
Software.
l HP P6000 Command View Suite Installation Guide
l HP P6000 Command View Suite Release Notes
l HP P6000 Enterprise Virtual Array Compatibility Reference
This document contains EVA system and hardware requirements. Refer to the following two tables in the
document: Table 4.1 Supported software on management servers and the management module and Table
4.2 Supported EVA software operating environments.
l Also see the P6000 Command View Software - Overview at:
h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c03045333.
P6000 Command View management server system and access requirements
The management server requires the following access:
l Supported versions of P6000 Command View use a secure logon design.
l A Microsoft Windows account with the correct group privilege is required to access P6000 Command
View.
During the installation of P6000 Command View, you are required to create to new groups on the system: HP
Storage Admins (write access) and HP Storage Users (read access). P6000 Command View credentials are
required when setting up Insight RS; verify that you have this information.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 298 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
Note: This example uses the port value of 6989. Your environment may require a different port.
Using the netstat –a command from Command Prompt window will show your current port
assignments.
1. Stop the Pegasus WMI Mapper Service using the Windows Services API.
a. Select Start and Run, in the run field type services.msc.
b. Click OK.
c. Find and stop the Pegasus WMI Mapper service.
2. Using a text editor, add the variable httpsPort=6989 to the C:\Program Files\The Open Group\WMI
Mapper\cimserver_planned.conf file.
3. Restart the Pegasus WMI Mapper service in the Windows Services API.
4. Run the netstat –a command from Command Prompt window and verify that wmiservice.exe is
listening on port 6989.
a. Select Start and Run.
b. Type cmd.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 299 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
Note: This example uses the port value of 6989. Your environment may require a different port.
Using the netstat –a command from Command Prompt window will show your current port
assignments.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 300 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 301 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
To install, remove, or update ELMC, the user ID must be one of the following:
l A member of the Administrators group on the server
l A member of a group that is a member of the Administrators group on the server. For example, if your user
ID is a Domain Admin, and you have added Domain Admins to the Administrator group on the local
machine, then you have the necessary permissions. To add Domain Administrators to the local
Administrator group, use the specific procedure relevant to your operating system.
Install ELMC
ELMC must be installed on the management server to allow access to logged event data from the array.
ELMC is required on the management server so that events can be forwarded to Insight RS.
If ELMC is already installed on the management server, make sure it is version 6.2 or later. If it's older than
version 6.2, it needs to be upgraded. To check the version of ELMC, run the following command from a
Command Prompt window: wccproxy version.
Note: When upgrading to ELMC version 6.4, the incorrect version number is displayed in the
upgrade window. After performing the upgrade, the correct version number of 6.4 will show in the
Programs and Features window and when you run the wccproxy version command.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 302 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
Important: Real Time Event Data and communication to the array is only capable when there is a
connection to the P6000 Command View instance that is the active manager of the array. In order to
configure a monitored device, you must install ELMC on any server that is running P6000 Command
View that is capable of being the active manager of the array. Any P6000 Command View instance
that is not the active manager of an EVA is considered to be a passive instance of P6000 Command
View. Historic Event Data may be present on a passive instance if it had been the active manager in
the past. This event data may be of use for manual analysis.
Event data for the EVA is only delivered to the P6000 Command View server that is actively
managing the array. However, you should also install ELMC on any server that is running P6000
Command View that is capable of being an active manager of an array of EVA devices. Any P6000
Command View instance that is not currently actively managing an EVA is called a passive
instance of P6000 Command View.
A passive instance of P6000 Command View can see the array but cannot communicate with it.
Only the active management instance is capable of communicating with the array. This is why you
may see the array discovered but missing information about the array in some components.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
TCP 2372 Hosting P6000/EVA P6000/EVA CommandView - Storage Collections for Required
Device EVA (HTTPS).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 303 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
TCP 2374 Hosting P6000/EVA P6000/EVA Command View 10.x - Storage Collections Required
Device for P6000/EVA Array Based Management.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end point
nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener running Required
Systems Device in the Director's Web Interface. The monitored host
connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
TCP 7920 Hosting Monitored The Insight RS ELMC (formerly WCCProxy) process Required
Device Systems communicates with the Director on this port. This is a
proprietary protocol. Any connections that exchange
username and passwords use SSL. Not all connections
are SSL.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Optional
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Optional
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 304 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
HPE recommends also creating credentials for the server that the P6000 Command View software is running
on.
Important: When a new EVA array is added to an Insight RS environment that is already
configured, a manual Discovery of the server running P6000 Command View that is managing the
new array is required in order to detect the new EVA's warranty and contract information.
To discover the device from the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Sources tab.
3. Expand the IP Addresses section and add the IP address for your management server:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 305 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 306 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 307 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 308 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
Important: The ABM Fully Qualified Domain Name must not be the same as the EVA array name.
Insight RS has no way to differentiate between two devices that have the same name.
Make sure Insight RS supports your P6000 disk array by checking the HPE Insight Remote
Support Release Notes.
Add the device's Support Type and Support Identifier to the Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 309 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 2372 Hosting P6000 ABM P6000/EVA Command View - Storage Collections for Required
Device EVA (HTTPS).
TCP 2373 Hosting P6000 ABM P6000/EVA Command View 9.x - Storage Collections Required
Device for P6000/EVA Array Based Management.
TCP 2374 Hosting P6000 ABM P6000/EVA Command View 10.x - Storage Required
Device Collections for P6000/EVA Array Based
Management.
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over HTTPS/SOAP. Required
Device Systems This port is used to communicate with WBEM end
point nodes.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The
monitored host connects to the Hosting Device on
this port (e.g. https://<hostname>:7905).
TCP 7906 Array Based Hosting Secure HTTP (HTTPS) port used by the listener Required
Management Device running in the Director's Web Interface. The
Module monitored host connects to the Hosting Device on
this port (e.g. https://<hostname>:7906).
TCP 7920 Hosting Monitored The Insight RS ELMC (formerly WCCProxy) process Required
Device Systems communicates with the Director on this port. This is a
proprietary protocol. Any connections that exchange
username and passwords use SSL. Not all
connections are SSL.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP Optional
Device Systems agents on monitored systems. The Hosting Device
sends requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to Optional
Systems Device listen to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 310 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 311 of 436
Chapter 25: Configuring P6000 and Enterprise Virtual Arrays
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 312 of 436
Chapter 26: Configuring StoreVirtual P4000
Storage systems
HPE Insight Remote Support software delivers secure remote support for your HPE servers, storage,
network, and SAN environments, which includes the P4000 SAN.
Note: HPE StoreVirtual Storage is the new name for HPE LeftHand Storage and HPE P4000 SAN
solutions. LeftHand Operating System (LeftHand OS) is the new name for SAN/iQ.
Important: Each P4000 Storage Node counts as 30 monitored devices within Insight RS.
Important: For every 100 P4000 devices being monitored by Insight RS, add 1 GB of free disk
space to the Hosting Device requirements.
P4000 documentation is available at: www.hpe.com/support/hpesc. Search for LeftHand P4000 SAN
Solutions.
Make sure Insight RS supports your P4000 Storage System by checking the HPE Insight Remote
Support Release Notes.
Add the P4000 SAN Solution (SAN/iQ) protocol to the Insight RS Console.
Send a test event to verify connectivity between your P4000 Storage System and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 313 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
100 MB RAM during run-time 150 MB disk space for complete install
Note: CMC can be installed on the Hosting Device or it can be install on a separate system. If CMC
is already installed on another system, it does not need to be installed on the Hosting Device.
Install the centralized management console (CMC) on the computer that you will use to administer the SAN.
You need administrator privileges while installing the CMC.
1. Insert the P4000 Management SW DVD in the DVD drive. The installer should launch automatically. Or,
navigate to the executable (:\GUI\Windows\Disk1\InstData\VM\CMC_Installer.exe)
Or download CMC at:
h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumber=StoreVirtualSW.
Click the Complete install option, which is recommended for users that use SNMP.
Note: If you already have Service Console installed, you don't need to disable it. Insight
Remote Support can co-exist with Service Console without conflict.
2. Use the Find Nodes wizard to discover the storage systems on the network, using either IP addresses or
host names, or by using the subnet and gateway mask of the storage network.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 314 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
The found storage systems appear in the available category in the CMC.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 315 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Use CMC to upgrade to LeftHand OS 9.5 or higher (LeftHand OS 11.0 is recommended) on the P4000 Storage
Systems. If your P4000 Storage Systems already has LeftHand OS 9.5 installed, you do not need to perform
this procedure.
Note: For LeftHand OS 9.5 devices, Patch Set 05 is required for all devices.
CMC version 9.0 and higher provide the option to download LeftHand OS upgrades and patches from HPE.
Once the current upgrades and patches are downloaded from HPE to the CMC system, CMC can be used to
update Management Groups or nodes with these changes.
When you upgrade the LeftHand OS software on a storage node, the version number changes. Check the
current software version by selecting a storage node in the navigation window and viewing the Details tab
window.
Note: Directly upgrading from LeftHand OS 9.5 to LeftHand OS 12.5 is not supported.
Important: When installing/upgrading LeftHand OS, do not modify the default SNMP settings. The
default settings are used by Insight Remote Support, and communication between the P4000
Storage System and the Hosting Device will not function properly if the SNMP settings are
modified. SNMP is enabled by default in LeftHand OS. In CMC 9.0 and higher, SNMP traps are
modified at the Management Group level, not at the node level.
l Remote Copy — If you are upgrading management groups with Remote Copy associations, you should
upgrade the remote management groups first. If you upgrade the primary group first, Remote Copy may
stop working temporarily, until both the primary management group and the remote group have finished
upgrading. Upgrade the primary site immediately after upgrading the remote site. Refer to "How to Verify
Management Group Version".
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 316 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Caution: Do not select "Simultaneous (advanced)" if your storage nodes are in a production cluster.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 317 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Note: These instructions apply to VMware ESX Server. Other VMware products have similar
instructions for extending a virtual disk. Please consult the appropriate VMware documentation for
the product you are using.
To increase the OS disk size on the VSA, complete the following steps:
1. Using the CMC, power off the VSA.
2. Open the VI Client and select VSA → Edit Settings → Hardware.
3. Select Hard disk 1 (verify that the Virtual Device Node is SCSI (0:0)).
4. Under Disk provisioning, changed the provisioned size to 8 GB.
5. Click OK.
6. Repeat these steps for Hard disk 2 (verify the Virtual Device Node is SCSI (0:1))
7. Using the VI Client, power on the VSA.
8. Find the VSA in the CMC and apply the upgrade.
Verify management group version
l When upgrading from version LeftHand OS 7.x to release 9.5 or higher, the management group version will
not move to the new release version until all storage nodes in the management group (and in the remote
management group if a Remote Copy relationship exists) are upgraded to release LeftHand OS 9.5 or
higher.
l When upgrading from LeftHand OS version 7.x to release 9.5 or higher, the upgrade process validates the
hardware identity of all of the storage nodes in the management group. If this validation fails for any reason,
the management group version will not be upgraded to 9.5 or higher. For example, if a management group
has a mix of platforms, some of which are unsupported by a software release; then only the supported
platforms get upgraded successfully, the management group version will not be upgraded if the
unsupported platforms remain in that management group.
To verify the management group version, complete the following steps:
1. In the CMC navigation window, select the management group, and then select the Registration tab. The
management group version number is at the top of the Registration Information section, as shown in
figure "Verifying the management group version number" below.
Figure 26.3 Verifying the management group version number
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 318 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Note: For LeftHand OS Management Groups, users can configure the Hosting Device trap host
destination P4000 CLI createSNMPTrapTarget command instead of using CMC. The
getGroupInfo command will show the current SNMP settings and SNMP trap host destinations
configured at the Management Group level.
Note: If using the P4000 CLI (CLIQ) createSNMPTrapTarget or getGroupInfo commands, the
path environment variable is not updated when the P4000 CLI is installed with Insight RS. You will
need to use the full path for the P4000 CLI, which is [InsightRS_Installation_Folder]\P4000.
To verify and/or update your SNMP settings, complete the following steps:
1. Open CMC.
2. Verify that SNMP is enabled for each storage system:
Note: LeftHand OS ships by default with SNMP enabled for all storage systems and
configured with the "Default" Access Control list.
Note: LeftHand OS Management Groups configure the Hosting Device SNMP trap host
destination once at the Management Group level. With LeftHand OS, you can configure
different severity Alert levels to send from the Management Group. Under Insight Remote
Support, configure each Management Group to send v1 SNMP traps of Critical and Warning
levels in Standard message text length.
a. Select SNMP in the left menu tree and open the SNMP General tab.
b. Verify that the Agent Status is enabled.
c. Verify that the P4000 Storage System SNMP Community String is set to public or the same value
configured in the Insight RS Console for SNMP discovery.
d. In the Access Control field, verify that either Default is listed or the Hosting Device host IP address
is listed. The Default option configures SNMP to be accessed by the public community string for
all IP addresses.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 319 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Note: The SNMP settings on the P4000 Storage Systems need to match the SNMP
settings on the Hosting Device.
3. Select Alerts in the left menu tree, and verify that alerts are configured with the "trap" option for each
storage system.
Note: LeftHand OS ships by default with traps set for all alert cases.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 320 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
4. Add the Hosting Device IP address to the P4000 Storage System's SNMP trap send list. The Hosting
Device IP address is needed to configure SNMP traps on each storage system. Note that in CMC 9.0
and higher, SNMP traps are configured at the Management Group level, not at the node level.
a. Select SNMP in the left menu tree and open the SNMP Traps tab.
b. Open the Edit SNMP Traps dialog by browsing to SNMP Trap Tasks → Edit SNMP Traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 321 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
5. Repeat steps 3 to 4 for each P4000 Storage System. Alternatively, you could also configure one node
using steps 3 to 4, then use the CMC copy node configuration option to copy the configuration to all other
nodes.
6. Add an additional CMC user with read-only credentials. This is recommended if you don't want to have
the Hosting Device system administrator to have create/delete control of the storage systems.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 322 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
b. Create a user group with read-only access, if one does not already exist. Browse to Administrative
Tasks → New Group.
c. Create a new user. First select the group you created in the previous step, then go to Administrative
Tasks → New User. Type the User Name, Password, and click Add to add this user to the read-
only user group you created.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 323 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 5989 CMC (can Monitored P4000 Centralized Management Console (CMC). Required
be running Systems
on Hosting
Device)
TCP 5989 Hosting Monitored Remote Support P4000 Integration Module - P4000 Required
Device Systems CLI API.
TCP 7905 Monitored Hosting Secure HTTP (HTTPS) port used by the listener Required
Systems Device running in the Director's Web Interface. The monitored
host connects to the Hosting Device on this port (e.g.
https://<hostname>:7905).
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP Required
Device Systems agents on monitored systems. The Hosting Device
sends requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to Required
Systems Device listen to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 324 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 325 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Note: When discovering new P4000 devices, do not include any P4000 Management
Group Virtual IP (VIP) addresses. VIP addresses are created when you create and
configure P4000 clusters. Instead, discover P4000 devices using individual IP addresses,
or create IP discovery ranges excluding all P4000 VIP addresses.
If you do discover a P4000 VIP address, you should delete the managed entity for the VIP
address from Insight Remote Support Advanced before running any collections or
capturing any test traps. After deleting the VIP address entity, re-discover the node using
the actual IP address for the P4000 device.
d. Click Add.
4. Click Start Discovery.
Note: Insight RS filters out iLO 4 but not iLO 2 or iLO 3 devices. If an iLO 2 or iLO 3 device is
discovered, manually deleted them on the Device Details screen.
Verify discovery
To verify the P4000 was discovered correctly, complete the following steps:
1. Verify that the appropriate protocols have been assigned to the P4000 device:
a. In the Insight RS Console, navigate to Devices and click the P4000 Device Name.
b. On the Credentials tab, verify that verify that the P4000 SAN Solution (SAN/iQ) and SNMPv1
protocols have been assigned to the device.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 326 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Note: In CMC, SNMP traps are configured at the Management Group level, not at the node level.
Go to Hosting Device configurations to verify that the test event was posted to the Hosting Device logs. The
CMC read-only credentials were verified during device discovery when each LeftHand OS device was added
to Hosting Device monitored listed.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 327 of 436
Chapter 26: Configuring StoreVirtual P4000 Storage systems
Collection Services → Collection Schedules tab. For more information about scheduling collections, see the
Insight RS Help.
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the Basic Collection Results tab.
3. Expand the P4000 Family Configuration Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 328 of 436
Chapter 27: Configuring P2000 G3, MSA
1040/2040/2050 storage
Fulfill configuration requirements
To configure your P2000 G3, MSA 1040, MSA 2040, and MSA 2050 storage to be monitored by Insight RS,
complete the following sections:
Table 27.1 P2000, MSA 1040, MSA 2040, and MSA 2050 configuration steps
Task Complete?
Make sure Insight RS supports your MSA by checking the HPE Insight Remote Support Release
Notes.
Note: For basic information about setting up this tool and managing your credentials, consult
the MSA Storage Management Utility documentation at: www.hpe.com/support/hpesc.
2. Once you have logged into the utility, select Configuration → Services → Management.
3. Make sure that SNMP is selected from the Network Management Services list and click Apply.
Important: SNMP should be active by default. If for any reason it is not active, Insight Remote
Support will not be supported. It is critical to verify SNMP is active.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 329 of 436
Chapter 27: Configuring P2000 G3, MSA 1040/2040/2050 storage
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 330 of 436
Chapter 27: Configuring P2000 G3, MSA 1040/2040/2050 storage
Important: The user you configure for the P2000 must also have access to SMI-S. By default users
only have access to the WBI and CLI. You must modify the user to include SMI-S or collections will
fail.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 331 of 436
Chapter 27: Configuring P2000 G3, MSA 1040/2040/2050 storage
Important: In a dual-controller system, you must discover both controller A and controller
B if both exist. If you do not discover both controllers, events that originate from the
controller that was not discovered could be lost.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 332 of 436
Chapter 27: Configuring P2000 G3, MSA 1040/2040/2050 storage
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 333 of 436
Chapter 28: Configuring StoreEasy Storage
systems
Insight Remote Support (RS) requires WMI to be installed and configured on your StoreEasy Storage system
(formerly Network Storage Systems) in order for Insight RS to communicate with your device for discovery,
event monitoring, and collections.
WMI comes pre-installed on StoreEasy Storage systems. No additional configuration of WMI is necessary.
However, you must add the WMI protocol credentials in the Insight RS Console for Insight RS to
communicate with your device.
Check the HPE Insight Remote Support Release Notes to make sure your StoreEasy Storage
system is supported.
Send a test event to verify connectivity between your StoreEasy Storage system and Insight RS.
Configure firewall
StoreEasy devices ship with Windows Firewall with Advanced Security enabled. To allow WMI through the
Windows Firewall, you must enable additional inbound and outbound rules.
To configure Windows Firewall on the StoreEasy device, complete the following steps:
1. Open the Windows Firewall from the Server Manager.
2. Click on the Tools menu.
3. Select Windows Firewall with Advanced Security.
4. Select the Inbound Rules link from the left menu and make sure the following inbound rules are enabled:
l File and Printer Sharing (Echo Request - ICMPv4-In)
l Windows Management Instrumentation (DCOM-In)
l Windows Management Instrumentation (WMI-In)
5. Select the Outbound Rules link from the left menu and make sure the following outbound rules are
enabled:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 334 of 436
Chapter 28: Configuring StoreEasy Storage systems
Note: You can confirm which protocols discovery associated with the StoreEasy device by clicking
the StoreEasy device name on the Devices screen, and then selecting the Credentials tab.
Confirm that WMI is one of the discovered credentials. SNMP should not be among the discovered
credentials.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 335 of 436
Chapter 28: Configuring StoreEasy Storage systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 336 of 436
Chapter 28: Configuring StoreEasy Storage systems
5. In the Send Test Indication screen, select an Event ID type (any will work) and click Send.
Verify collections
Collections are not automatically run after discovery. HPE recommends that you manually run a collection
after discovery completes in order to verify connectivity. Run the collection schedule manually on the
Collection Services → Collection Schedules tab. For more information about scheduling collections, see the
Insight RS Help.
Also note that StoreEasy Storage systems use Server Basic Configuration Collections rather than Storage
Configuration Collections.
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 337 of 436
Chapter 28: Configuring StoreEasy Storage systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 338 of 436
Chapter 29: Configuring StoreAll Storage
systems
Note: HPE StoreAll Storage is the new name for HPE IBRIX Storage.
Make sure Insight RS supports your StoreAll Storage system by checking the HPE Insight
Remote Support Release Notes.
Send a test event to verify connectivity between your StoreAll Storage system and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 339 of 436
Chapter 29: Configuring StoreAll Storage systems
2. To add more than one SNMP Manager IP, copy the following lines:
rwcommunity public <Manager IP>
rocommunity public <Manager IP>
trapsink <Manager IP> public
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 340 of 436
Chapter 29: Configuring StoreAll Storage systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 341 of 436
Chapter 29: Configuring StoreAll Storage systems
l Type the X9000 enclosure product number as the Override Product Number
l Type MC DATACENTER or MC HYPERSCALE as the Custom Delivery ID
On the Device tab, in the Warranty & Contract section:
l Type the appropriate Support Type and Support Identifier
l Custom field settings for MSA Storage Management Utility
Configure SNMP settings on the MSA Storage Management Utility section. (For more information, see
“Configuring SNMP event notification in SMU” in the 2300 Modular Smart Array Reference Guide at:
www.hpe.com/support/hpesc.)
A Modular Storage Array (MSA) unit should be discovered with its IP address. Once discovered, locate the
Entitlement Information section of the Contract and Warranty Information page and update the following:
l Type MC DATACENTER or MC HYPERSCALE as the Custom Delivery ID
l Type the appropriate Support Type and Support Identifier
Note: For storage support on X9300 systems, do not set the Custom Delivery ID. (The MSA is an
exception; the Custom Delivery ID is set as previously described.)
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 342 of 436
Chapter 29: Configuring StoreAll Storage systems
For Insight Remote Support, replace the Hosting Device IP address with the IP address of the Insight Remote
Support server.
Verify collections
Collections are not automatically run after discovery. HPE recommends that you manually run a collection
after discovery completes in order to verify connectivity. Run the collection schedule manually on the
Collection Services → Collection Schedules tab. For more information about scheduling collections, see the
Insight RS Help.
Also note that StoreAll Storage systems use Server Basic Configuration Collections rather than Storage
Configuration Collections.
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the Basic Collection Results tab.
3. Expand the Server Basic Configuration Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 343 of 436
Chapter 30: Configuring StoreOnce Backup
(D2D) systems
Fulfill configuration requirements
To configure your StoreOnce Backup (D2D) systems to be monitored by Insight RS, complete the following
sections:
Table 30.1 StoreOnce Backup (D2D) system configuration steps
Task Complete?
Make sure Insight RS supports your StoreOnce Backup (D2D) System by checking the HPE
Insight Remote Support Release Notes.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 344 of 436
Chapter 30: Configuring StoreOnce Backup (D2D) systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 345 of 436
Chapter 30: Configuring StoreOnce Backup (D2D) systems
5. Check that the current SNMP configuration shows the trap destination that you just configured by using:
snmp show config.
6. Type exit to log off.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 346 of 436
Chapter 30: Configuring StoreOnce Backup (D2D) systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 347 of 436
Chapter 31: Configuring Virtual Library
Systems
Fulfill configuration requirements
To configure your Virtual Library Systems to be monitored by Insight RS, complete the following sections:
Table 31.1 Virtual Library System configuration steps
Task Complete?
Make sure Insight RS supports your Virtual Library System by checking the HPE Insight Remote
Support Release Notes.
Send a test event to verify connectivity between your Virtual Library System and Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 348 of 436
Chapter 31: Configuring Virtual Library Systems
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 349 of 436
Chapter 31: Configuring Virtual Library Systems
If you have the latest VLS firmware and the latest version of Command View VLS, click the Test SNMP
button on the Command View VLS SNMP configuration page to perform an end-to-end test. This test event
will not result in a case being created at HPE, but it will create a local email notification to confirm that the VLS
SNMP and Insight Remote Support is configured correctly.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 350 of 436
Chapter 32: Configuring StoreEver Tape
Libraries
HPE’s physical tape libraries require a combination of their own web-based management interfaces and
aggregated HPE Command View for Tape Libraries (TL) library management software to work with Insight
Remote Support (RS). Users configure each library to send SNMP traps for hardware events, such as fan
failures, directly to the Insight RS server. Users configure Command View TL to send TapeAssure events
over SMI-S such as poor drive margin. You need to discover Command View TL and the libraries separately.
Make sure Insight RS supports your tape library by checking the HPE Insight Remote Support
Release Notes.
Configure Command View TL TapeAssure. Note that Command View TL supplies the WBEM
protocol for configuration collection support.
Configure SNMPv1 traps on each tape library with the Hosting Device as the trap destination.
Add the WBEM protocol to the Insight RS Console (for ESL and EML).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 351 of 436
Chapter 32: Configuring StoreEver Tape Libraries
Note: HPE recommends you use the latest version of Command View TL. Download the update at:
www.hpe.com/support/cvtl.
Important: Select Custom Installation to make sure the Command View TL SMI-S provider is
installed.
Use the following procedure to configure Command View TL to allow Insight RS to register for TapeAssure
events for Command View TL.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 352 of 436
Chapter 32: Configuring StoreEver Tape Libraries
window.
Important: TapeAssure can also monitor standalone tape drives (those not in a tape library) and a
host name appears instead of a library name; however, standalone drives cannot be configured for
Insight RS.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 353 of 436
Chapter 32: Configuring StoreEver Tape Libraries
3. In the left panel, select SNMP Alerts. The current SNMP traps appear in the right panel.
5. In the Trap Destination field, type the Hosting Device IP address or Fully Qualified Domain Name
(FQDN).
6. Type public as the Community String unless you have defined another community string.
7. Click OK.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 354 of 436
Chapter 32: Configuring StoreEver Tape Libraries
Note: Library health events are monitored with SNMP only. You do not need to enable SMI-S
unless it is required for other Network Management software.
4. Click OK.
5. In the console, go to Setup → Notifications → SNMP Trap Registration.
6. In the SNMP Trap Registration screen, create an SNMPv1 trap, port 162 entry for the IP address of the
Hosting Device. Use public for the community name. Click Create.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 355 of 436
Chapter 32: Configuring StoreEver Tape Libraries
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 356 of 436
Chapter 32: Configuring StoreEver Tape Libraries
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 357 of 436
Chapter 32: Configuring StoreEver Tape Libraries
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
TCP 2301 Customer's Hosting SMH port for Insight Manager Web Agents; HTTP Optional
Web Device redirected to 2381 (HTTPS). (Recommend using
Browser TCP/2381.)
TCP 2381 Hosting Monitored SMH port for Insight Manager Web Agents; Recommended
Device Systems HTTPS redirected to 2381 (HTTPS).
TCP 5989 Hosting Monitored Secured WBEM CIMOM protocol over Required
Device Systems HTTPS/SOAP. This port is used for basic
collections on HPE StoreEver ESL and EML
devices.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP Required
Device Systems agents on monitored systems. The Hosting
Device sends requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to Required
Systems Device listen to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 358 of 436
Chapter 32: Configuring StoreEver Tape Libraries
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 359 of 436
Chapter 32: Configuring StoreEver Tape Libraries
Important: After discovery, the CVTL@<device> that Insight RS lists will always display an error
icon ( ) in the Warranty & Contract and status column.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 360 of 436
Chapter 32: Configuring StoreEver Tape Libraries
Insight RS Help.
Verify that this collection ran successfully on the Collection Services → SAN Storage Collection Results tab
in the Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the SAN Storage Collection Results tab.
3. Expand the Storage Configuration Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 361 of 436
Chapter 33: Configuring StoreFabric B-Series
switches
Fulfill configuration requirements
To configure your StoreFabric B-Series switches to be monitored by Insight RS, complete the following
sections:
Note: Test trap support for B-series SAN switches requires the installation of Fabric Operating
System v6.3.0b firmware or higher. For more details, refer to the HPE Fabric OS 6.3.0b Customer
Advisory at: http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01924282.
Note: Telnet or SSH is required for configuration collection support. Telnet and SSH are enabled by
default on StoreFabric B-Series switches.
Make sure Insight RS supports your B-Series switch by checking the HPE Insight Remote
Support Release Notes.
Send a test event to verify connectivity between your B-Series switch and Insight RS.
Configure SNMP
You can use SNMPv1 or SNMPv3 to monitor your B-Series switches. Follow the steps in one of the options
below to configure SNMP on your switch.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 362 of 436
Chapter 33: Configuring StoreFabric B-Series switches
Note: The trap severity level is associated with each trap recipient IP address. The event trap
level is in conjunction with the event's severity level. When an event occurs and if its severity
level is at or below the set value, the SNMP event traps (swEventTrap, swFabricWatchTrap,
and connUnitEventTrap) are sent to the trap recipients.
By default, this value is set to 0, implying that no such traps are sent. The possible values are the
following:
l 0 none
l 1 critical
l 2 error
l 3 warning
l 4 informational
l 5 debug
3. Display the new settings:
> snmpconfig --show snmpv1
SNMPv1 community and trap recipient configuration:
Community 1: gcc-public (rw) Trap recipient: 1.2.3.4 Trap port: 162 Trap recipient
Severity level: 2
Community 2: public (rw) No trap recipient configured yet
Community 3: public (rw) No trap recipient configured yet
Community 4: public (ro) No trap recipient configured yet
Community 5: common (ro) No trap recipient configured yet
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 363 of 436
Chapter 33: Configuring StoreFabric B-Series switches
5. Remove the remaining IP address from the SNMP Access Control List if required:
> snmpconfig --set accesscontrol
SNMP access list configuration:
Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [false]
f
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [false]
f
Access host subnet area : [0.0.0.0] Read/Write? (true, t, false, f): [false]
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [true] f
Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [true] f
Committing configuration...done.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 364 of 436
Chapter 33: Configuring StoreFabric B-Series switches
8. Display the IP address of the switch, so it can be added to the Insight RS Console:
> ipaddrshow
SWITCH Ethernet IP Address: 1.2.3.4
Ethernet Subnetmask: 1.2.3.4
Fibre Channel IP Address: none
Fibre Channel Subnetmask: none
Gateway IP Address: 1.2.3.4
DHCP: Off
Important: HPE Insight RS supports the secure SNMPv3 protocol on B-Series switches that
support SNMPv3. Insight RS only supports SNMPv3 traps, and does not support SNMPv3
Informs. Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be
at least 8 characters long. Refer to your device's documentation to determine the versions of SNMP
your device supports.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 365 of 436
Chapter 33: Configuring StoreFabric B-Series switches
To configure SNMPv3, complete the following steps. Example responses are shown in red.
1. Using PuTTY or suitable SSH access tool, SSH to the switch and login as an Administrator user.
2. Disable SNMPv1 using the following command:
#snmpconfig –disable snmpv1
3. Configure MIB capability on the switch to enabled the HA MIB and HA TRAPS:
#snmpconfig –set mibcapability
FE-MIB (yes, y, no, n): [yes] <return>
SW-MIB (yes, y, no, n): [yes] <return>
FA-MIB (yes, y, no, n): [yes] <return>
FICON-MIB (yes, y, no, n): [no] <return>
HA-MIB (yes, y, no, n): [no] Yes; if already Yes then <return>
FCIP-MIB (yes, y, no, n): [no] <return>
IF-MIB (yes, y, no, n): [yes] <return>
BD-MIB (yes, y, no, n): [yes] <return>
BROCADE-MAPS-MIB (yes, y, no, n): [yes] <return>
T11-FC-ZONE-SERVER-MIB (yes, y, no, n): [no] <return>
SW-TRAP (yes, y, no, n): [yes] <return>
swFCPortScn (yes, y, no, n): [yes] <return>
swEventTrap (yes, y, no, n): [yes] <return>
DesiredSeverity: (0..4) [0] <return>
swIPv6ChangeTrap (yes, y, no, n): [yes] <return>
swPmgrEventTrap (yes, y, no, n): [yes] <return>
swFabricReconfigTrap (yes, y, no, n): [no] <return>
swFabricSegmentTrap (yes, y, no, n): [no] <return>
swExtTrap (yes, y, no, n): [yes] <return>
swStateChangeTrap (yes, y, no, n): [no] <return>
swPortMoveTrap (yes, y, no, n): [no] <return>
swBrcdGenericTrap (yes, y, no, n): [no] <return>
swDeviceStatusTrap (yes, y, no, n): [no] <return>
swZoneConfigChangeTrap (yes, y, no, n): [no] <return>
FA-TRAP (yes, y, no, n): [yes] <return>
connUnitStatusChange (yes, y, no, n): [yes] <return>
connUnitEventTrap (yes, y, no, n): [yes] <return>
connUnitPortStatusChange (yes, y, no, n): [yes] <return>
HA-TRAP (yes, y, no, n): [no] yes
fruStatusChanged (yes, y, no, n): [no] yes
cpStatusChanged (yes, y, no, n): [no] yes
fruHistoryTrap (yes, y, no, n): [no] yes
IF-TRAP (yes, y, no, n): [yes] <return>
linkDown (yes, y, no, n): [yes] <return>
linkUp (yes, y, no, n): [yes] <return>
BD-TRAP (yes, y, no, n): [yes] <return>
bdTrap (yes, y, no, n): [yes] <return>
bdClearTrap (yes, y, no, n): [yes] <return>
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 366 of 436
Chapter 33: Configuring StoreFabric B-Series switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 367 of 436
Chapter 33: Configuring StoreFabric B-Series switches
BD-TRAP: YES
bdTrap: YES
bdClearTrap: YES
MAPS-TRAP: YES
mapsTrapAM: YES
T11-FC-ZONE-SERVER-TRAP: NO
t11ZsRequestRejectNotify: NO
t11ZsMergeFailureNotify: NO
t11ZsMergeSuccessNotify: NO
t11ZsDefZoneChangeNotify: NO
t11ZsActivateNotify: NO
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 368 of 436
Chapter 33: Configuring StoreFabric B-Series switches
Choose a user not already defined in the SNMPv3 Trap/Inform configuration. In the example above, no
SNMPv3 Trap/Inform configuration has been defined so all the listed users are available for use. In this
example, we will use snmpadmin1.
6. Once you have selected the SNMP user and have the appropriate credentials you want to use for the
Auth/Priv configuration you can begin to configure SNMPv3.
SNMP Informs Enabled (true, t, false, f): [false] <return>; needs to be “false”
SNMPv3 user configuration (snmp user not configured in FOS user database will have
physical AD and admin role as the default):
User (rw): [snmpadmin1] <return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) 1; example selects MD5
New Auth Passwd: <enter password, must be at least 8 chracters>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (1..4) 1; example selects DES
New Priv Passwd: <enter password, must be at least 8 chracters>
User (rw): [snmpadmin2] <return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>
User (rw): [snmpadmin3] <return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>
User (ro): [snmpuser1] <return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>
User (ro): [snmpuser2] <return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>
User (ro): [snmpuser3] <return>
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 369 of 436
Chapter 33: Configuring StoreFabric B-Series switches
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required*
Systems Device to SNMP traps.
UDP 1162 Monitored Hosting SNMPv3 Trap. This is the port used by Insight RS to Required*
Device Device listen to SNMPv3 traps.
Option 1: SNMPv1
If your device's SNMP community string is set to public and your community access mode is read only,
Insight RS automatically associates an SNMPv1 protocol with your device. If you use a different community
string or use a nonstandard port, you must create an SNMPv1 protocol credential in the Insight RS Console.
To configure SNMPv1 in the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Credentials tab.
3. From the Select and Configure Protocol drop-down list, select Simple Network Management Protocol
Version 1, V2C (SNMPv1, SNMPv2C).
4. Click New. The New Credential dialog box appears.
5. Type the Community String you have configured on your device.
6. Click Add.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 370 of 436
Chapter 33: Configuring StoreFabric B-Series switches
Insight RS creates the protocol credential and it appears in the credentials table.
Option 2: SNMPv3
To configure SNMPv3 in the Insight RS Console, complete the following steps:
1. Create a Named Credential for every set of Management Group credentials:
a. In the Insight RS Console, navigate to Company Information → Named Credentials.
b. Click Add New Credential.
c. Type a Credential Name, for example: Brocade SNMPv3.
d. In the Protocol drop-down list, select Simple Network Management Protocol Version 3
(SNMPv3).
e. Use the default port of 161.
f. In the SNMP Account Credential fields, add:
i. Type the Username for the user identified in "Option 2: Configure SNMPv3" on page 365.
ii. Account Authentication Protocol: MD5 or SHA
The example used MD5 in "Option 2: Configure SNMPv3" on page 365.
iii. Account Authentication Password.
iv. Account Privacy Protocol: DES, DES3, AES128, AES192, AES256
The example used DES in "Option 2: Configure SNMPv3" on page 365.
v. Account Privacy Passphrase.
vi. Leave the Context Name blank.
g. Click Save.
2. Add Discovery credentials for the B-Series switches:
a. In the Insight RS Console, navigate to Discovery → Credentials.
b. Create discovery protocol credentials for the Named Credential created earlier.
i. In the Select and Configure Protocol drop-down list, select Simple Network Management
Protocol Version 3 (SNMPv3).
ii. Click New.
iii. In the Named Credential drop-down list, select the Named Credential created earlier.
iv. Click Add.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 371 of 436
Chapter 33: Configuring StoreFabric B-Series switches
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
Note: If your SAN switch is covered by a critical service level contract then add CS4SAN to the
Custom Delivery ID field in order to elevate the response to service events.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 372 of 436
Chapter 33: Configuring StoreFabric B-Series switches
snmptraps --send
4. Or send a specific test trap:
snmptraps --send --trap_name <trapname>
For example:
snmptraps --send -trap_name cp-status-change-trap -ip_address <hosting_device_ip>
where <hosting_device_ip> is the IP address of the Hosting Device. If the switch reports that the test
trap cannot be sent, make sure snmpmibcaps is configured to send HA traps. If it is configured correctly,
this command should create a test event visible in the Insight RS Console and also submit an incident to
HPE.
Note: Not all traps result in an incident being delivered to the Insight RS Console. Not all traps are
sent and not all are received. Some get received as ‘unregistered event’ if you have that option
selected as a receive option in Events. The events that show up as ‘unregistered’ are not compiled
in the SIM Mibs. FA-MIB’s generate a valid hardware event.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 373 of 436
Chapter 34: Configuring StoreFabric C-Series
switches
Fulfill configuration requirements
To configure your StoreFabric C-Series switches to be monitored by Insight RS, complete the following
sections:
Table 34.1 StoreFabric C-Series switch configuration steps
Task Complete?
Make sure Insight RS supports your C-Series switch by checking the HPE Insight Remote
Support Release Notes.
Send a test event to verify connectivity between your C-Series switch and Insight RS.
Configure SNMP
To configure C-Series (formerly Cisco) SNMP, complete the following steps:
1. Log on to the CLI interface with Telnet, or use Fabric Manager.
2. Use the CLI commands config t and snmp-server host <IP> traps version 1 public udp-port
162 commands to add the Hosting Device IP address as a trap destination.
3. Choose to have all events returned as traps.
4. If you choose a non-standard trap community name (i.e. a name other than public), make sure this
name is used in the Insight RS Console credentials settings.
5. Type the IP address of Hosting Device into one of the trap destination settings. You can also configure
this with the C-Series Device Manager.
6. Discover the device in the Insight RS Console.
7. In the Insight RS Console, navigate to Devices and click the Device Name. Verify that the device
information was discovered correctly.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 374 of 436
Chapter 34: Configuring StoreFabric C-Series switches
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 375 of 436
Chapter 34: Configuring StoreFabric C-Series switches
Note: If your SAN switch is covered by a critical service level contract then add CS4SAN to the
Custom Delivery ID field in order to elevate the response to service events.
Cisco has recently introduced a CLI test command to validate the device end-to-end event connectivity.
1. From the CLI prompt, issue the following command:
test pfm test-SNMP-trap power
2. This causes the C-Series switch to send a bad power supply test event to the Hosting Device. If
everything is configured correctly, this event results in an incident viewable at HPE.
Note: You can also use test pfm test-SNMP-trap fan, but the temp type event, if used, will be
ignored.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 376 of 436
Chapter 34: Configuring StoreFabric C-Series switches
Note: The first Cisco test trap will be forwarded by Insight Remote Support to HPE, but subsequent
test traps will be suppressed for 24 hours before another test trap can be forwarded to HPE.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 377 of 436
Chapter 35: Configuring StoreFabric H-Series
switches
Fulfill configuration requirements
To configure your StoreFabric H-Series switches to be monitored by Insight RS, complete the following
sections:
Table 35.1 StoreFabric H-Series switch configuration steps
Task Complete?
Make sure Insight RS supports your H-Series switch by checking the HPE Insight Remote
Support Release Notes.
Configure SNMP
Log on to the switch with Telnet and issue the following CLI commands to configure the HPE SN6000, 8/20q
and 2/8q FC switches to send SNMP traps to the Hosting Device.
1. Open the Admin session:
admin start
2. Configure the SNMP trap destinations:
set setup snmp
3. After configuration, type y to save and active the SNMP setup.
4. Close the Admin session:
admin end
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 378 of 436
Chapter 35: Configuring StoreFabric H-Series switches
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 379 of 436
Chapter 35: Configuring StoreFabric H-Series switches
Note: If your SAN switch is covered by a critical service level contract then add CS4SAN to the
Custom Delivery ID field in order to elevate the response to service events.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 380 of 436
Chapter 36: Configuring ProVision-based
networking switches
ProVision-based networking switches (formerly E-series/ProCurve) require SNMP for discovery and event
monitoring. ProVision-based switches ship with SNMP installed and enabled.
You can use either Telnet or SSH for configuration collections. Telnet is enabled on ProVision-based switches
by default. If you want to use SSH for configuration collections, you must enable it (see section "Enabling
SSH").
Make sure Insight RS supports your ProVision-based switch by checking the HPE Insight
Remote Support Release Notes.
Add the Telnet or SSH and SNMP protocols to the Insight RS Console.
Configure SSH
Generate the Public/Private key for SSH
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 381 of 436
Chapter 36: Configuring ProVision-based networking switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 382 of 436
Chapter 36: Configuring ProVision-based networking switches
14.61 and higher # snmp-server host <IP address> community public trap-level
not-info
Prerequisites
l TFTP server — used to move the public key to the ProVision-based switch.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 383 of 436
Chapter 36: Configuring ProVision-based networking switches
2. Click Add.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 384 of 436
Chapter 36: Configuring ProVision-based networking switches
Prerequisites
l PuTTYgen — used to generate a key pair if required.
l TFTP server — used to move the public key to a ProVision-based switch.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 385 of 436
Chapter 36: Configuring ProVision-based networking switches
2. Click Add.
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 386 of 436
Chapter 36: Configuring ProVision-based networking switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 387 of 436
Chapter 36: Configuring ProVision-based networking switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 388 of 436
Chapter 37: Configuring Altoline networking
switches
Important: Altoline switches require the installation of Content Level Update 7.7.0.50. Altoline
switches also require Patch 7.7.0.42 or 7.7.0.49 be installed or discovery will not complete
successfully.
Make sure Insight RS supports your Altoline switch by checking the HPE Insight Remote Support
Release Notes.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 389 of 436
Chapter 37: Configuring Altoline networking switches
Configure SNMP
At the PicOS configuration prompt, enter these commands to configure the SNMP agent:
1. Set the SNMP (RO) community name:
set protocols snmp community public
2. Set the contact name:
set protocols snmp contact <contact_name>
3. Set the switch location:
set protocols snmp location <switch_location>
4. Set the trap receiver (Insight RS):
set protocols snmp trap-group targets <ip_of_hosting_device>
5. Set the trap version:
set protocols snmp trap-group version v1
6. Save the current configuration and exit the configuration mode.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 390 of 436
Chapter 37: Configuring Altoline networking switches
Configure SNMP
To configure SNMP, complete the following steps:
1. Start the SNMP daemon: sudo systemctl start snmpd.service
2. To enable the SNMP daemon to run automatically after a reboot:
a. Type: sudo systemctl enable snmpd.service
b. Create a file called /etc/system/system/snmpd.service.d/restart.conf
c. Enter these lines and save the file:
[Service[
Restart=always
RestartSec=60
d. Run this command to reload the SNMP agent daemon: sudo systemctl daemon-reload
3. Edit the /etc/snmp/snmpd.conf file to configure values in the SNMP agent using nano or another file
editor.
a. To enable agent access:
o Comment out the line agentAddress udp:127.0.0.1:161
o Uncomment the line agentAddress udp:161,udp6:[::1]:161
b. Uncomment the lines:
o rocommunity public default -V systemonly
o rocommunity public localhost
c. Set your sysLocation and sysContact in the System Information section.
d. Uncomment the line trapsink localhost public and replace localhost with the IP address of your
Insight RS Hosting Device.
e. Uncomment the line defaultMonitors yes.
f. In the same area, uncomment these two lines:
o iquerySecName internalUser
o rouser internalUser
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 391 of 436
Chapter 37: Configuring Altoline networking switches
g. Save the /etc/snmp/snmpd.conf file and issue the command: sudo systemctl restart
snmpd.service
4. To test the SNMP agent is running, walk the MIB tables. Note down the OIDs and values for both tables.
These will be used in the next step in the agent configuration.
a. Type the following command to walk one of the Entity MIB tables:
snmpwalk -v 2c -c public localhost .1.3.6.1.2.1.47.1.1.1.1.7
b. Type the following command to walk one of the Entity Sensor MIB tables:
snmpwalk -v 2c -c public localhost .1.3.6.1.2.1.99.1.1.1.5
5. Cumulus Linux can be configured to monitor the status of the FRU’s in the switch and send SNMP traps
to Insight RS. For more details, see docs.cumulusnetworks.com/display/DOCS/SNMP+Monitoring.
a. For each of the FRU’s listed in the Entity MIB table walked earlier, create a monitor entry in the
/etc/snmp/snmpd.conf file.
b. For each of the PSU and Fan items in the Entity MIB table walked earlier, create a monitor entry in
the Active Monitoring section of the /etc/snmp/snmpd.conf file.
For example:
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.7.<FRU_OID> "Fan tray number, fan
location" 1.3.6.1.2.1.99.1.1.1.5.<Sensor_OID> > 1
where the first OID is OID of the Fan or PSU in the Entity MIB table and the second OID is the OID of the
Fan or PSU operational status in the Entity Sensor table.
When created for each of the FRUs to be monitored, this section will look like the below example (your
switch will have different OID numbers). Note on the first line, Fan #1 is set to alert if the operational
status is less than 2. This is to create a test of the whole trap reporting system in order to complete this
configuration. After you verify that Insight RS received the trap, change this alert status to > 1.
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011001 "Fan tray 1, fan A"
1.3.6.1.2.1.99.1.1.1.5.100011001 < 2
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011001 "Fan tray 1, fan A"
1.3.6.1.2.1.99.1.1.1.5.100011001 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011002 "Fan tray 1, fan B"
1.3.6.1.2.1.99.1.1.1.5.100011002 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011003 "Fan tray 2, fan A"
1.3.6.1.2.1.99.1.1.1.5.100011003 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011004 "Fan tray 2, fan B"
1.3.6.1.2.1.99.1.1.1.5.100011004 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011005 "Fan tray 3, fan A"
1.3.6.1.2.1.99.1.1.1.5.100011005 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011006 "Fan tray 3, fan B"
1.3.6.1.2.1.99.1.1.1.5.100011006 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011007 "Fan tray 4, fan A"
1.3.6.1.2.1.99.1.1.1.5.100011007 > 1
monitor -I -r 10 -o 1.3.6.1.2.1.47.1.1.1.1.2.100011008 "Fan tray 4, fan B"
1.3.6.1.2.1.99.1.1.1.5.100011008 > 1
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 392 of 436
Chapter 37: Configuring Altoline networking switches
6. Save the /etc/snmp/snmpd.conf file and issue the command: sudo systemctl restart
snmpd.service
7. Comment out the first line and re-save the /etc/snmp/snmpd.conf file and issue the command: sudo
systemctl restart snmpd.service
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 393 of 436
Chapter 37: Configuring Altoline networking switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 394 of 436
Chapter 38: Configuring Comware-based
networking switches
Comware-based networking switches (formerly A-Series or H3C/3COM) require SNMP for discovery and
event monitoring.
Important: Make sure all IRF stack member switches have a valid warranty or contract. If the
master switch fails, the member switch assigned to be the new master switch must also have a
valid warranty or contract for the stack to continue to be entitled for remote support. If the stack has
not been built yet, you can verify entitlement by discovering each switch individually. If the stack
has already been built you must verify each switch has a valid warranty or contract manually.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 395 of 436
Chapter 38: Configuring Comware-based networking switches
Make sure Insight RS supports your Comware-based switch by checking the HPE Insight
Remote Support Release Notes.
Add Telnet or SSH protocol credentials to the Insight RS Console for collections.
Configuring Telnet
From a serial console, complete the following steps:
1. Enter system view, and enable the Telnet service.
<Sysname> system-view
[Sysname] telnet server enable
2. Configure an IP address for VLAN interface 1. This address will serve as the destination of the Telnet
connection.
[Switch] interface vlan-interface 1
[Switch-Vlan-interface1] ip address <ip_address> 255.255.255.0
[Switch-Vlan-interface1] quit
5. Create local user manager, and set the user command privilege level to 3
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 396 of 436
Chapter 38: Configuring Comware-based networking switches
2. Configure an IP address for VLAN interface 1. This address will serve as the destination of the SSH
connection.
[Switch] interface vlan-interface 1
[Switch-Vlan-interface1] ip address <ip_address> 255.255.255.0
[Switch-Vlan-interface1] quit
5. Create local user manager, and set the user command privilege level to 3.
[Switch] local-user manager
[Switch-luser-client001] password simple <password>
[Switch-luser-client001] service-type ssh
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 397 of 436
Chapter 38: Configuring Comware-based networking switches
1. From the Hosting Device, connect to the Comware-based switch using the protocol you want to verify.
Wait until the connection is established.
2. Type the username and password when prompted.
A successful log on confirms that Telnet/SSH is configured properly.
2. Enable SNMP traps, and set the Hosting Device as the trap destination. Use public as the community
name.
[Sysname] snmp-agent trap enable
[Sysname] snmp-agent target-host trap address udp-domain <hosting_device_ip> params
securityname public v1
ICMP N/A Hosting Monitored Provides system reachability (ping) check during system Required
Device Systems discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 398 of 436
Chapter 38: Configuring Comware-based networking switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 399 of 436
Chapter 38: Configuring Comware-based networking switches
5. Type the Username and Password you have configured on your device.
6. Click Add.
Insight RS creates the protocol credential and it appears in the credentials table.
To discover the device from the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Sources tab.
3. Expand the IP Addresses section and add the IP address for your device:
Note: If your switch is part of an IRF stack, only discover the master switch. The rest of the
switches in the stack are identified through the MIB information.
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 400 of 436
Chapter 38: Configuring Comware-based networking switches
You can verify SNMP communication by reviewing the running configuration from the Comware-based switch
command line. Look for the snmp-agent section in the output and verify that the community string is correct
and the trap destination is the Hosting Device.
To display the running configuration, run the following command:
> display current-configuration
# snmp-agent snmp-agent community read public snmp-agent sys-info version v1 snmp-agent
target-host trap address udp-domain <hosting_device_ip> params securityname public v1 #
If any of the settings are incorrect, use the undo command to remove the setting, for example, undo snmp-
agent community read public. Then return to "Setup SNMPv1 traps" on page 398 and reconfigure the
setting that was incorrect.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 401 of 436
Chapter 39: Configuring Mellanox InfiniBand
Switches
InfiniBand switches require SNMP for discovery, event monitoring, and collections.
Make sure Insight RS supports your InfiniBand switch by checking the HPE Insight Remote
Support Release Notes.
Configure SNMPv1/v2
From a console, complete the following steps:
1. Activate the SNMP server on the switch (in configure mode) using the following commands:
switch (config) # snmp-server enable
switch (config) # snmp-server enable notify
switch (config) # snmp-server community public ro
switch (config) # snmp-server contact "contact name"
switch (config) # snmp-server host <hosting_device_IP_address> traps version 2c
public
switch (config) # snmp-server location "location name"
switch (config) # snmp-server user admin v3 enable
switch (config) # snmp-server user admin v3 prompt auth md5 priv des
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 402 of 436
Chapter 39: Configuring Mellanox InfiniBand Switches
Configure SNMPv3
Important: Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs.
Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be at least 8
characters long. Refer to your device's documentation to determine the versions of SNMP your
device supports.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 403 of 436
Chapter 39: Configuring Mellanox InfiniBand Switches
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required*
Systems Device to SNMP traps.
UDP 1162 Monitored Hosting SNMPv3 Trap. This is the port used by Insight RS to Required*
Device Device listen to SNMPv3 traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 404 of 436
Chapter 39: Configuring Mellanox InfiniBand Switches
To discover the device from the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Sources tab.
3. Expand the IP Addresses section and add the IP address for your device:
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 405 of 436
Chapter 39: Configuring Mellanox InfiniBand Switches
If there is no success icon, determine which column has the problem and consult the Online Help for
troubleshooting information.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 406 of 436
Chapter 40: Configuring Intel Omni-Path
Switches
Intel Omni-Path switches require SNMP for discovery and event monitoring.
Make sure Insight RS supports your Intel Omni-Path switch by checking the HPE Insight Remote
Support Release Notes.
Configure SNMP
To configure SNMP on your switch, see section 2.4 in the Intel Omni-Path switch documentation:
www.intel.com/content/dam/support/us/en/documents/network/omni-swtch100/sb/Intel_OP_Fabric_
Switches_GUI_UG_H76457_v1_0.pdf.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 407 of 436
Chapter 40: Configuring Intel Omni-Path Switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 408 of 436
Chapter 40: Configuring Intel Omni-Path Switches
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 409 of 436
Chapter 41: Configuring Networking Routers
HPE Networking Routers require SNMP for event monitoring and Telnet/SSH for collections.
Make sure Insight RS supports your router by checking the HPE Insight Remote Support
Release Notes.
Add Telnet or SSH protocol credentials to the Insight RS Console for collections.
Configuring Telnet
From a serial console, complete the following steps:
1. Enter system view, and enable the Telnet service.
<Sysname> system-view [Sysname] telnet server enable
2. Configure an IP address for VLAN interface 1. This address will serve as the destination of the Telnet
connection.
[Sysname] interface vlan-interface 1 [Sysname-Vlan-interface1] ip address <ip-
address> 255.255.255.0 [Sysname-Vlan-interface1] quit
3. Set the authentication mode for the user interfaces to AAA.
[Sysname] user-interface vty 0 4 [Sysname-ui-vty0-4] authentication-mode scheme
4. Enable the user interfaces to support Telnet.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 410 of 436
Chapter 41: Configuring Networking Routers
Configure SNMPv1/v2
From a serial console, or through SSH or Telnet, complete the following steps:
1. <Sysname> system-view [Sysname] snmp-agent sys-info version v1 [Sysname] snmp-agent
community read public
2. Enable SNMP traps, and set the Hosting Device as the trap destination. Use public as the community
name.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 411 of 436
Chapter 41: Configuring Networking Routers
[Sysname] snmp-agent trap enable [Sysname] snmp-agent target-host trap address udp-
domain <hosting-device-ip> params securityname public v1
3. Save the configuration
From a serial console, complete the following steps:
a. Save your configuration changes by issuing the save command.
b. When prompted that the "current configuration will be written to the device", type Y.
c. Press Enter to leave the existing filename unchanged.
d. When prompted to overwrite the existing *.cfg file, type Y.
A confirmation message appears when the current configuration saves successfully.
Configure SNMPv3
Important: Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs.
Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be at least 8
characters long. Refer to your device's documentation to determine the versions of SNMP your
device supports.
From a serial console, or through SSH or Telnet, complete the following steps:
1. Enter system view:
system-view
2. Enable SNMP agent:
snmp-agent
3. Configure an SNMP group and specify its access right:
snmp-agent group v3 <group-name> [authentication | privacy] [read-view <read-view>]
[write-view <write-view>] [notify-view <notify-view>] [acl <acl-number>]
4. Add a user to the SNMP group:
snmp-agent usm-user v3 <user-name> <group-name> [[cipher] authentication-mode {md5 |
sha} <auth-password> [privacy-mode {3des | aes128 | des56} <priv-password>]] [acl
<acl-number>]
The auth-password needs to be at least 6 characters long for Insight RS.
5. Enable SNMP traps, and set the Hosting Device as the trap destination:
[Sysname] snmp-agent trap enable
[Sysname] snmp-agent target-host trap address udp-domain <hosting-device-ip> params
securityname <security-string> v3
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 412 of 436
Chapter 41: Configuring Networking Routers
ICMP N/A Hosting Monitored Provides system reachability (ping) check during Required
Device Systems system discovery and before other operations.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required*
Systems Device to SNMP traps.
UDP 1162 Monitored Hosting SNMPv3 Trap. This is the port used by Insight RS to Required*
Device Device listen to SNMPv3 traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 413 of 436
Chapter 41: Configuring Networking Routers
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 414 of 436
Chapter 41: Configuring Networking Routers
To discover the device from the Insight RS Console, complete the following steps:
1. In a web browser, log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Sources tab.
3. Expand the IP Addresses section and add the IP address for your device:
a. Click New.
b. Select the Single Address, Address Range, or Address List option.
c. Type the IP address(es) of the devices to be discovered.
d. Click Add.
4. Click Start Discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 415 of 436
Chapter 41: Configuring Networking Routers
You can verify SNMP communication by reviewing the running configuration from the router command line.
Look for the snmp-agent section in the output and verify that the community string is correct and the trap
destination is the Hosting Device.
To display the running configuration, run the following command:
> display current-configuration
# snmp-agent snmp-agent community read public snmp-agent sys-info version v1 snmp-agent
target-host trap address udp-domain <hosting_device_ip> params securityname public v1 #
If any of the settings are incorrect, use the undo command to remove the setting, for example, undo snmp-
agent community read public. Then return to "Setup SNMP Traps" on page 411 and reconfigure the
setting that was incorrect.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 416 of 436
Chapter 42: Configuring CS250-HC
StoreVirtual System
The following sections show how to configure Insight RS to monitor the 250-HC StoreVirtual System using
the WBEM and RIBCL protocols.
Configure discovery
After you install Insight RS and register Insight RS with HPE Support, perform the following steps:
1. On the Hosting Device, open a Command Prompt window and enter following commands.
2. Set discovery to ignore server IPs given to Insight RS by the ILO to avoid issues if the HC environment
has several IPs assigned to a single interface or teamed interface:
rsadmin config -set discovery.ignoreILOServerIps=true
3. Set discovery to use the default behavior when discovering an iLO 4 that presents multiple server IP
addresses:
rsadmin config -delete siteipv4subnet.preference
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 417 of 436
Chapter 42: Configuring CS250-HC StoreVirtual System
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 418 of 436
Chapter 42: Configuring CS250-HC StoreVirtual System
3. Assign the Devices added in "Add protocol credentials" on page 417 to Solution you just created:
a. Assign devices in the assigned devices pane. To show unassigned devices, click the Not Assigned
to this Named Credential or All Devices options. To show devices in a specific device group,
select a device group from the Filter by device group drop-down list. To search for a specific
device, type the device name into the Search box. The table displays the devices based on your
filter and search criteria.
b. To add a device, select the check box next to the device in the devices table.
c. Click Save Devices.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 419 of 436
Chapter 43: Configuring Uninterruptable
Power Supplies
Uninterruptable Power Systems (UPS) come with either a Management Module or a Network Module
installed, depending on the model. Use the appropriate configuration procedure below for your model:
l To configure a UPS that uses a Management Module, see "Configuring UPS Management Modules"
below.
l To configure a UPS that uses a Network Module, see "Configuring UPS Network Modules" on page 423.
Make sure Insight RS supports your UPS Management Module by checking the HPE Insight
Remote Support Release Notes.
Configure SNMP on the UPS Management Module and set the Hosting Device as a trap
receiver.
Send a test event to verify connectivity between your UPS Management Module and Insight RS.
Configure SNMP
SNMP can be setup in the SNMP Traps screen in the UPS Management Module web interface.
For more details about configuring SNMP, see the HPE UPS Management Module User Guide.
To configure SNMP trap notifications, complete the following steps:
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 420 of 436
Chapter 43: Configuring Uninterruptable Power Supplies
Note: If the event clears before the delay time has expired, then the event notification is
not sent.
UDP 161 Hosting Monitored SNMP. This is the standard port used by SNMP agents Required
Device Systems on monitored systems. The Hosting Device sends
requests to devices on this port.
UDP 162 Monitored Hosting SNMP Trap. This is the port used by Insight RS to listen Required
Systems Device to SNMP traps.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 421 of 436
Chapter 43: Configuring Uninterruptable Power Supplies
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 422 of 436
Chapter 43: Configuring Uninterruptable Power Supplies
3. In the left menu, click Event Notifications, then the SNMP Traps tab.
4. Click Send Test Trap to send a test SNMP trap.
5. Verify that Insight Remote Support received the test trap.
Make sure Insight RS supports your UPS Network Module by checking the HPE Insight Remote
Support Release Notes.
Configure SNMP on the UPS Network Module and set the Hosting Device as a trap receiver.
Send a test event to verify connectivity between your UPS Network Module and Insight RS.
Configure SNMP
SNMP can be setup in the SNMP Settings screen in the UPS Network Module web interface. The SNMP
Settings screen allows an administrator to configure SNMP settings for computers that use the HPE Power
MIB to request information from the UPS Network Module.
For more details about configuring SNMP, see the HPE UPS Network Module User Guide.
To configure SNMP, complete the following steps:
1. Log on to the UPS Network Module web interface.
2. In the left menu, click SNMP.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 423 of 436
Chapter 43: Configuring Uninterruptable Power Supplies
3. Select the SNMP version from the SNMP Version drop-down list.
4. Fill in the appropriate fields.
5. Click Save.
6. Set the Hosting Device as a trap receiver UPS Network Module web interface. The Trap Receivers
Settings screen allows an administrator to configure management applications to receive SNMP traps
from the UPS Network Module. SNMP management applications, such as Insight Remote Support, can
receive notifications from the UPS Network Module.
To configure the Hosting Device as an SNMP trap recipient, complete the following steps:
a. In the left menu, click Notified Applications, then click Add Trap Receiver. Configure up to three
applications to receive SNMP traps from the UPS Network Module.
b. Type the name of the application, such as Insight RS, in the Application Name field. HPE
recommends adding “SNMP” or “Trap” to the name to for easy monitoring.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 424 of 436
Chapter 43: Configuring Uninterruptable Power Supplies
c. Type the host name or the IP address of the management server on which the application is running
in the Hostname or IP address field.
d. Select the SNMP version from the Protocol drop-down menu.
e. If you selected SNMPv1, type the community string in the Trap Community field.
f. Select the check box for the appropriate MIB:
o HPE MIB (cpqpower.mib)—The HPE Power MIB
o IETF MIB (RFC1628)—A standard UPS MIB
g. Click Save. The application information appears on the Notified Applications screen.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 425 of 436
Chapter 43: Configuring Uninterruptable Power Supplies
3. Click Utility Failure Test. The UPS Network Module sends a Utility failure trap, and then sends a Utility
restored trap 30 seconds later.
4. Verify that Insight Remote Support received the test trap.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 426 of 436
Chapter 44: Configuring VMware vCenter
servers
Insight RS can collect virtual machine configuration information for your IT environment from your vCenter
installation. Insight RS automatically discovers any VMware vCenter installations when the ProLiant
Windows server it is installed on is discovered as long as the proper security credentials are configured.
Insight RS supports collections for vCenter virtual machine guests, but does not support monitoring of the
virtual machine guests.
Communication with a vCenter installation requires the configuration of security credentials within the Insight
RS Console. Once discovered, information about the virtual machines on any server in your environment can
be collected and sent automatically to HPE on a scheduled basis. The vCenter cluster uses the same
warranty and contract information as the ProLiant server it's installed on. When the ESX and ESXi servers are
discovered, Insight RS does not have the ability to tell which vCenter cluster manages them.
The vCenter collection gathers information about the VM Guests and how they are configured on the VMware
vCenter cluster. There must be a Proactive Care contract on at least one of the ESX or ESXi devices that
make up the cluster. With vCenter there isn't a single device, but a cluster of servers hosting the virtual
environment. If at least one of the underlying servers hosting the vCenter managed virtual system is covered
by Proactive Care, then the entire virtual system is covered by Proactive Care.
The vCenter cluster appears in the Insight RS Console with a name of the form: VC@<hostname>.
Note: Although vCenter installations are visible in the Insight RS Console, they are not monitored
for events.
Insight RS does not differentiate between multiple DataCenter objects or between multiple cluster objects
being managed by a given vCenter instance. Insight RS 7.10 does not have hierarchical capability and
therefore cannot represent these constructs. All hosts from all clusters are added to Insight RS without
differentiating the various clusters in which they may be configured.
Insight RS can use CIM ticket authentication on ESXi clusters managed by vSphere, which offers the
following advantages:
l It allows Insight RS to communicate with the ESXi hosts when they are in lockdown mode.
Important: Insight RS supports ESXi hosts in lockdown mode when they are managed by
vCenter in a cluster configuration. Standalone ESXi hosts managed by vCenter are not
supported.
l It allows Insight RS to discover ESXi hosts when it discovers the vCenter server without having to enter
WBEM credentials for each ESXi host; the CIM ticket is used for the credentials instead.
To enable CIM ticketing for ESXi devices, whether in lockdown mode or not, you must provide the credentials
for the VMware vCenter cluster to the discovery tasks (see "Create a VMware VirtualCenter Web Service
Interface protocol credential in the Insight RS Console" on the next page.) If any of the ESXi hosts are
ProLiant Gen8/Gen9 devices, then appropriate RIBCL credentials must also be provided prior to discovery.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 427 of 436
Chapter 44: Configuring VMware vCenter servers
Important: The CIM ticket capability only applies to ESXi, not to ESX clusters. When Insight RS
discovers the vCenter server, it will also discover ESX hosts, but you must enter the SNMP
credentials in Insight RS before discovery for them to be monitored correctly.
Make sure Insight RS supports your ProLiant VMware ESX server by checking the HPE Insight
Remote Support Release Notes.
Verify the status of the ProLiant VMware ESX server in the Insight RS Console.
Important: If any of the ESXi hosts are Gen8 ProLiant devices, then appropriate RIBCL credentials
must also be provided prior to discovery.
To configure VMware VirtualCenter Web Service Interface in the Insight RS Console, complete the following
steps:
1. Log on to the Insight RS Console.
2. In the main menu, select Discovery and click the Credentials tab.
3. In the Select and Configure Protocol drop-down list, select VMware VirtualCenter Web Service
Interface.
4. Click New. The New Credential dialog box appears.
5. Type the username and password you use to log on to vCenter.
6. Click Add.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 428 of 436
Chapter 44: Configuring VMware vCenter servers
Note: The vCenter discovery causes the ESX and ESXi devices it manages to be discovered
as long as proper credentials are provided. For ESXi, proper credentials could be WBEM or
could be the vCenter CIM ticket. Make sure the ESX and ESXi devices have proper
credentials configured.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 429 of 436
Chapter 44: Configuring VMware vCenter servers
Insight RS Help.
Verify that this collection ran successfully on the Collection Services → Basic Collection Results tab in the
Insight RS Console.
1. Log on to the Insight RS Console.
2. In the main menu, select Collection Services and then click the Basic Collection Results tab.
3. Expand the VMware vCenter Server Collection section.
4. Locate the entry for your device and check the Result column. If the collection was successful, a
success icon appears ( ). If it failed, an error icon appears ( ).
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 430 of 436
Glossary Custom Delivery ID
The Custom Delivery ID is a free text field that
can be individually populated for each monitored
device. Unless a specific value is specified within
A the documentation relating to configuring a
particular device, the field should be left blank. In
Agentless Management Service (AMS) some very specific circumstances, this field may
iLO 4 and iLO 5 Agentless Management uses out- also be populated by an HPE Representative to
of-band communication for increased security allow customized handling/routing of reported
and stability. With Agentless Management, incidents. In those instances, the field must be
health monitoring and alerting is built into the populated with a unique value associated with the
system and begins working the moment a power customized handling that is required.
cord is connected to the server. This feature runs Determination of the unique value must be done
on the iLO hardware, independent of the operating by the HPE Representative working with the
system and processor. The separately installed HPE Automation Team TS that sets up the
AMS collects additional operating system data. customizations. Failure to follow this guidance
could result in incorrectly handled incident
reports.
C
CDID D
See Custom Delivery ID.
device groups
Centralized Management Console (CMC) Configurable groups of devices within the Insight
The CMC is used to configure and manage the RS Console that helps users organize the
P4000 Storage Systems. devices in their environment.
CLIQ discovery
Legacy term for the LeftHand OS command line A feature within a management application that
interface. See P4000 CLI. finds and identifies network objects. In HPE
management applications, discovery finds and
cluster identifies all the devices within a specified
A cluster is a grouping of storage nodes that network range.
create the storage pool from which you create
volumes.
E
collection schedules
The frequency in which collections are run. The Enterprise Virtual Array (EVA)
schedule is configurable in the Insight RS An EVA is a high performance, high capacity and
Console. high availability virtual RAID storage solution for
high-end enterprise environments.
collections
See configuration collection. entitlement
The process of authorizing a request for support
based on the contents of warranty or support
configuration collection
HPE Insight Remote Support uses the term contracts held by the customer, normally with
configuration collection in reference to data respect to a specific Object of Service (OOS)
collected from a monitored device. This data is such as a hardware or software component. Your
sent to HPE for proactive analysis. level of entitlement is determined by your HPE
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 431 of 436
Glossary: event - Insight Remote Support
Support contract. Contact your HPE Account in to all HPE Passport-enabled Web sites.
Team for more details.
event I
A general term for all types of notifications from
one process to another. identification
An aspect of the discovery process that identifies
Event Log Monitoring Collector (ELMC) the management protocol and type of system.
ELMC provides error condition detection of the
event log and communicates these events to iLO
Insight RS. Integrated Lights-Out. Embedded server
management technology that delivers web-based
remote management that is always available.
H
iLO Remote Insight Board Command
hardware event Language (RIBCL)
A specific type of event that suggests that a Communication protocol required for Insight
specific hardware component may be in trouble. Remote Support to communicate with ProLiant
Hardware events may result in a service event. Gen8 and later servers.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 432 of 436
Glossary: Insight RS Console - Secure Sockets Layer (SSL)
Insight RS Console
The Insight Remote Support user interface that is P
installed on the Hosting Device.
P4000 CLI
The P4000 CLI is the command line interface that
M is used to interface with the P4000 Storage
Systems from the Hosting Device. The P4000
management group CLI is installed with Insight Remote Support.
A collection of one or more storage nodes which Note that the P4000 CLI is sometimes referred to
serves as the container within which you cluster as cliq, which is the name of the command used
storage nodes and create volumes for storage. within the P4000 CLI.
O S
Secure Sockets Layer (SSL)
OA
Secure Sockets Layer is the standard security
Onboard Administrator. The Onboard
technology for establishing an encrypted link
Administrator for the BladeSystem enclosures is
between a web server and a browser. This link
the intelligence of the c-Class infrastructure. The
ensures that all data passed between the web
Onboard Administrator provides both local and
server and browsers remain private and integral.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 433 of 436
Glossary: Service Console - Transport Layer Security (TLS)
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 434 of 436
Glossary: virtual node - workflow case
V
virtual node
The P4000 Virtual SAN Appliance uses captive
server disk drives to build a virtual iSCSI SAN
consisting of Virtual Nodes that create the
storage pool from which virtualized volumes are
created. Virtual Nodes can be discovered and
managed in the same manner as physical
Storage Nodes.
volume
A logical entity that is made up of storage on one
or more storage nodes. It can be used as raw data
storage or it can be formatted with a file system
and used by a host or file server.
W
Web-Based Enterprise Management (WBEM)
This industry initiative provides management of
systems, networks, users, and applications
across multiple vendor environments. WBEM
simplifies system management, providing better
access to software and hardware data that is
readable by WBEM client applications.
workflow case
The specific HPE obligation to send a
replacement part for a failed customer part.
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 435 of 436
Index registering Remote Support 281
P
A
ProLiant Citrix Server 60, 93
Active Health System Report 45, 56 ProLiant Gen10 Server 39
ProLiant Gen8 Server 48
B ProLiant Gen9 Server 48
ProLiant Linux Server 76
BladeSystem c-Class Enclosure
ProLiant VMware ESX 83
configuring 279-280, 284
ProLiant VMware ESXi 89
C ProLiant Windows Server 60
configuring SNMP T
B-Series Switch 362
test event 44, 53
ProLiant Citrix 93
ProLiant Linux 76 U
ProLiant VMware ESX 83
ProLiant Windows 60 User Account Control 62
D W
ELMC Installation
EVA 301
ESXi
lockdown mode 427
HP ESXi 89
Onboard Administrator
configuring SNMP 285
HPE Insight Remote Support 7.10: Monitored Devices Configuration Guide Page 436 of 436