IBM Tivoli Monitoring Exploring
IBM Tivoli Monitoring Exploring
Version 6.1.0
SC32-1803-00
Tivoli IBM Tivoli Monitoring
®
Version 6.1.0
SC32-1803-00
First Edition (November 2005)
This edition applies to version 6, release 1 of IBM® Tivoli® Monitoring (product number 5724-C04) and to all
subsequent releases and modifications until otherwise indicated in new editions.
© Copyright International Business Machines Corporation 2005. All rights reserved.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . . v Validating the workflow logic and saving the
policy . . . . . . . . . . . . . . . 52
Tables . . . . . . . . . . . . . . . vii Starting the policy . . . . . . . . . . . 52
Exercise 6: Launching an application . . . . . . 53
Launch application . . . . . . . . . . . 53
About this guide . . . . . . . . . . . ix Take action . . . . . . . . . . . . . 53
Who should use this workbook . . . . . . . . ix Exercise 7: Using historical data . . . . . . . 55
Publications . . . . . . . . . . . . . . ix Historical reporting, setting a time span . . . . 55
IBM Tivoli Monitoring library . . . . . . . ix Creating a monitoring server query . . . . . 56
Accessing terminology online . . . . . . . xi Exporting query results . . . . . . . . . 58
Accessing publications online . . . . . . . xi Exercise 8: Creating a graphical view and using the
Ordering publications . . . . . . . . . . xi business navigator . . . . . . . . . . . . 59
Accessibility . . . . . . . . . . . . . . xii Creating a graphic view . . . . . . . . . 59
Tivoli technical training . . . . . . . . . . xii Creating a Business Navigator view . . . . . 60
Support information . . . . . . . . . . . xii
Conventions used in this guide . . . . . . . . xii
Chapter 4. Product administration . . . 63
Typeface conventions . . . . . . . . . . xii
Exercise 9: Configuring the Summarization and
Tivoli command syntax . . . . . . . . . xiii
Pruning Agent . . . . . . . . . . . . . 63
Changing system-wide configuration settings
Chapter 1. Introduction . . . . . . . . 1 using the Manage Tivoli Enterprise Services
window . . . . . . . . . . . . . . 63
Chapter 2. Installation and basic Changing the default configuration settings for
monitoring . . . . . . . . . . . . . 3 selected products and attribute groups . . . . 65
Exercise 1: Installing IBM Tivoli Monitoring . . . . 3 How to disable the Summarization and Pruning
Determining the layout of your environment . . 4 Agent . . . . . . . . . . . . . . . 66
Preinstallation configuration . . . . . . . . 5 Exercise 10: Viewing managed system status and
Installing and configuring the hub Tivoli testing the heartbeat . . . . . . . . . . . 66
Enterprise Monitoring Server . . . . . . . . 7 Viewing managed system status . . . . . . 67
Installing the Tivoli Enterprise Portal server . . 22 Testing the heartbeat . . . . . . . . . . 67
Installing Tivoli Enterprise Monitoring Agents . . 26 Exercise 11: Using the CLI . . . . . . . . . 68
Installing Tivoli Enterprise Portal desktop client 30 Creating and managing a situation . . . . . 68
Installing support for agents on the monitoring Starting and stopping an agent . . . . . . . 69
server, portal server, and browser and desktop Viewing what your monitoring server is
clients . . . . . . . . . . . . . . . 33 monitoring . . . . . . . . . . . . . 69
Starting the Tivoli Enterprise Portal client . . . 36 Exercise 12: IBM Tivoli Enterprise Console
Exercise 2: Verifying and configuring your integration . . . . . . . . . . . . . . . 70
installation . . . . . . . . . . . . . . 37 Installing the IBM Tivoli Enterprise Console
Verifying your installation . . . . . . . . 37 event synchronization . . . . . . . . . . 70
Configuring history collection . . . . . . . 39 Configuring your monitoring server to forward
Exercise 3: Creating and using situations . . . . 43 events . . . . . . . . . . . . . . . 72
Creating a situation . . . . . . . . . . . 43 Configuring a Tivoli Enterprise Console view . . 73
Editing a situation . . . . . . . . . . . 44 What the view shows . . . . . . . . . . 73
Managing events . . . . . . . . . . . 45 Saving the Tivoli Enterprise Console view . . . 75
Exercise 4: Creating new views for the Tivoli Exercise 13: Filtering and responding to events . . 76
Enterprise Portal. . . . . . . . . . . . . 48 Opening the Enterprise TEC workspace . . . . 76
Creating a view . . . . . . . . . . . . 48 Acknowledging an event . . . . . . . . . 76
Defining a workspace . . . . . . . . . . 48 Filtering events . . . . . . . . . . . . 76
Editing a workspace . . . . . . . . . . 49 Closing an event. . . . . . . . . . . . 77
Creating ranges and sub-ranges on linear and
circular gauge views . . . . . . . . . . 49 Chapter 5. Advanced features . . . . . 79
Exercise 14: Performing an upgrade from Tivoli
Chapter 3. Basic product function . . . 51 Distributed Monitoring . . . . . . . . . . 79
Exercise 5: Creating a policy . . . . . . . . . 51 Software requirements for the test scenario . . . 79
Adding a new policy . . . . . . . . . . 51 Information to gather before you begin . . . . 80
Adding and connecting activities . . . . . . 51 Overview of test scenario steps . . . . . . . 81
This workbook describes the following topics and gives you hands-on experience
with the following tasks:
v Installing IBM Tivoli Monitoring, verifying the installation, and configuring
history collection
v Managing history data collection and the Tivoli Data Warehouse
v Creating and using situations for notification of system conditions
v Creating and editing new views for the Tivoli Enterprise Portal
v Creating policies to perform actions, schedule work, or automate manual tasks
on managed systems in your enterprise
v Configuring and managing the Summarization and Pruning Agent to generate,
store, and prune data that is based on historical records of activity and
conditions in your enterprise
v Using historical reporting and the Business Navigator
v Viewing managed system status and testing the heartbeat
v Synchronizing events between Tivoli Enterprise Portal and the IBM Tivoli
Enterprise Console, and filtering and responding to events
v Performing a test scenario to upgrade from Tivoli Distributed Monitoring
v Exploring the capabilities of agents to monitor system conditions
Publications
This section lists publications in the IBM Tivoli Monitoring library. It also describes
how to access Tivoli publications online and how to order Tivoli publications.
http://publib.boulder.ibm.com/tividd/glossary/tivoliglossarymst.htm
The IBM Terminology Web site consolidates the terminology from IBM product
libraries in one convenient location. You can access the Terminology Web site at the
following Web address:
http://www.ibm.com/ibm/terminology
IBM posts publications for this and all other Tivoli products, as they become
available and whenever they are updated, to the Tivoli software information center
Web site. Access the Tivoli software information center by going first to the Tivoli
software library at the following Web address:
http://www.ibm.com/software/tivoli/library/
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
Note: If you print PDF documents on other than letter-sized paper, set the option
in the File → Print window so that Adobe Reader can print letter-sized pages
on your local paper.
The IBM Software Support Web site provides the latest information about known
product limitations and workarounds in the form of technotes for your product.
You can view this information at the following Web site:
http://www.ibm.com/software/support
Ordering publications
You can order many Tivoli publications online at the following Web site:
http://www.elink.ibmlink.ibm.com/public/applications/
publications/cgibin/pbi.cgi
For additional information, see the Accessibility Appendix in the user’s guide for
this product.
http://www.ibm.com/software/tivoli/education/
Support information
For information about obtaining support, see the Support Appendix in the user’s
guide for this product.
Typeface conventions
This guide uses the following typeface conventions:
Bold
v Lowercase commands and mixed case commands that are otherwise
difficult to distinguish from surrounding text
v Interface controls (check boxes, push buttons, radio buttons, spin
buttons, fields, folders, icons, list boxes, items inside list boxes,
multicolumn lists, containers, menu choices, menu names, tabs, property
sheets), labels (such as Tip:, and Operating system considerations:)
v Keywords and parameters in text
Italic
v Words defined in text
v Emphasis of words (for example, ″Use the word that to introduce a
restrictive clause.″ )
v New terms in text (except in a definition list)
v Variables and values you must provide
Monospace
v Code and other examples
v File names, programming keywords, and other elements that are difficult
to distinguish from surrounding text
v Message text and prompts addressed to the user
v Text that the user must type
v Values for arguments or command options
In addition to the special characters, Tivoli command syntax uses the typeface
conventions described in “Typeface conventions” on page xii. The following
example illustrates the typeface conventions used in Tivoli command syntax:
The start|stop and {pc|all} parameters are the only required parameters for the
itmcmd agent command. The brackets around the -l, -h, -o, -p, -c, and -s
parameters indicate that they are optional. The braces around {pc|all} indicate that
you must either specify a product code (pc) or choose to start or stop all
components.
Note: The Warehouse Proxy, which is used for historical data collection, is
supported only on Windows computers.
The following sections provide suggested layouts for your environment, based on
the type of monitoring server that you plan to use or the required environment for
a specific exercise.
v “Windows monitoring server environment”
v “UNIX (non-Linux) monitoring server environment”
v “Linux monitoring server environment” on page 5
v “Tivoli Distributed Monitoring upgrade environment” on page 5
Tivoli Enterprise Portal Tivoli Enterprise Portal (Linux only) Tivoli Enterprise
server desktop client Portal desktop client
Warehouse Proxy
Warehouse Summarization
and Pruning Agent
UNIX or Linux operating Tivoli Enterprise Portal (Linux only) Tivoli Enterprise
system agent desktop client Portal desktop client
Tivoli Enterprise Portal Tivoli Enterprise Portal (Linux only) Tivoli Enterprise
server desktop client Portal desktop client
Warehouse Summarization
and Pruning agent
Preinstallation configuration
The following steps are required for data warehousing:
v “Create a Windows user” on page 6
v “Create a database for the Warehouse Proxy” on page 6
v “Setting up the ODBC connection” on page 6
Note: These instructions assume that you installed DB2 for data warehousing on
the computer where you plan to install the Warehouse Proxy.
Note: If you are running Windows 2003 or Windows XP and have security set
to check the software publisher of applications, you might receive an
error message that the setup.exe file is from an unknown publisher.
Click Run to disregard this error message.
A welcome window (Figure 1 on page 8) is displayed:
Note: If your computer meets all prerequisites, this window (Figure 3) is not
displayed.
4. If you do not have a DB2 or MS SQL database installed on this computer, a
message regarding potentially missing software is displayed (Figure 3).
Because you do not need a database to use this computer as a monitoring
server, you can click Next and ignore the message.
5. Choose the directory where you want to install the product (Figure 4). The
default directory is C:\IBM\ITM. Click Next.
6. Type a 32-bit encryption key (Figure 5). You can use the default key.
Notes:
a. Do not use any of the following characters in your key:
v Equal sign (=)
v Apostrophe (’)
v Pipe key, also known as the bar key or vertical bar (|)
b. Ensure that you document the value that you use for the key. Use this key
during the installation of any components that communicate with this
monitoring server.
Click Next and then click OK to confirm the encryption key.
10. Select a program folder (Figure 8) and click Next. The default program folder
name is IBM Tivoli Monitoring.
11. Review the installation summary details. This summary identifies what you
are installing and where you chose to install it. Click Next to begin the
installation of components.
After the components are installed, a configuration window (Figure 9 on page
16) is displayed.
13. Click OK on this window (Figure 10) to accept the default values.
14. Click OK on this window (Figure 11) to accept the default values for the
communications protocol for the monitoring server. The next configuration
step adds application support to the monitoring server.
15. Specify the location of the monitoring server. You have two choices:
v On this computer
v On a different computer
20. Click OK to accept the default values for the communications protocol for the
monitoring server.
Now you can complete the installation (Figure 13 on page 19).
21. Clear the check box next to Display the README file (Figure 13).
22. Click Finish to complete the installation.
For Windows 2003, click Next and then click Finish.
Installing the monitoring server: Use the following steps to install the monitoring
server on a UNIX computer:
1. In the directory where you extracted the installation files, run the following
command:
./install.sh
Configuring the monitoring server: Use the following steps to configure the hub
monitoring server:
1. At the command line change to the opt/IBM/ITM/bin directory (or the
directory where you installed IBM Tivoli Monitoring).
2. Run the following command:
./itmcmd config -S -t ms_name
Use the following steps to add application support to the hub monitoring server:
1. Start the monitoring server by running the following command:
./itmcmd server start ms_name
2. Run the following command to add the application support to the monitoring
server, where pc is the product code:
./itmcmd support -t ms_name pc pc pc
For example:
./itmcmd support -t hub_itmdev17 a4 lz nt sy tm ul um ux
3. Stop the monitoring server by running the following command:
./itmcmd server stop ms_name
4. Restart the monitoring server by running the following command:
./itmcmd server start ms_name
Note: If you are installing this component on a computer where you have
already installed an IBM Tivoli Monitoring component (such as the
monitoring server), you see the another window (Figure 14) instead of
the Welcome window:
Figure 14. Installing a new component on a computer with an existing IBM Tivoli Monitoring
component
Note: This step applies only if this component is the first that you are
installing on this computer. Otherwise, the existing program folder
name is used.
11. Click Next to start the installation.
A configuration window is displayed.
12. Clear any components that you have already installed and configured (if you
are installing multiple components on the same computer) and click Next to
begin configuring the portal server and the connection to the monitoring
server and to open Manage Tivoli Enterprise Monitoring Services.
13. Type the host name of the computer where you are installing the portal server
and click Next.
14. Configure the portal server connection to the data source (such as your DB2
database). Type the password for the database administrator in the Admin
Password field.
15. Type a database user ID and password. Click OK.
Installing the portal server and desktop client: Use the following steps to install
the portal server and desktop client:
Note: Run these installation and configuration procedures as either the root user
or as the DB2 administrator.
1. In the directory where you extracted the installation files, run the following
command:
./install.sh
2. When prompted for the IBM Tivoli Monitoring home directory, press Enter to
accept the default (opt/IBM/ITM).
3. Type y and press Enter to create this directory.
If you have already installed an IBM Tivoli Monitoring component on this
computer (such as the monitoring server), this directory already exists. In that
case, you are prompted to indicate whether you want to use the same
directory. Type y and press Enter.
4. The following prompt is displayed:
Select one of the following:
1) Install products to the local host.
2) Install products to depot for remote deployment
(which requires TEMS).
3) Exit install.
Note: If you have already installed another IBM Tivoli Monitoring component
on this computer, this step does not occur.
A numbered list of available operating systems is displayed.
Configuring the portal server on Linux: Use the following steps to configure the
portal server:
1. At the command line change to the opt/IBM/ITM/bin directory.
2. Run the following command:
./itmcmd config -A cq
3. Press Enter when you are prompted to indicate whether the agent connects to
a monitoring server.
4. Type the host name for the hub monitoring server and press Enter.
5. Press Enter when you are prompted to indicate whether the agent must
connect through a firewall. The default value is NO.
6. Type the protocol to use to communicate with your hub monitoring server,
and press Enter.
7. Press Enter without specifying a backup protocol.
8. Press Enter to accept the default IP port number (1918).
9. Press Enter when you are prompted to indicate whether you want to
configure the connection to a secondary monitoring server. The default value
is NO.
10. Press Enter to accept the default for the Optional Primary Network Name
(NONE).
11. Type the DB2 instance name. The default value is db2inst1. Press Enter.
12. Type the DB2 administrator ID. The default is db2inst1. Press Enter.
13. Type the password for the DB2 administrator ID and press Enter.
14. Confirm the password for the DB2 administrator ID by typing it again. Press
Enter.
Starting the portal server: Run the following command to start the portal server:
./itmcmd agent start cq
The agent that you are installing might require additional configuration steps. See
the agent documentation (specifically the configuration chapter in the user’s guide)
for more information.
If you are installing any of the following agents, launch the installation using the
setup.exe or install.sh files that are part of the base IBM Tivoli Monitoring
installation package:
v ITM 5.x Endpoint
v Linux OS
v UNIX Logs
v UNIX OS
v Universal Agent
v Warehouse Proxy
v Warehouse Summarization and Pruning
v Windows OS
If you are installing any other agents (for example, DB2 or Exchange), launch the
agent installation using the setup.exe or install.sh files that are part of the different
agent installation packages.
Note: If you are installing this component on a computer where you have
already installed an IBM Tivoli Monitoring component such as the
monitoring server, you see the another window (Figure 15) instead of
the Welcome window:
Figure 15. Installing a new component on a computer with an existing IBM Tivoli Monitoring
component
Note: If your computer has all required software, including the IBM Java
SDK, you cannot see this window.
6. Click Next to use the default installation directory.
Note: This step applies only to those agents that you install from the IBM
Tivoli Monitoring installation image. Agents installed from the agent
installation image do not have this step. If you are installing an agent
from an agent installation image, skip to step 8.
7. Specify an encryption key to use. This key must be the same key that was
used during the installation of the monitoring server to which this agent will
connect. Click Next and then OK to confirm the encryption key.
8. Click the plus sign (+) next to Tivoli Enterprise Monitoring Agents and select
the following agents:
v Monitoring Agent for Windows OS
v Universal Agent
Installing the monitoring agent: Use the following steps to install a monitoring
agent on a UNIX computer:
1. In the directory where you extracted the installation files, run the following
command:
./install.sh
2. When prompted for the IBM Tivoli Monitoring home directory, press Enter to
accept the default (opt/IBM/ITM).
3. Type y and press Enter to create this directory.
If you have already installed an IBM Tivoli Monitoring component, such as
the monitoring server, on this computer, this directory exists. In that case, you
are prompted to indicate whether you would like to use the same directory.
Type y and press Enter.
4. The following prompt is displayed:
Select one of the following:
1) Install products to the local host.
2) Install products to depot for remote deployment
(which requires TEMS).
3) Exit install.
Note: If you have already installed another IBM Tivoli Monitoring component
on this computer, this step does not occur.
A numbered list of available operating systems is displayed.
9. Type the number for the operating system on which you are installing. The
default value is your current operating system. Press Enter.
10. Type y to confirm the operating system and press Enter.
A numbered list of available components is displayed.
11. Type the number that corresponds to the monitoring agent or agents that you
want to install. If you want to install more than one agent, use a comma (,) or
a space to separate the numbers for each agent. Press Enter.
A list of the components to install is displayed.
Configuring the monitoring agent: Use the following steps to configure your
monitoring agent:
1. Run the following command:
./itmcmd config -A pc
where pc is the product code for your agent. For the UNIX agent, use the ux
product code; for Linux, use lz. Running the cinfo command shows the
agents that are installed.
2. Press Enter when you are prompted to indicate whether the agent connects to
a monitoring server.
3. Type the host name for the monitoring server.
4. Press Enter when you are prompted to indicate whether the agent must
connect through a firewall. The default value is NO.
5. Type the protocol that you want to use to communicate with the monitoring
server. Ensure that this protocol is the same communications protocol that you
selected when you configured the monitoring server.
6. Press Enter without specifying a backup protocol.
7. Press Enter to accept the default port number (1918).
8. Press Enter to not specify the name of the KDC_PARTITION.
9. Press Enter when you are prompted to indicate whether you want to
configure the connection to a secondary monitoring server. The default value
is NO.
Note: This step applies only to agents installed from the IBM Tivoli
Monitoring installation image.
10. Press Enter to accept the default for the Optional Primary Network Name
(none).
You can start all agents running on a computer or start individual agents by using
the product codes:
v To start all monitoring agents, run the following command:
./itmcmd agent start all
v To start specific agents, run the following command:
./itmcmd agent start pc pc pc
Note: If you are installing this component on a computer where you have
already installed an IBM Tivoli Monitoring component such as the
monitoring server, you see this window (Figure 16) instead of the
Welcome window:
Figure 16. Installing a new component on a computer with an existing IBM Tivoli Monitoring
component
Click Modify.
3. Accept the software license by clicking Accept.
4. If you do not have a DB2 or MS SQL database or the IBM Java SDK installed
on this computer, a message regarding potentially missing required software is
displayed. You do not need any of this software installed on this computer if
you are not installing the portal server on this computer. Click Next to
continue.
5. Read the information regarding potentially missing prerequisites and click
Next.
6. Specify the directory where you want to install the portal software and
accompanying files. The default location is C:\IBM\ITM. Click Next.
7. Type an encryption key to use. This key must be the same key that was used
during the installation of the portal server to which the client will connect.
Click Next and then OK to confirm the encryption key.
8. Select Tivoli Enterprise Portal client.
9. Expand Tivoli Enterprise Portal client and ensure that Tivoli Enterprise
Console GUI Integration is selected.
10. Click Next without selecting any agents to deploy.
11. Specify the program folder name and click Next.
Note: This step applies only if this component is the first that you are
installing on this computer. Otherwise, the existing program folder
name is used.
12. Confirm the installation details and click Next to start the installation.
After the installation is complete, a configuration window is displayed.
Installing the desktop client: Use the following steps to install the portal server
and desktop client:
1. In the directory where you extracted the installation files, run the following
command:
./install.sh
2. When prompted for the IBM Tivoli Monitoring home directory, press Enter to
accept the default (opt/IBM/ITM).
3. Type y and press Enter to create this directory.
If you have already installed an IBM Tivoli Monitoring component such as the
portal server on this computer, this directory already exists. In that case, you
are prompted to indicate whether you would like to use the same directory.
Type y and press Enter.
4. The following prompt is displayed:
Select one of the following:
1) Install products to the local host.
2) Install products to depot for remote deployment
(which requires TEMS).
3) Exit install.
Configuring the portal desktop client on Linux: Use the following steps to
configure the desktop client on Linux:
1. At the command line change to the opt/IBM/ITM/bin directory.
2. Run the following command:
./itmcmd config -A cj
3. Press Enter to use the default instance name.
4. Type the host name for the portal server and press Enter.
5. Press Enter when you are prompted to indicate whether to use HTTP Proxy
support. The default value is No.
The desktop client is now configured. The next step is to start the portal server
and portal desktop client.
When you installed the monitoring server, portal server, and portal desktop client
using the instructions earlier in this chapter, the support for agents on the IBM
Tivoli Monitoring installation image was installed by default. Now you must
return to each component and install the support for all agents installed from
agent installation images.
Note: This steps assume that you have installed the monitoring server and portal
server on one computer. If you are installing the support on a Windows
portal server or portal client (without another component), select only those
options that apply to what is installed on your computer.
1. Open Manage Tivoli Enterprise Monitoring Services.
2. Stop the portal server by right-clicking and then clicking Stop.
3. Right-click the component and click Change startup.
4. Select Manual and click OK.
5. Restart the computer.
6. In the directory where you downloaded and extracted the agent installation
files, double-click the setup.exe file to launch the agent installation.
7. Click Next on the Welcome window.
Note: If you are installing the support separately from the agent itself and
you have already installed an agent on this computer, you see another
window (Figure 17):
Note: If you have already installed another IBM Tivoli Monitoring component
on this computer or you are installing support for an agent from an
agent installation image, this step is not included.
A numbered list of available operating systems and component support is
displayed.
10. Type the number that corresponds to one of the following:
v Tivoli Enterprise Portal Browser Client support
v Tivoli Enterprise Portal Desktop Client support
v Tivoli Enterprise Portal Server support
v Tivoli Enterprise Monitoring Server support
Note: Portal Browser Client support, Portal Desktop Client support, and
Portal Server support apply only to a Linux monitoring server that also
has an installed portal server. If your monitoring server is on AIX® or
Solaris, these options do not apply to you. You must separately install
the portal browser client, desktop client, and server support on the
computer where your portal server is installed.
where ms_name is the name of the monitoring server and pc is the product
code for the agent.
To view the product code for the agent support you just installed, run the
following command:
./cinfo
Type 1 when prompted to display the product codes for the components
installed on this computer.
Add application support only for the agent you installed. For example, if
you installed the support for the DB2 agent, run the following command:
./itmcmd support -t hub_itmdev17 ud
On Windows:
1. Click Start → Programs → IBM Tivoli Monitoring → Tivoli Enterprise Portal.
2. Type the user name in the login field. The default user name is sysadmin.
3. Do not type a password in the Password field. By default, the sysadmin ID
does not require a password.
4. Click OK.
On Linux, run the following command to start the portal desktop client:
./itmcmd agent start cj
Note: If you do not have the IBM Java SDK 1.4.2 installed on the computer where
you are using the browser client, it is installed automatically. Follow the
prompts on the window to install the SDK.
1. Start the Microsoft® Internet Explorer browser.
2. Type the URL for the Tivoli Enterprise Portal into the Address field of the
browser. The URL is http://systemname:1920///cnp/client, where the
systemname is the host name of the machine where the Tivoli Enterprise Portal
Server and browser component are installed.
3. Click Yes on the Warning - Security window.
4. Type the user name in the login field. The default user name is sysadmin.
5. Do not type a password in the Password field. By default, the sysadmin ID
does not require a password.
6. Click OK.
Every Tivoli Enterprise Monitoring Agent (also called monitoring agents or agents)
provides a default set of situations that you can use to begin monitoring your
environment immediately.
d. Type the user name in the login field. The default user name is sysadmin.
e. Click OK.
f. Click Accept on the certificate window.
2. In the Navigation tree (on the left side of the portal), expand the tree until you
see the operating system such as Windows Systems that you installed.
3. To view the default situations, right-click the agent and click Manage
Situations.
A list of all available situations is displayed (Figure 19 on page 39). You can
view the status of each situation, as well as other information.
Note: Before you can use history collection, you must install the Warehouse Proxy
on a Windows computer, preferably the portal server. See “Exercise 1:
Installing IBM Tivoli Monitoring” on page 3 for installation steps. You must
also perform the preinstallation configuration steps, which are documented
in “Preinstallation configuration” on page 5.
Note: These steps are based on a DB2 database. The steps might be different if
you are using another type of database.
a. Select the database that you are using for the Warehouse Proxy and click
OK. You have the following choices:
v DB2
v SQL Server
v Oracle
v Other database type
b. Complete the following fields as appropriate:
Data Source Name
The name of the data source. The default is ITM Warehouse. If you
want to define a new data source, type a new name here.
Otherwise, leave the default value.
Database Name
The name of the database. If you used the steps in “Create a
database for the Warehouse Proxy” on page 6 to create the database,
the name is wproxy. If you are defining a new data source and want
to specify a different database, type the name here. Otherwise, leave
the default value.
Admin User ID
The user ID for the database administrator. The default for DB2 is
db2admin.
Admin Password
The password for the database administrator.
Database User ID
The name of the user that accesses the IBM Tivoli Monitoring data
warehouse. The default name is ITMUser.
Database Password
Type a password for the database user. If your environment requires
complex passwords, include a numeric character in the password.
Reenter Password
Confirm the password by typing it again.
c. If this information is different from what you used when you configured the
Tivoli Enterprise Portal server, select Synchronize TEPS Warehouse
Informationto update the portal server configuration with the same values.
d. Click OK.
desktop:
b. Type the user name in the login field. The default user name is “sysadmin”.
c. Click OK.
2. Click Edit → History Configuration to open the History Collection
Configuration window.
3. Do one of the following steps:
For Windows, do the following steps:
a. Select Windows OS in the Select a product list.
b. Select all attribute groups that start with NT_ from the Select Attribute
Groups table.
Note: Click the Group column heading in the Select Attribute Groups
table to sort the attribute groups by name.
Note: The Tivoli Monitoring Services Logs apply to all applications. If you want to
save the information in these logs, configure them for warehousing.
1. Select CCC Logs in the Select a product list.
2. Select all groups from the Select Attribute Groups table except for Universal
Message and TWORKLST.
Note: Some of the logs have historical configuration values that cannot be
changed. After you click Configure, values that are different from those that
you specified might be displayed. The collection occurs at the values that
the product determines.
Creating a situation
Use the following procedures to create a situation:
v “Creating a new situation on Windows”
v “Creating a new situation on Linux or UNIX” on page 44
Next, stop the Alerter service to trigger the situation. Use the following steps:
Now, return to the Tivoli Enterprise Portal to see the situation event. In the
Navigation tree, click Enterprise to display the Enterprise Status workspace, which
might take up to 30 seconds to display. An event is listed in the Situation Event
Console on Enterprise View, and red Xs are displayed for Windows Systems,
Windows OS, and System.
Now, return to the Tivoli Enterprise Portal to see the situation event. In the
Navigation tree, click Enterprise to display the Enterprise Status workspace. (This
might take up to 30 seconds to display.) An event is listed in the Situation Event
Console on Enterprise View, and red Xs are displayed next to UNIX Systems,
UNIX OS, and Disk Usage.
Editing a situation
Use the following steps to edit an existing situation.
Managing events
Use the following options to manage events:
v “Opening the event workspace”
v “Creating or removing an acknowledgement”
v “Closing an event” on page 46
v “Adding an Event Console view to the workspace” on page 46
v “Adding a message log view to the workspace” on page 47
v “Setting the Universal Message console view” on page 47
Closing an event
There are two types of events:
Pure Occur automatically, such as when a paper out condition occurs on the
printer or when a new log entry is written. Situations written to notify you
of pure events remain true until they are manually closed or automatically
closed by an UNTIL clause. You can close pure events.
Sampled
Occur when a situation becomes true. Situations sample data at regular
intervals. When the situation is true, it opens an event, which is closed
automatically when the situation reverts to false. You can close it manually
also. To close a sampled event, you must first stop the situation.
Before you can close an event, you must stop the situation that triggered the event.
To do that, right-click the situation row in the Situation Event Console and click
.
Situation flyover list: Do the following to close an event from the event flyover
list:
1. In the Navigator move the mouse over the event indicator to open a flyover
listing of the true situations.
2. In the flyover list right-click the situation whose event you want to close.
3. Click the Close Situation Event icon.
Navigator item: Do the following steps to close a pure event that is also known as
an unsampled event, from the Navigator item for a situation. You can tell if the
event is a pure event by looking at the Type column in the message view.
1. In the Navigator move the mouse over the event indicator to open a flyover
listing of the true situations.
2. In the flyover list click a situation name to open its event workspace.
3. In the Navigator right-click the situation name and click the Close Situation
Event icon.
Event console view: To close an event from the event console view:
1. In the Enterprise workspace where the event console view displays, right-click
the event you want to close.
To access this workspace, click Enterprise in the Navigation tree.
2. Click the Close Situation Event icon.
Creating a view
1. In any view in your workspace, click the Split Vertically icon or the Split
Horizontally icon.
2. Click the Browser icon.
3. Click inside the view where you want the Browser view.
4. Click Save to update the workspace properties with the new view.
5. Try creating any of the additional views by repeating steps 1 through 5:
v Table
v Pie chart
v Bar chart
v Plot chart
v Graphic
v Terminal
v Notepad
Note: These view options are available at the top of the portal window. Hover
over each icon to see the type of view.
Defining a workspace
Defining a workspace includes the following tasks:
v “Changing the view type”
v “Editing view properties”
v “Saving a new workspace” on page 49
Editing a workspace
Use the Properties editor to change the general characteristics of a workspace and
to edit the style and content of any of its views.
1. Click the Properties icon.
The Properties editor opens. The tree on the left shows the workspace name
selected, with the workspace properties on the right.
2. Make changes to the Workspace Identity and Workspace Options sections.
3. If you want to edit the properties for a particular view, select a view from the
Properties tree and make changes to the view properties.
4. Click OK to save your changes and close the Properties editor.
12. Try creating a Circular Gauge view by repeating steps 1 through 11.
Note: You cannot rename the policy after you click Apply or OK.
Instead, you must copy the policy and change the name for the
new policy.
Distributed
Click the check box to open the Change Policy Distribution window;
select the computer on which you want to run this policy (either your
monitoring server or one of the standalone agents that you installed).
Click OK to close this window.
Description
The description for the policy.
Launch application
Your user ID must have Launch permission for the Launch Application feature.
The default user, sysadmin, has this permission by default. If you create additional
users, you must grant this permission to them.
Take action
The Take Action feature lets you interact directly with your applications and
operating system. Take Action has a text box for entering your own system
Note: The portal must be running on the computer where you want to take this
action.
1. Click Process in the Navigator view to open the workspace.
2. Right-click Process and select Workspace → Process Overview.
3. Right-click Process → Launch.
4. In the Create or Edit Launch Definitions window, select WordPad.
5. Click Launch.
6. Click OK.
7. In the Tivoli Enterprise Portal, find the wordpad process in the Process Name
column of the Process Overview section at the bottom of the window.
Note: Even if data collection was started, you cannot use the time span feature if
the query for the chart or table includes any column functions. In that case,
you can select or create another query to activate the Time Span feature.
Note: If you selected a Group By column, you cannot specify a sort order.
v Specify the exact number of rows to show in the view by clicking Advanced
and selecting First to retrieve.
7. Click Apply to save the query and keep the editor open.
8. Click OK to save the query and close the window.
Note: The attributes in a query can be from one group only; you cannot mix
attributes from different groups in the same query.
Deleting a query
If you delete a query that is being used by a view, the view is subsequently not
associated with a query and does not have data the next time that you open its
workspace.
When saving the results, you can select additional columns from the query, even if
they were filtered out of the view, or fewer columns. Furthermore, you can save all
the rows that were returned or, if there are multiple pages, just those on the
current page.
Use Ctrl+click to select multiple columns or Shift+click to select all columns from
the first one selected to this point.
More about the Graphic Editor: For additional information and procedures for
using the Graphic Editor, refer to the Graphic Editor section of the online help.
From the Help menu, select Contents and Index. In the Contents pane, click
Customizing Your Environment Views Graphic View.
This lesson shows you how to create a new Navigator view and customize it. The
purpose of this view is to ensure that coffee gets made.
Sharing items
Navigator items are shared by selecting them from the source view on the right,
dragging to the target view, and dropping on the item they follow.
1. Open the Windows Systems branch.
If you do not have Windows Systems, choose another operating platform:
Linux, OS/390® or UNIX.
2. Select your managed system if you can see it; or select another one such as
Primary:MYSYSTEM:NT.
3. Drag and drop it on Coffee.
When positioned over the target item, the pointer changes to and a border
is displayed around the item.
Notice the over the icon of the original and copied Navigator items. The
indicates that the following source Navigator item designations are also shared
with the new Navigator item:
v Assigned managed systems
v Defined workspaces
Deleting items
Delete one of the Navigator items:
1. Select the Floor 2 item and click Delete Item.
2. When a message prompts you for reassurance, click OK.
Navigator items are listed in the view in the order in which they are created on
that branch. If you must move an item to a different location, you must delete
it and create it again where you want it to be displayed and in the order in
which it should be displayed.
Renaming items
Rename one of the Navigator items.
1. Right-click Reception (under Floor 1) and select Properties.
2. In the Name field, change the name to Front Desk.
3. Click OK.
Associating situations
Some items in the Coffee view—the shared items—might have associated
situations, so that when the situation becomes true an event indicator lights up the
Navigator item and the items above it.
The Front Desk Navigator item you created and to which you assigned a managed
system can also show event indicators, but only after situations have been
associated with it.
1. In the Coffee Navigator view, right-click the Front Desk item and select
Situations from the pop-up menu.
2. Click the Situation Filter icon to open the Show Situations window.
3. Select the Eligible for Association check box and click OK.
4. Select a situation from the list.
5. Right-click the situation, then select the Associate icon.
6. Check your work: Click the Situation Filter icon, clear the Eligible for
Association check box, then click OK.
The situation you associated is displayed in the list, but situations that were not
associated with this Navigator item are not displayed.
7. Click OK to close the Situation editor. The next time the situation becomes true,
an event indicator will be displayed over this Navigator item and over its icon
in the graphic view in the Coffee workspace.
Pruning data means that old data is deleted automatically, rather than manually.
You can set pruning criteria to remove old data from the data warehouse to limit
the size of your database tables.
During installation of the Summarization and Pruning Agent, default values in the
KSYENV file populate configuration settings. To change the system-wide default
settings for data summarization or pruning configurations, use the Manage Tivoli
Enterprise Monitoring Services window to make your changes, which affect all
products and attribute groups. If you want to change the data summarization or
pruning configuration settings for certain products and attribute groups, use the
History Collection Configuration window in the Tivoli Enterprise Portal GUI.
Note: The attribute groups that you can change are displayed in a table.
When you select a product, you are configuring collection or pruning,
or both, for all attribute groups for that product.
3. Click the Groups column to sort the attribute groups.
4. Click Show Default Groups at the bottom of the window.
5. If you want to select more than the default groups, select any of the NT_
attribute groups for which you want to change configurations.
6. Click Stop Collection.
7. In the Configuration Controls section:
To turn off summarization and pruning for the NT–System attribute group in the
Historical Collection Configuration window:
1. Select the Windows Servers in the Select Attribute Groups window.
2. Select NT_System.
3. Click Stop Collection.
4. Click Unconfigure Groups.
Exercise 10: Viewing managed system status and testing the heartbeat
The hub Tivoli Enterprise Monitoring Server listens for heartbeats to track the
online or offline status of monitoring agents. A monitoring agent sends a heartbeat
every 10 minutes. Within a short time interval after a missed heartbeat, the
monitoring server considers the monitoring agent to be offline. The online or
offline status of the monitoring agent is also called the managed system status.
Note: Run the tacmd.bat command only once (that is, only when setting up the
environment at the beginning of the exercise.) Thereafter, to avoid
duplications of environment variables, specify tacmd, which runs the
tacmd.exe command.
Each of these commands has more detailed help information than what is
provided in the tasks below. To see all of the parameters and functions for a
command, run the following command:
tacmd help command
where command is the name of the specific command for which you want
information.
For this procedure, create a new situation based on the My_Situation situation.
Run the following steps on the computer where you installed the monitoring
server:
1. Open a command line window (or terminal window).
2. Change to the directory where you installed IBM Tivoli Monitoring.
3. Change to the \BIN (Windows) or /bin (UNIX) subdirectory.
4. Run the following command to log into the computer:
For Windows:
tacmd login -s hostname -u sysadmin
For UNIX:
CANDLEHOME=/opt/IBM/ITM; export CANDLEHOME
tacmd.sh login -s hostname -u sysadmin
Note: You might still see a blinking cursor after you press Enter. Do not press
Enter again. Wait a few minutes for the command to process.
6. Run the following command to export the details of my_situation to a file:
tacmd viewSit -s My_Situation -e viewmysituation.out
7. Edit the output file in a text editor to change one situation variable - Interval.
Change the following values:
SITNAME
Change from My_Situation to new_situation
REEV_TIME
Change from 000030 to 001500
To view your new situation, you can either run the tacmd viewSit command
again, using the new situation name, or open the Tivoli Enterprise Portal and look
there.
To view all of the situations on your monitoring server, run the following
command:
tacmd listSit
You can use the preceding commands to export a situation from one monitoring
server and import it on another. To import a situation from Computer A to
Computer B do the following steps:
1. On Computer A, where the situation already exists, run the tacmd viewSit -s
situation_name -e filename command.
2. Transfer the output file to Computer B.
3. On Computer B, where you want to create the situation, run the tacmd
createSit -i filename command. If a situation with the same name does not
already exist on Computer B, you need not edit the output file to change the
situation name (as in the preceding procedure).
This command stops all agents of the specified type on the monitoring server. You
are prompted for confirmation before the agents are stopped.
This command starts all agents on the monitoring server. Again, you are prompted
for confirmation before the agents are started.
If you want to view Tivoli Enterprise Console events (and not IBM Tivoli
Monitoring events) only, you need not install the event synchronization or
configure event forwarding.
Table 9 outlines the features of the IBM Tivoli Enterprise Console integration and
the required steps to use those features.
Table 9. IBM Tivoli Enterprise Console integration
Goal Where to find information
Send IBM Tivoli Monitoring events to Tivoli “Installing the IBM Tivoli Enterprise Console
Enterprise Console and keep the situation event synchronization”
events displayed in the Tivoli Enterprise
Portal in synch with updates made on the
event server.
Forward situation events from the “Configuring your monitoring server to
monitoring server to the event server. forward events” on page 72
View events (both situation events from IBM “Configuring a Tivoli Enterprise Console
Tivoli Monitoring and other events on the view” on page 73
event server) through the Tivoli Enterprise
Portal.
Note: For Windows, the existing rule base must have been created with a
relative (not absolute) path. To verify that your existing rule base uses an
absolute path, run the following command from a bash environment on
your event server:
wrb -lsrb -path
Note: If your IBM Tivoli Enterprise Console event server is running on Windows
2003 and you are planning to install the event synchronization remotely
(using a program such as Terminal Services to connect to that Windows 2003
computer), you must run the change user /install command before you run
the installation to put the computer into the required “install” mode. After
the installation, run the change user /execute command to return the
computer to its previous mode.
Note: After you install the event synchronization, your event server is recycled.
1. Launch the event synchronization installation:
v On Windows, double-click the setupwin32.exe file in the \TEC subdirectory
on the IBM Tivoli Monitoring installation media.
v On Linux or UNIX, change to the /os_type/TEC subdirectory of the IBM
Tivoli Monitoring installation media, where os_type is the one of the
following operating types that corresponds to the installation CD that you
are using:
– “unix” for AIX and Solaris
– “hpux” for HP-UX
– “xlinux” for Linux for Intel®
– “zlinux” for Linux for z/OS
Run the following command:
setup operating system.bin
where operating system is the operating system on which you are installing.
For example, run the following command on an AIX computer:
setupAix.bin.
2. Click Next on the Welcome window.
3. Select I accept the terms in the license agreement and click Next.
4. Click Next to accept the default configuration values.
5. Click Next to accept the default values for the files where events will be
written.
6. Type the following information for each monitoring server with which you
want to synchronize events and click Add:
Host name
The fully qualified host name for the computer where the monitoring
server is running. This name must match the information that will be
in events that come from this monitoring server.
User ID
The user ID to access the computer where the monitoring server is
running.
Password
The password to access the computer.
Note: This step is available only if you are creating a new rule base.
12. Click Next.
13. Click Next on the preinstallation summary panel.
The installation begins.
14. When the installation and configuration steps are finished, click Finish on the
Summary Information window.
These tools show the number of events for each severity and
enable you to filter out Unknown, Harmless, Warning, Minor,
Critical, or Fatal events or any combination thereof. The example
here shows that Harmless events have been excluded and the
number received is 0. These are toggle tools: click again to resume
display of that event severity.
These tools hide the events for your user ID or those of all other
operators signed on to the event server. These are toggle tools:
click again to resume display of the events for your user ID or
other operators.
This tool is used to retrieve new and updated events. If no events
were selected in the Working Queue, it is updated. If any events
are selected in the Working Queue, the Tivoli Enterprise Console
icon button is available in the row of buttons at the bottom of the
Working Queue. Click the button to refresh the Working Queue
with new updates. This button applies only to the Working Queue.
The All Events queue is updated immediately upon retrieval.
An automated task is configured ahead of time and run when a
particular event is received by the event console. For example, you
can configure an automated task to send an e-mail message to an
administrator when an event matching the criteria you defined
ahead of time is received by the event console. Automated tasks
are configured using the Automated Tasks menu in the Event
Viewer.
When an automated task completes, it issues information about its
success or failure, and any results created by the task. The
task-completion icon is displayed in the first column of the Event
Viewer when an automated task completes. You can double-click
this icon to view automated task results.
Buttons Select an event row (Figure 21 on page 75) to enable the buttons to
Acknowledge the event, Close the event, open a tabbed window
with event Details, or to display Information about the event. The
Forwarding events
Situation events generated at the Tivoli Enterprise Monitoring Server are
forwarded to the Tivoli Event Console event server. When changes are made to the
events on the event server, those changes are forwarded to the monitoring server.
Thus, you can see events and any actions taken such as acknowledgements, from
any location in your network that these servers monitor.
The severities for situation events forwarded from the Tivoli Enterprise Portal to
the event server are defined in one of the following places:
v The SITINFO field in the situation
v The tecserver.txt file (located in <install_dir>\cms\TECLIB\ on Windows and
<install_dir>/tables/<ms_name>/TECLIB on UNIX), if the situation and
appropriate severity is defined in it
v The situation name suffix itself. For example, a situation named
sit_name_WARN has a WARNING severity in the event server.
If you want to modify the severities for events forwarded from Tivoli Enterprise
Portal to the event server, see the IBM Tivoli Monitoring Administrator’s Guide for
information about editing the tecserver.txt file.
If the view does not populate with events it means that no events were received
for the managed system associated with this Navigator item.
Use the following steps to split the situation event console view and add another
enterprise console view:
1. Click in the situation event console view toolbar.
2. Click , then click inside the situation event console view on the left.
3. In the Tivoli Enterprise Console Configure window, select an event group for
the Filter Type and the name of a specific group for Filter Name. Click OK.
4. Click to save the workspace with the Navigator view collapsed and with
the two new Tivoli Enterprise Console views.
Note: Use the same event server that you specified when you configured
the Tivoli Enterprise Console view.
b. Name is your Tivoli Management Framework login ID.
c. Password is your Tivoli Management Framework login password.
The Enterprise TEC workspace is displayed.
Acknowledging an event
Use the following steps to acknowledge an open event:
1. Click a row inside one of the Tivoli Enterprise Console views that has an event
showing Open in the Status column.
2. Click Acknowledge (or right-click the row and click Acknowledge).
The Status changes to Acknowledging while the action is being processed, then
becomes Acknowledged when the Tivoli Enterprise Console server has
completed processing the action.
3. Click Maximize in the event console view toolbar so that you can better
observe the activities in this view.
Filtering events
Use the following steps to filter the events:
3. Click each of the filters: once to hide your events or other operators’,
and again to show them.
Closing an event
Use the following steps to close the acknowledged event:
1. If it is not selected, click the row of the event you just acknowledged.
2. Click Close (or right-click the row and click Close).
The Status changes to Closing while the action is being processed, then
becomes Closed when the Tivoli Enterprise Console server has completed
processing the action.
To keep the upgrade simple, the test scenario describes the steps for upgrading
from a Tivoli management region where Tivoli Distributed Monitoring is installed
on only one gateway. A single Windows endpoint is assigned to the gateway.
However, you need not duplicate this setup in your test environment. If you have
a Tivoli management region with multiple gateways or endpoints where Tivoli
Distributed Monitoring is running, you can simulate the environment of the test
scenario by using a sample infrastructure file that is provided in the upgrade
toolkit.
During the test scenario, you use a script provided with the toolkit to create and
distribute a Tivoli Distributed Monitoring profile to a Windows endpoint. You can
distribute the profile to an existing Windows endpoint that already has other
profiles, or you can create or use a clean endpoint. The advantage of using a clean
In the following sample result, gw1 is the gateway label and ep1 is the
Gateway name name of an endpoint assigned to the gateway:
G 150509384.1.593 gw1
150509384.2.522+#TMF_Endpoint::Endpoint# ep1
v To list the operating systems of all endpoints assigned to a particular
Name of the Windows endpoint gateway, type:
assigned to the gateway
wep ls -g gateway_label -i interp
4. Gather the information listed in Table 12 about the hub Tivoli Enterprise
Monitoring Server and Tivoli Enterprise Portal Server that you installed in
preparation for this exercise. (See “Tivoli Distributed Monitoring upgrade
environment” on page 5.)
Table 12. Information to gather about the IBM Tivoli Monitoring infrastructure components to use for the test scenario
Information to gather Notes
Hub monitoring server name When you installed the hub Tivoli Enterprise Monitoring Server, you
selected the default name for the server. The default name is HUB_hostname,
Fully qualified host name of the where hostname is the short host name of the server.
Windows computer where the hub
monitoring server and portal server For example, if itmserv16.lab.company.com is the fully qualified host name
are installed of the computer where the hub monitoring server is installed, the default
name for the server is HUB_itmserv16.
Note: You can usually determine the number and types of IBM Tivoli Monitoring
servers to install (Step 3) before you install the servers (Step 4). However,
because the test scenario simulates a very small Tivoli management region,
it is known in advance that you can use the single Tivoli Enterprise
Monitoring Server and Tivoli Enterprise Portal Server that you already
installed in preparation for this exercise. See “Tivoli Distributed Monitoring
upgrade environment” on page 5.
When using the Windows command line, replace $directory with %directory% and
replace each forward slash (/) with a backslash (\) in directory paths. Also, replace
the names of UNIX system commands with Windows commands where needed.
For example, replace mv with rename.
Table 14 lists the long and short names of IBM Tivoli Monitoring components:
Table 14. Long and short names of components
IBM Tivoli Monitoring component Short name
Hub Tivoli Enterprise Monitoring Server hub monitoring server
Remote Tivoli Enterprise Monitoring Server remote monitoring server
Tivoli Enterprise Portal Server portal server
Tivoli Enterprise Monitoring Agent monitoring agent
The upgrade toolkit is contained in three CDs or CD images. For the test scenario,
you need only the CD or CD image entitled IBM Tivoli Monitoring V6.1.0 Upgrade
Toolkit: Base Install and Windows Support. The Base Install CD contains the upgrade
tools. The other CDs support UNIX and Linux endpoints, which are not used in
the test scenario. The instructions that follow describe how to install files from the
Base Install CD image.
Note: The file that you download from the Passport Advantage site for the Base
Install image is named C86H41E.tar. In these instructions, the file is renamed
to upgradetools.tar.
Follow these steps to install the upgrade toolkit on the Tivoli server:
1. Log on to the Tivoli server and set up the Tivoli environment variables:
v If the Tivoli server is on a UNIX operating system, enter the following
commands:
bash
. /etc/Tivoli/setup_env.sh
v If the Tivoli server is on a Windows operating system, do one of the
following:
– From a bash shell, enter the following command:
.$SystemRoot/system32/drivers/etc/Tivoli/setup_env.sh
– From a Windows command prompt, enter the following command:
%SystemRoot%\system32\drivers\etc\Tivoli\setup_env.cmd
2. Create a directory on the Tivoli server where you can place the toolkit image
file. For example:
cd /usr
mkdir toolkit
3. Download the image file (C86H41E.tar) directly from the Passport Advantage
Web site or copy it from its current location.
The following example uses FTP commands to copy the image file (renamed
upgradetools.tar) from a remote server (host name remote.lab.company.com) to
the /usr/toolkit directory on the local Tivoli server. All commands are issued
from the Tivoli command line:
cd /usr/toolkit
ftp remote.lab.company.com
bin
get toolkit_location/upgradetools.tar
quit
where toolkit_location specifies the path name of the directory on the remote
server that contains the TAR file. For example, if the toolkit is located in the
C:\itm61\ directory on a remote Windows server, type:
get C:\itm61\upgradetools.tar
4. Unzip the compressed file:
where:
-c toolkit_dir/BASE
Specifies the full path name of the directory that contains he Base Install
product index file (OPMT.IND), for example: -c /usr/toolkit/BASE. On
Windows systems, enclose the path name in double quotes, for
example:
-c ″C:\toolkit\BASE″
-i OPMT
Specifies the product index file, OPMT.IND, from which the toolkit is
installed.
-y Installs the product without requesting confirmation.
6. Enter the following command to complete the installation:
wchkdb -u
7. After the installation is complete, enter the following command to set the Java
path for the upgrade toolkit:
witmjavapath your/jre/bin
where your/jre/bin is that path to the Java binary files for either Tivoli for Java
1.3.x or IBM JRE 1.4.2. The following example sets the Java path to Java 1.3.0
on a Windows system:
witmjavapath "C:\Program Files\Tivoli\bin\w32-ix86\JRE\1.3.0\jre\bin"
toolkit_dir/BASE/SAMPLES
where toolkit_dir is the directory where you uncompressed the toolkit file.
Do the following steps to create and distribute the managed resources listed in
Table 15:
To complete the infrastructure road map, edit the baseline file to include specific
information for IBM Tivoli Monitoring components, such as host names for hub
and remote monitoring servers and managed system names. You can add or
remove XML elements to change the proposed infrastructure layout.
To create a baseline file, run the Scan tool against your actual test environment.
However, in subsequent steps you will substitute the sample baseline file provided
with the toolkit so that you can simulate an upgrade of the infrastructure used for
the test scenario: a Tivoli management region with one Tivoli Server, one gateway,
and one Windows endpoint assigned to the gateway.
$DBDIR/AMX/shared/analyze/scans
Because the baseline.xml file is a sample file, the italicized items in Figure 22 are
placeholders for information that you must provide. In a real baseline file (such as
the tmroid.xml file that you created in the previous step), this information is
automatically supplied by the Scan tool.
Whenever you run the Scan tool, the status and aggregateStatus attributes show
the progress of the upgrade. Before the baseline file is edited, the upgrade tools
cannot determine whether any servers or agents were deployed. For this reason,
the initial status shows that they are not deployed.
Each of the XML elements that represents an IBM Tivoli Monitoring component
contains a source attribute that identifies the Tivoli infrastructure component to be
<OSAgent> elements identify the computers where you deploy operating system
monitoring agents. You want to deploy operating system monitoring agents to
existing endpoints so that you can monitor resources on those computers.
Therefore, the Scan tool automatically adds the endpoint host names (and other
endpoint information) to the <OSAgent> elements. The Scan tool includes <OSAgent>
elements only for endpoints that run Tivoli Distributed Monitoring.
In contrast, the Scan tool does not add host names (or other information) for the
hub and remote monitoring servers. Add this information yourself when you edit
the baseline file. In these cases, the assumption is that you do not want to install
the hub or remote monitoring servers on computers that currently host the Tivoli
server or a gateway. However, no technical reason prevents you from installing
IBM Tivoli Monitoring components on existing Tivoli server or Tivoli gateway
hardware. You might want to leverage existing hardware to save resources.
<SOAPConnectionInfo hostname="server0.hub.com:1920" The fully qualified host name of the hub monitoring
server and the port used for SOAP communications. Use
the default port, 1920.
The output of the initial scan always produces a baseline file that maps each
gateway to at least one remote monitoring server. If the load on one or more
gateways is small, the resulting IBM Tivoli Monitoring infrastructure layout might
include more remote servers than necessary. In the test scenario, the load is small
enough to eliminate the remote server entirely. Managed systems can be monitored
directly from the hub server. To eliminate the remote server from the proposed
IBM Tivoli Monitoring infrastructure map in this scenario, type the same name on
the target attribute of both the <HubServer> and <RemoteServer> elements.
Your edited baseline file should be similar to the one shown in Figure 23:
Each time that you use the Scan tool to update status, specify the baseline file as
input. The Scan tool does not change the baseline file but instead produces a
separate output file. The output file is identical to the baseline file except that the
status and aggregateStatus elements are updated. The output file is a status file or
report.
where:
-v Indicates that the purpose of this scan is to validate that the installed
IBM Tivoli Monitoring components are running and able to
communicate with the Tivoli server.
-f scans/baseline.xml
Specifies the name and location of the baseline file to use as input for
this command. In this case, you are using the sample baseline file that
you edited.
The command returns a message that specifies the name and location of the
output file. The format of the file name is baseline_timestamp, where baseline is
the name of the baseline file that you specified with the –f option.
3. For this exercise, rename the output file to a file named validate.xml. For
example:
cd scans
mv baseline_20050802_16_31_07.xml validate.xml
4. Open the validate.xml file.
The validate.xml file should be similar to the output shown in Figure 24 on page
90. Notice that the aggregate status of the infrastructure upgrade is PARTIAL. For
the test scenario, this status indicates that all target infrastructure components have
been deployed except for the operating system monitoring agent.
Explanation:
The specified OS agent hostname is incorrect or is not deployed.
Operator Response:
Verify the OS agent hostname is correct and the OS agent is deployed, before attempting
the operation again."
hostname="ep1.lab.company.com"
osAgent_installDir="" interp="w32-ix86"
locale="US" source="Endpoint:EP1"
status="NOT_DEPLOYED" target="ManagedSystem:ep1"/>
</RemoteServer>
</HubServer>
</ITM6.1Infrastructure>
Figure 24. Output file from the Scan tool, showing current status of the infrastructure upgrade
Upgrading endpoints
In this step of the test scenario, you use the Assess and Upgrade tools to deploy
the appropriate operating system monitoring agent to the Windows endpoint
where you distributed the Tivoli Distributed Monitoring profile. The Assess tool
examines the endpoint and determines which operating system monitoring agent
to deploy. The Upgrade tool deploys the operating system monitoring agent.
When the Upgrade tool deploys the operating system monitoring agent to the
endpoint, it also assigns the endpoint to the target Tivoli Enterprise Monitoring
Server identified in the baseline file. The endpoint now becomes a managed system
that is part of the IBM Tivoli Monitoring infrastructure.
$DBDIR/AMX/shared/analyze/endpoints
The format of the file name is myendpoint.xml. You need not open or edit the
myendpoint.xml file. This file contains the product code of the operating system
monitoring agent to deploy. It is used as input to the Upgrade tool.
3. Run the Upgrade tool from the $DBDIR/AMX/shared/analyze directory to
deploy the operating system monitoring agent to the Windows endpoint:
witmupgrade -x endpoints/myendpoint.xml -u -f scans/baseline.xml
where:
-x myendpoint.xml
Specifies the name of the output file from the Assess command. In this
scenario, the output file from the Assess command identifies the
Windows endpoint and the operating system monitoring agent to
deploy to the endpoint.
-u Specifies that you are using the witmupgrade command to perform an
upgrade.
-f scans/baseline.xml
Specifies the name and location of the baseline file. In this scenario,
specify the sample baseline file that you edited. The baseline file
identifies the Tivoli Enterprise Monitoring Server to which the
Windows endpoint will be assigned.
The output file from this command is located in the following directory:
$DBDIR/AMX/shared/analyze/endpoints/upgrade
When you assess a profile manager, the situations are associated with a managed
system list. After you upgrade the profile manager, the situations are distributed to
the managed systems on the list and activated. In the test scenario, the managed
system list includes only one managed system: the Windows operating system of
the endpoint to which the OS monitoring agent was deployed.
Upgrading profiles
To upgrade profiles, use the Assess and Upgrade tools. The Assess tool produces an
output file that describes equivalent situations for all the monitors in the profile.
The Upgrade tool creates the situations on the hub Tivoli Enterprise Monitoring
Server.
Follow these steps to upgrade the profile (DM_TEST_PROF) for the test scenario:
1. Change to the $DBDIR/AMX/shared/analyze directory:
cd $DBDIR/AMX/shared/analyze
2. Enter the following command to run the Assess tool against the
DM_TEST_PROF profile:
witmassess -p DM_TEST_PROF -f scans/baseline.xml
The output file from this command is DM_TEST_PROF.xml, located in the
following directory:
$DBDIR/AMX/shared/analyze/profiles
The contents of the DM_TEST_PROF.xml file are shown in Figure 25 on page
93.
3. Run the Upgrade tool from the $DBDIR/AMX/shared/analyze directory to
send the information in the DM_TEST_PROF.xml file to the hub Tivoli
Enterprise Monitoring Server and to the Tivoli Enterprise Portal Server:
witmupgrade -x profiles/DM_TEST_PROF.xml -u -f scans/baseline.xml
The output file from this command is located in the following directory:
$DBDIR/AMX/shared/analyze/profiles/upgrade
Figure 25. Output file (DM_TEST_PROF.xml) from running the Assess tool against the DM_TEST_PROF profile
Follow these steps to upgrade the profile manager (DM_TEST_PM) for the test
scenario:
1. Change to the $DBDIR/AMX/shared/analyze directory:
cd $DBDIR/AMX/shared/analyze
2. Enter the following command to run the Assess tool against the DM_TEST_PM
profile manager:
witmassess -pm DM_TEST_PM -f scans/baseline.xml
The output file from this command is DM_TEST_PM.xml, located in the
following directory:
$DBDIR/AMX/shared/analyze/profilemanagers
3. Run the Upgrade tool from the $DBDIR/AMX/shared/analyze directory to
distribute the situations listed in the DM_TEST_PM.xml file to the managed
systems identified in that file:
witmupgrade -x profilemanagers/DM_TEST_PM.xml -u -f scans/baseline.xml
The output file from this command is located in the following directory:
$DBDIR/AMX/shared/analyze/profilemanagers/upgrade
NT_MAB_83800_critical
NT_MAB_83800_warning
9. Select the NT_MAB_83800_critical situation in the situation tree, then click the
Distribution tab:
v The new managed system list is displayed in the Assigned box.
The name of the managed system list is based on the profile manager name,
for example, DM_TEST_PM_1_837_KNT.
v The Windows endpoint is displayed in the Available Managed Systems box,
for example, Primary:EP1:NT.
where:
-x profilemanagers/DM_TEST_PM.xml
Specifies the name and location of the output file that resulted from the
assessment of the DM_TEST_PM profile manager. (See Step 2 on page
94.)
-r Indicates that the purpose of this command is to perform a rollback.
-f scans/baseline.xml
Specifies the name and location of the baseline file to use as input for
this command.
3. Restart the Windows endpoint.
4. Remove the Windows OS monitoring agent and the Universal Agent items
from the Navigator in the Tivoli Enterprise Portal.
Because you rolled back the upgrade, the agents are no longer available and
their Navigator icons are dimmed. To remove the items from the Navigator,
right-click the agent name and select Remove Managed System from the
pop-up menu.
The rollback option can also be used to roll back an endpoint upgrade or a profile
upgrade independently. By rolling back the profile manager upgrade, you roll back
all upgrades (profile manager, profile, and endpoint) in one step.
where opmt identifies the upgrade toolkit and Tivoli_server is the name of your
Tivoli server.
As the new embedded situation is distributed to the managed system, that system
is checked to ensure that the situations embedded in the new situation have also
been distributed to that system. If they have not, they are distributed by default.
Note: The hub and standby monitoring servers should be configured as mirrors of
each other.
1. In Manage Tivoli Enterprise Monitoring Services, right-click the name of the
hub monitoring server and click Reconfigure (on Windows) or Configure (on
UNIX).
2. Do the following on Windows:
a. Select Configure Standby TEMS.
b. Enter the name of this monitoring server and specify the protocols used by
the standby server. These protocols should be the same for both monitoring
servers (the hub and the standby).
c. Click OK.
d. Type the host name or IP address for the hub monitoring server and click
OK on the window that displays the communication settings for this server.
e. Type the host name or IP address for the standby monitoring server in the
Hostname or IP Address field and click OK.
3. Do the following on UNIX:
a. Click the Advanced Settings tab.
b. Select Specify Hot Standby.
c. Type the host name for the hot standby monitoring server in the Standby
TEMS Site field.
d. Select the type of protocol to use for hot standby. This protocol should be
the same on the hub monitoring server and the monitoring server that you
plan to use for hot standby.
e. If you specified any backup protocols for the hub monitoring server,
identify identical protocols for the standby monitoring server.
f. Click Save.
4. Stop and restart the monitoring server. (On Windows, the monitoring server
stops automatically.)
5. Repeat these steps for the standby monitoring server.
Configuring agents
Agents use a feature called Secondary TEMS to ensure their availability. If the
monitoring server to which the agent connects is unavailable, they switch the
defined secondary monitoring server. Use the following steps to configure
Secondary TEMS for any agents that connect to the hub monitoring server.
Before you begin this task, ensure that the computer where you want to create the
monitor has the Universal Agent installed and it is up and running. If the
Universal Agent is not installed, install it, using the directions in “Installing Tivoli
Enterprise Monitoring Agents” on page 26.
Note: This is a very basic script, intended only to show you the functionality.
This metafile identifies the data source (the script file), as well as the attribute
group for which to gather data.
You can create a situation to monitor the information gathered by this new
monitor. To do so, use the instructions in “Creating a situation” on page 43.
Before you begin this task, ensure that the computer where you want to monitor
the URL has the Universal Agent installed and it is up and running. If the
Universal Agent is not installed, install it, using the directions in “Installing Tivoli
Enterprise Monitoring Agents” on page 26.
Review the trace and logging information. Ensure that you can change the trace
level as appropriate for your environment.
Review the messages - do they provide the type of information that you can use to
debug your problem? If they do not, where do they fail?
Exercise 20: Using IBM Tivoli Monitoring for Databases: DB2 Agent
After you install IBM Tivoli Monitoring and the Tivoli Enterprise Portal, you install
the following software that is required for the IBM Tivoli Monitoring for
Databases: DB2 Agent to operate:
v IBM Tivoli Monitoring for Databases: DB2 Agent
v Agent support on the monitoring server, portal server and portal client
The IBM Tivoli Monitoring for Databases: DB2 Agent software is located on the
IBM Tivoli Monitoring for Databases image. Install the agent using the steps in
“Installing Tivoli Enterprise Monitoring Agents” on page 26, along with the
options described in the next section.
When you add application support for the DB2 agent to the monitoring server, use
the “ud” product code.
See “Installing support for agents on the monitoring server, portal server, and
browser and desktop clients” on page 33 for the instructions to install this support.
Background information
The IBM Tivoli Monitoring for Databases: DB2 Agent does not require advanced
configuration. However, you must start this monitoring agent while you are logged
on as the DB2 instance owner, and you must have DB2SysAdmin, SysCtrl, and
SysMaint authorities.
Procedure
You can start and stop this monitoring agent using the Manage Tivoli Monitoring
Services utility or using the itmcmd agent command.
Starting and stopping DB2 agents using Manage Tivoli Enterprise Monitoring
Services
1. When starting the DB2 agent using Manage Tivoli Enterprise Monitoring
Services, you are prompted for a database instance name.
2. When stopping the DB2 agent using Manage Tivoli Enterprise Monitoring
Services, you are prompted for the database instance name to stop.
Starting and stopping DB2 agents using the itmcmd agent command
When using the itmcmd agent command to start or stop this monitoring agent,
include the following command option:
-o Specifies the database instance to start or stop. The database instance name
must match the name used for starting the database.
For example:
itmcmd agent -o DB2inst1 start | stop ud
itmcmd agent -o Preface_DB2inst2 start | stop ud
itmcmd agent -o DB2inst3 _suffix start | stop ud
If you start the monitoring agent without specifying the -o option, you receive the
following error message: This agent requires the -o option...
The host name of the system is automatically added to the instance name in the
managed system list of the user interfaces.
For more information about using the itmcmd agent command, see the IBM Tivoli
Monitoring Installation and Setup Guide.
The ODBC data source must be registered on the system where the monitoring
agent runs, where the DB2 resides. If you do not intend to use these attributes, you
need not register an ODBC data source.
To register an ODBC data source for use with this monitoring agent, follow these
steps (or refer to your database documentation for current instructions):
1. In DB2, open the Add Data Source window.
2. Specify how the data source should be registered. Register the data source as a
system data source so that all users on the system have access to the database.
3. Specify the alias for the database in the Database alias field.
4. (Optional) In the Data source name field, you can specify a more meaningful
name for the data source. The name you enter is mapped to the Database alias.
Note: The data source name must be the same name as the database.
5. For Windows, select Register this database for ODBC if the database.
6. Select Register this database for CLI if the database will be accessed by DB2
CLI applications. In UNIX, the data source is registered to CLI by default.
7. For Windows, specify one of the common applications in the Optimize for
application field to optimize the CLI settings for that type of application.
Existing settings are overwritten where necessary. You should optimize the
settings for an application first, and then use the Settings page to modify
specific configuration keywords as required. If you have already set specific
settings, back up your db2cli.ini file before using the optimize feature. Modify
any settings that you specifically want to be different from the optimized
values.
8. Click OK to register the data source and close the window.
The workspace is the working area of the application window. Select an item in the
Navigator to open its default workspace. If the item has multiple workspaces
created for it, you can right-click the item, click Workspaces and select another
workspace to open.
The IBM Tivoli Monitoring: UNIX Log Agent software is located on the IBM Tivoli
Monitoring installation image. Install the agent using the steps in “Installing Tivoli
Enterprise Monitoring Agents” on page 26.
When the monitoring agent starts, it looks at two files to determine which logs to
monitor:
v Customer configuration file
v Syslog daemon configuration file
If, for any reason, the monitoring agent is unable to find at least one log to
monitor from either file, it writes a message to the RAS log that contains the text
Agent has no work to do and then automatically terminates.
A default customer configuration file is shipped with the product and is called
kul_configfile. This file is installed into the install_dir/config directory. All entries
in the default file are commented out.
Note: All references to install_dir refer to the destination directory that was
specified when the monitoring agent was installed.
Important! If the IBM Tivoli Monitoring: UNIX Log Agent is installed on top of a
previous version of the agent (the OMEGAMON agent), the file
install_dir/config/kul_configfile is replaced. You should rename the file or copy it
to another location before installing version 6.1 of the monitoring agent.
If debug mode is on, each entry that is written to the monitored log is
recorded in a debug log. In addition, the formatted entry that is passed to a
situation is also written to the debug log. All logs that are monitored in
debug mode write to the same debug log.
The debug log is specified in the monitoring agent startup script using the
AGENT_DEBUG_LOG environment variable. If this variable is undefined or
the log cannot be opened, no debug logging occurs. Each time the
monitoring agent is started, new events are appended to the end of the
existing debug log.
3 Log type (optional: default is S)
v S indicates syslog
v E indicates errlog
v A indicates utmp log
v U indicates user-defined log
4 Format command. This command is valid only for type ‘E’ (errlog) and type
‘U’ (user-defined) logs.
For type ‘E’ logs, the format command must consist of an errpt command
that includes the ‘-c’ (concurrent mode) option. The default value is:
errpt -c -smmddhhmmyy
For user-defined logs, the format command describes both the format of the
log and how data will be mapped and formatted in the Tivoli Enterprise
Portal Log Entries table view. There is no default.
The actual logging activities are performed by the syslog daemon, syslogd, which
is controlled through a configuration file usually called /etc/syslog.conf. The
system administrator usually maintains this file.
The syslog.conf file indicates the syslog messages that will be written, which have
a specific severity and originate from a specific application. You can consolidate
messages from more than one source into a single log file. Through the syslog
facility, you can also direct messages to be written to a different system, the log
host.
The monitoring agent attempts to build a default list of logs to monitor from the
syslog daemon configuration file under the following circumstances:
v The KUL_CONFIG_FILE environment variable is undefined.
v The specified customer configuration file does not exist or cannot be opened.
v No log names are in the customer configuration file.
v None of the logs contained in the customer configuration file are valid.
The file that the monitoring agent reads to build the default monitored logs list is
called /etc/syslog.conf, but this can be overridden using the KUL_SYSLOG_CONF
environment variable.
If you are interested only in monitoring syslogs, you can omit the
KUL_CONFIG_FILE environment variable from the startup script, or you may
leave the variable unassigned, thereby letting the monitoring agent determine the
syslogs that are active on each system, based on the syslogd configuration file.
If you are using the C shell, the following command would produce the same
result:
setenv VAR VALUE
Examples
If you are using the Bourne or Korn shells, use the following command to assign a
value of install_dir/config/myconfig to the KUL_CONFIG_FILE variable.
KUL_CONFIG_FILE=install_dir/config/myconfig export
KUL_CONFIG_FILE
Note: A refresh occurs only if the monitoring agent determines that the
configuration file was modified since the agent was started, or since the
previous refresh. If you have not modified the configuration file, but want to
restart a monitor, change the modification date of the configuration file
before sending a refresh signal.
To change the modification date of the configuration file before sending a signal,
issue the following command from the directory where it resides on the managed
system where the monitoring agent is running:
touch kul_configfile
Format command
A format command is composed as follows:
The format description and formatting specifications both use a syntax based on
that used by the standard ‘C’ scanf and printf functions. The format command
syntax can be illustrated well through a simple example. The format command
syntax is explained in detail after the following example.
Example format command: Suppose you run an application at your site that
produces an ASCII log, myapp.log, and that you want to monitor messages that
are written to this log. Suppose also that a sample entry from this log is as follows:
MSG123 Dec 25 2004 03:15 pm system myapp: Server frodo not
responding
The following format command enables the Tivoli Enterprise Monitoring Agent to
monitor this log so that you can create situations that look for specific messages
and display the log contents within the Tivoli Enterprise Portal Log Entries table
view:
A , “%s %s %d %d %d:%d %s %s %[^:] : %[^\n]” , type month day year
hour minute hour system source description
Example format diagram: Figure 26 on page 112 illustrates how the format
command relates to each log entry and to the Tivoli Enterprise Portal Log Entries
table view.
Note: In the diagram, the format description and mapping specifications are
displayed on separate lines for illustration purposes only. In the
configuration file, each log entry must be contained within a single line.
Monitoring
Agent
type MSG123
month Dec
day 25
year 2004
hour 3 pm
min 15
system system1
source myapp
Log format description: The format description is comprised of one or more scan
directives enclosed within double quotation marks (“...”). Generally, a scan directive
identifies a field or group of fields within a log entry, although a directive can
identify a single character within a log entry. A field is any sequence of space
characters that are not white that are ended by one or more white space characters
(that is, a tab or blank).
A scan directive has the following format. Items enclosed within brackets are
optional.
%[(offset)][*][width][size]datatype
All scan directives must include at least a percent sign, ‘%’, and a data type.
Each scan directive starts from where the previous one ended unless it is the first
(in which case it starts at column 1 in the log entry), or an offset option has been
included in the directive. Each scan directive consumes characters from a log entry
until any of the following occurs:
v An inappropriate character is encountered (that is, one that does not match the
expected data type).
v The field width, if specified, is exhausted.
v The end of the log entry is encountered.
Format description components: The following sections describe each of the format
description components. To simplify the discussion, all examples in the next
section include only the relevant scan directives from a format description. The
corresponding mapping specifications that must be included in a complete format
command have been omitted.
Literals: Literals describe a sequence of one or more characters that occur at the
same relative location in every entry in the log, and which you do not want to
map into a table view column.
Specifying a literal makes the Tivoli Enterprise Monitoring Agent look for and read
those characters from a log entry, and then discard them. If you include a literal, it
must match exactly the character sequence in a log entry. Otherwise, that entry is
ignored.
For example, to read a time from a log that has the following format:
03:15
In this example, the colon ‘:’ preceding the second directive is a literal.
Any number of white space characters that immediately precede the start of a field
in a log entry are automatically consumed and discarded unless the data type of
the next scan directive is a character, for example %c. To consume any number of
white space characters that are embedded within a literal in a log entry, include
one or more white space characters in the format description literal. For example,
suppose a log entry has the following format:
MSG123 < Code 9 > System1
If you want to extract only the message field, the code number, and the system,
use the following format description:
%s < Code%d >%s
To include a percent sign, ‘%’, in a literal, specify two adjacent percent sign
characters in the format description. For example, if you want to extract the
percentages from a log that contains the following three fields:
45% 82% 2%
(The blanks embedded within the description are not required but clarify the
example.)
Offsets: You can use offsets to specify the absolute column within a log entry at
which a scan directive starts; if no offset is specified, each succeeding scan starts
where the previous one ended. The first column in an entry is 1. Offsets can
facilitate the description of fixed field logs, that is, those in which a field starts in
the same column in every entry.
For example, suppose each log entry starts with a message number as in the
following example:
MSG123 Dec 25
If you want to extract only the message number, discarding the text “MSG” that
precedes it, you can use the following scan directive:
%(4)d
This causes the scan to start in column 4, skipping over and discarding the first
three characters.
Field suppression: The asterisk character ‘*’ in a scan directive indicates that the
scanned data is suppressed. That is, the data is read from the log entry but
discarded. For example, suppose a log entry has the following form:
MSG123 Dec 25
If you want to skip over the message number field entirely, you can use this
format description:
%*s %s %d
These directives cause the message number field to be ignored but the month and
day are stored and mapped to a column. Because the data is discarded for scan
directives that are suppressed, such directives have no corresponding data
mapping specifier (which associates log data with a table view column).
Width: You can use the width option to specify the maximum number of
characters that is consumed from a log entry to satisfy a scan directive. For
example, suppose you want to extract only the first 2 digits from the message
number from the following log entry:
MSG123 Dec 25
The first directive, “%*3s”, discards the first three characters of the message
number field (the text “MSG”). The second directive, “%2d”, saves the digits “12”
for mapping and the last directive, “%*d”, discards any digits that remain in the
message field. The digit ‘3’ is consumed and discarded.
For scan directives that have a data type of “string” (that is, %s or %[]), the default
width is 31.
Size: The size option can be used in numeric (that is, non-string) directives and
controls the amount of storage that is reserved to hold a scanned number.
Allocating more storage permits larger numbers to be scanned and stored. Unless
you must scan very large numbers or must increase the precision, the default sizes
are probably sufficient. The effect of including a size option in a numeric scan
directive depends on the operating system on which the Tivoli Enterprise
Monitoring Agent is run.
The following size options and data type combinations that you can specify are
valid:
Size Option Data Types
l d, i, o, u, x, e, f, g
ll d, i, o, u, x
L e, f, g
h d, i, o, u, x
If you explicitly include formatting in the data mapping specifier for a scanned
value rather than permitting the print directive to default, the size option that you
specify in the scan and print directives must be consistent.
Data type: The data type of a scan directive indicates whether the corresponding
characters in the log entry are alphanumeric or numeric and affects how the data is
stored by the Tivoli Enterprise Monitoring Agent when it has been scanned.
Specifying that log data is numeric instead of a simple alphanumeric string can
simplify the format description. Scanned data can be converted (for example,
displayed in hexadecimal or scientific notation instead of decimal) as it is being
mapped into a table view column.
Table 20 lists the valid data types you can use in a scan directive to describe
alphanumeric data.
Table 20. Valid alphanumeric data types
Data type Corresponding field in the log entry
s
A sequence of space characters that are not white. Characters from the log entry are
consumed until the first white space character is encountered or until the number of
characters specified in the field width has been exhausted. If no width is specified in
the directive, the default width is 31.
This feature is useful for describing fields in a log entry that might be blank
assuming the starting column and width of the optional field is known. For
example, suppose two entries from a log are as shown:
field1a field2a field3a
field1b field3b
In this example, the second directive stores “field2a” when the first entry is
processed, and contains blanks when the second entry is processed.
This scanset indicates that all non-blank, non-tab and non-newline characters will be
consumed. That is, the scan ends on the first white space character in the log entry.
(See “Escape characters” on page 123 for details on specifying escape characters in a
format command.)
In an inclusive scanset, characters from a log entry are consumed until a character is
encountered that is not in the scanset. In an exclusive scanset (for example, one that
has a ‘^’ (circumflex) character immediately following the left bracket), characters
from a log entry are consumed until a character is encountered that is in the scanset.
A scanset permits a single scan directive to consume multiple log entry fields. For
example, a scanset that you might use frequently is one that is to “read all the
remaining characters in an entry”:
%[^\n]
That is, consume everything from the current position in an entry up to the newline
character, which marks the end of the entry.
A scanset directive can also be used to terminate a scan before a simple type ‘s’
variable would, that is, when a white space character is found. For example,
suppose a log entry has embedded within it either one of the following two field
sequences:
Error code:24
Warning code:16
If you want only to extract the numeric code itself, the following directives could be
used:
%*[^:]:%d
This format description consumes and discards (field is suppressed) all characters
until a colon is found (exclusive scanset), then consumes and discards the colon
itself (an embedded literal) and finally consumes and stores the numeric code.
As with a string data type, if you wish to consume more than 31 characters with a
scanset directive, you must include a maximum width option in the directive. For
example, to consume up to 60 characters from the current location up to the end of
the entry use:
%60[^\n]
Some operating systems support the use of a ‘-’ (dash) to represent a range of
characters, for example:
%[a-z]
This example includes all lowercase letters in the scanset. The character that
precedes the dash must be lexically less than the character following it otherwise the
dash stands for itself. Also, the dash stands for itself whenever it is the first or last
character in the scanset.
To include the right bracket in an inclusive scanset, it must immediately follow the
opening left bracket. To include the right bracket in an exclusive scanset, it must
immediately follow the circumflex character. In both cases, a right bracket placed
there is not considered the closing right bracket of the scanset.
Data mapping specifications: The data mapping specifications that comprise the
second component of a format command are separated from the format description
by a single comma. Each mapping specification is separated from the next by
white space. Every non-suppressed scan directive in the format description must
have a single, corresponding data mapping specifier to indicate into which column
of the Log Entries table view the scanned data must be mapped. That is, the
general form of a format command is as follows:
A , “%scan1 %scan2 %*scan3 %scan4” , mapspec1 mapspec2
mapspec4
As the data is mapped into a table view column you can also optionally specify
how you want it formatted and (for data read in and stored in numeric form), that
numeric data is converted to a different type (for example, decimal to hexadecimal
or exponent form). See “Specifying log entry times” on page 125 for further details.
The columns into which scanned data can be mapped correspond to columns in
the Log Entries table view. Table 21 lists all the valid column names and minimum
abbreviations that can be used.
Table 21. Valid column names and minimum abbreviations
Tivoli Enterprise Portal Log Format command mapping
Entries table view column name name Minimum abbreviation
Entry Time month mo
day da
year ye
hour ho
minute mi
second se
Referring again to the example at the beginning of this section (“Example format
command” on page 111), notice that there are 10 scan directives and also that there
are 10 mapping specifications. Each successive scan directive, reading the format
description left to right, is associated with each successive mapping specifier. That
is, the first log entry field, MSG123, is read by the first scan directive, %s, and is
mapped to the first column specifier, type. The second field, Dec, is read by the
second scan directive, %s, and is mapped to the second column specifier, month,
and so on.
The corresponding format description and data mapping specifiers in the example
format command are:
“%d:%d %s” , hour minute hour
This causes ‘03’ to be read by the first scan directive, ‘%d’, and mapped into the
hour column. The next character in the log entry, the colon, matches the colon
literal in the format description and is discarded. The ‘15’ is read by the second
scan directive, ‘%d’, and is mapped into the minute column. The ‘pm’ is read by
the third scan directive, ‘%s’, and is also mapped into the hour column. The result
is that the hour and minute columns contain ‘3pm’ and ‘15’ respectively. (If the
Tivoli Enterprise Monitoring Agent is passed an hour of ‘3pm’ it converts this into
24-hour format for display in the Log Entries table view. See “12-Hour format
times” on page 125 for more information concerning valid date and time formats
that can be passed to the Tivoli Enterprise Monitoring Agent.)
The preceding example shows that it is necessary only to supply a column name
into which scanned log data is mapped. For each mapping specification that has
no explicit format specifier, default formatting is applied. The Tivoli Enterprise
Monitoring Agent expands the mapping specifiers in the previous example as
follows:
“%d:%d %s” , hour=“%d” minute=“%d” hour=“%s”
How to override the default mapping format specifiers is the subject of the next
section.
The syntax for a data mapping specification that includes a format specifier is as
follows:
MappingName[=“[literals]%[options][width]
[.precision][size]datatype[literals]”]
Mapping format specifier components: The following paragraphs describe each of the
mapping format specifier components.
Literals: Literals can be included before the scanned data is mapped into a table
view column, afterwards, or both, and can serve to clarify the Log Entries table
view and facilitate the creation of situations. For example, suppose you are
monitoring a log that includes the following three fields:
... 13303 15 4 ...
The first field indicates a process identifier, the second represents a return code
and the third a severity. You might choose to map and format the data as follows:
“... %d %d %d ...” , ... source=“proc id. = %d” desc=“RC = %d ” desc=“;
Severity = %d”...
For example, suppose a log entry contains the character sequence “65000” and the
format command contains:
“... %d ...” , ... type=“%’0+9d”
Width: A decimal digit string included in a mapping format specifier signifies the
minimum width of the field into which the data is mapped. If the mapped data
contains fewer characters than the minimum field width, it is right justified and
padded on the left to the length specified by the field width. If the ‘-’ (left-justify)
option has been specified, the data is padded on the right.
For example, suppose the log entry contains the following fields:
1 789 82 4567
A field width with a leading zero is interpreted as meaning that the field must be 0
padded.
Size: The valid size options that you can specify in a format specification for
mapped data are the same as those that can be specified in a scan directive in the
log format description. The data size specified in a mapping format specifier must
be the same as that specified in the corresponding scan directive.
Data type: As with the size option, the data type in a mapping format specifier
must be consistent with that in the corresponding scan directive. This means that if
data is scanned and stored as an integer, it must be mapped as an integer. If it is
scanned as a floating point number, it must be mapped as a floating point number.
If it is scanned as a character or character string it must be mapped as a character
or character string.
Numeric data can be scanned and stored in one of two families: the integer family
and the floating point family. Within each family, data can be represented in
different ways. An integer can be displayed in decimal, octal, hexadecimal and
unsigned formats. A floating point number can be displayed in decimal or
exponent notation. When numeric data is mapped, you can use a different data
type to that in the scan directive as long as the format data type comes from the
same family. Data types from different numeric families cannot be mixed.
You can use this feature to perform type conversions as you map data into a table
view column to clarify the table view. For example, if a field in a log entry
contains the size of a file in bytes, you can display the size as a hexadecimal value
in the Log Entries table view by using the following in the format command:
A, “... %d ...” , ... desc = “File size is %#x bytes” ...
If the file size is, for example, 11259375 bytes, the description columns contain the
following information:
File size is 0xabcdef bytes
For an example that mixes data types from the floating point family, the size can
be displayed in exponent notation with the following format command:
A, “... %f ...” , ... desc = “File size is %.2e bytes” ...
The valid mapping data types are specified by family in Table 23 and Table 24.
Table 23. Integer family data types
Data type Format of data scanned and stored as integers
d, i
Signed decimal numbers.
u Unsigned decimal numbers.
o Unsigned octal numbers.
x, X Unsigned hexadecimal numbers. The letters abcdef are used for x;
the letters ABCDEF are used for X.
Escape characters: You might want to include characters in a format command that
either are not valid in the command itself (for example, the newline character), or
which have a special meaning to the Tivoli Enterprise Monitoring Agent when it is
interpreting the format command (for example, the double quote (“) character).
Such characters are represented in the format command by a sequence of two
characters:
v The backward slash (\) escape character
v Following the backward slash, a character that represents the character code that
is being escaped
The backward slash character removes any special meaning from the following
character and causes the latter’s single character code value to be substituted
instead.
For example, suppose you want to monitor a log that contains the following
sample entry:
“http://www.acme.com” : GET /download/Acme.exe
Suppose that you want to extract the character string between the set of double
quotation marks and everything after the colon. Also, assume you want to map the
first string into the source column of the Log Entries table view and that you want
to map the second string into the description column enclosing it in quotation
marks. The following format command accomplishes this:
A,”\”%[^\”]\” :%[^\n]” , source desc = “\”%s\””
Following the double quotation mark that starts the format description is an
escaped double quotation mark literal that consumes the double quotation mark
preceding “http:” in the sample log entry. The exclusive scanset scan directive
contains an escaped double quotation mark that terminates the first scan; that is,
“http://www.acme.com” is stored by the scanset directive. The escaped double
quotation mark, white space character, and colon literal following the scanset
directive consumes all characters up to the text “GET” in the sample log entry. The
second scanset consumes and stores all characters until a newline character is
encountered (end of line). The next non-escaped double quotation mark terminates
the format description component of the format command.
The mapping specification for the description column contains two escaped double
quotation mark literals surrounding the scanned string. The preceding sample data
is displayed in the Log Entries table view using this format command:
Description Source
″GET /download/Acme.exe″ http://www.acme.com
Table 25 lists all the characters that can be represented by an escape sequence and
the associated escape sequence.
Table 25. Escape character sequence
Character Escape sequence representation
alert \a
backspace character (\) \\
backspace \b
carriage return \r
double quotation mark (“) \”
horizontal tab \t
newline \n
single quotation mark (‘) \’
vertical tab \v
Because the format of dates and times varies so widely between logs, the Entry
Time column of the Log Entries table view is composed of six components: the
year, month, day, hour, minute, and second. You specify scanning and mapping
pairs explicitly for each component using one of the mapping names in Table 21 on
page 118.
When the Tivoli Enterprise Monitoring Agent formats an entry from a log, it
attempts to build a time stamp with a format of:
mm/dd/yy hh:mm:ss
‘YY’ is the 2 digit year, the first ‘mm’ is the month, ‘dd’ is the day of the month,
‘hh’ is the hour (in 24-hour format), the second ‘mm’ is the minute and ‘ss’ is the
second. The Tivoli Enterprise Monitoring Agent expects that the data that is
mapped into each of the entry time component fields is a valid integer. The data
type with which each component was scanned and mapped is not important; what
is important is that the formatted result is an integer.
For example, suppose the date and time in a log entry is in the form:
MSG123 2005 03 03 10 15 56 ...
Use the following format command to extract and map the entry time components:
A , “%s %s %s %s %s %s %s” , desc year month day hour minute
second
There are two exceptions to the requirement that all time components consist of
numeric data only: text months and 12-hour format times.
Text months: If the month of the log entry is in text form, for example, Jan, Feb or
JAN, FEB, you can read and map the month as a string. When the Tivoli Enterprise
Monitoring Agent is passed for a month in this format, it translates the string to
the appropriate numeric value when constructing the entry time.
12-Hour format times: Some logs contain the entry time in 12-hour format, for
example, 03:15 PM. Because the Tivoli Enterprise Monitoring Agent displays entry
times in 24-hour format, for such logs you must pass the ‘am/pm’ indicator to the
Tivoli Enterprise Monitoring Agent in the hour column. An example format
command for reading and mapping the hour and minute from a log with this
format follows.
“%d:%d%s” , hour minute hour
This concatenates the ‘am/pm’ indicator to the 12-hour value so that, using the
previous time as an example, the value “3 pm” is passed to the Tivoli Enterprise
Monitoring Agent. When constructing the entry time for an event, the Tivoli
Enterprise Monitoring Agent translates such a time to its equivalent 24-hour
format, which in this case is ‘15’.
If, for instance, the minute is not supplied within a log entry and you do not want
to let the minute default to the current system clock minute for either monitored
events or table view requests, you can hardcode a value such as ‘0’ for the minute
column. Suppose an entry from such a log has the following format:
MSG123 2005 Mar 6 10 pm Text of event ...
The following format command hardcodes a value of zero for the entry time
minute for every event:
A,“%s %d %s %d %d %s%c %[^\n]” , de ye mo da ho ho min=“0”
desc=“:%s”
The Tivoli Enterprise Portal Log Entries table view would contain the following
information in the Entry Time and Description columns.
In this example, a dummy scan directive is supplied ‘%c’ that consumes the single
space character between the ‘PM’ and the start of the actual message. Because this
space would be discarded anyway and does not affect the data in interest, this
scan directive’s sole purpose is to permit inclusion of a ‘minute’ column mapping
specifier in which a ‘0’ character is forced to be displayed.
Defaulting the year entry-time component: Many logs omit the year from their event
entry times. For example, the following sample was taken from a syslog.
Mar 17 03:34:11 frodo unix: NFS server gandalf not responding
When monitoring such logs, the Tivoli Enterprise Monitoring Agent sets the
entry-time year component for each new event to the current system-clock year as
described in “Hardcoding missing entry time components.”
When handling table view requests for logs that do not include the entry-time
year, the Tivoli Enterprise Monitoring Agent attempts to determine the year of an
event based on the date in the next entry. This causes the Tivoli Enterprise
Monitoring Agent to make an assumption that a monitored log has never been
inactive for a period one year or longer. To show how this works, suppose two
entries from a syslog are as follows. (New log entries are appended to the end of
the log. The entry dated December 31st is older than that dated January 1st.)
Furthermore, suppose that the current date is March 15th, 2005. If you issued a
table view request and specified in the time span dialog a time range of December
31st, 2004 at 11:00 p.m. to January 1st, 2005 at 4:00 a.m., the preceding entries are
displayed (in reverse chronological order) in the Log Entries table view as follows:
Entry Time Description
01/01/05 03:34:11 NFS server gandalf not responding
12/31/04 23:34:11 NFS write error on host bilbo
Exercise 22: Using IBM Tivoli Monitoring: IBM Tivoli Monitoring 5.x
Endpoint Agent
The IBM Tivoli Monitoring 5.x Endpoint Agent enables you to view data from IBM
Tivoli Monitoring version 5.1 within the IBM Tivoli Monitoring version 6.1 GUI.
After you install IBM Tivoli Monitoring and the Tivoli Enterprise Portal, you install
the following software that is required for the IBM Tivoli Monitoring: IBM Tivoli
Monitoring 5.x Endpoint Agent to operate:
v IBM Tivoli Monitoring, version 5.1.2 Fix Pack 5 and LA patch 119
v IBM Tivoli Monitoring: IBM Tivoli Monitoring 5.x Endpoint Agent
The IBM Tivoli Monitoring installation image contains the installation image for
this agent.
In addition to the procedures in this chapter, you must use procedures in the
following documentation to complete installation and configuration of the IBM
Tivoli Monitoring: IBM Tivoli Monitoring 5.x Endpoint Agent.
v IBM Tivoli Monitoring Installation and Setup Guide
v IBM Tivoli Monitoring, version 5.1.2 Fix Pack 5 Readme
Table 26 contains a list of the procedures for installing and configuring this
monitoring agent after you have installed IBM Tivoli Monitoring, 6.1 and the Tivoli
Enterprise Portal as described in “Exercise 1: Installing IBM Tivoli Monitoring” on
page 3. The table also contains references to where to find the information to
complete each procedure.
Table 26. Installation and configuration procedures
Procedure Where to find information
Ensure that you have added application “Exercise 1: Installing IBM Tivoli
support to the Tivoli Enterprise Monitoring Monitoring” on page 3
Server. This step should have been done
during the Tivoli Enterprise Monitoring
Server installation.
Install IBM Tivoli Monitoring, 5.1.2 Fix Pack Download these files from the following
5 and the IBM Tivoli Monitoring, 5.1.2 LA Web site:
Patch 0119 onto your system.
https://www14.software.ibm.com/webapp/
iwm/web/preLogin.do?source=itmcp
To install using the winstall command, run the following command from the
command prompt:
where:
-c source_dir
Specifies the complete path to the directory containing the installation
image.
-s server
Specifies the name of the managed node to use as the installation server.
By default, the installation server is the Tivoli server.
-i IND_file
Specifies the product index file (ITM61AGT.IND) to reference for the
installation.
-y Installs the product without requesting confirmation.
-n Installs the product on all managed nodes that do not currently have the
product installed.
Refer to the Tivoli Management Framework Reference Manual for more information
about this command.
Note: This procedure requires that you have admin authority in the Tivoli
Framework environment.
1. Use the following command on each targeted system you have listed.
Additional information: This command skips any systems that are not running a
supported operating system.
witm61agt [-f] [-n] [-i seeding] [-o outfile] [[-D Variable=Value] ...] -c
CMSAddress [-p port]
{-a |endpoint [endpoint ...] | @filename}
Where:
-f Forces the distribution to proceed even if the operating system version
check fails.
-n No distribution of binaries, performs only configuration.
-i Invokes the IBM Tivoli Monitoring wdmepconfig command on each
endpoint. ″Seeding″ specifies where data goes. Valid values are ITM5,
ITM6, or BOTH.
-o Does not distribute binaries or configure, only puts the endpoint list in
an ″outfile″.
-D DataSeeding
Adds the setting ″Variable=Value″ to the environment file for the agent.
-c Specifies the network name of the management server.
Note: You can manually distribute the files and push only the configuration.
2. Use the following command to set the logging behavior of the IBM Tivoli
Monitoring engine:
wdmepconfig -e Myendpoint -D DataSeeding= ITM5 | ITM6 | BOTH
wdmepconfig -e {endpoint | @endpoints_file} {-D key=value [-D key=value]... }
Note: This section does not show agent-specific requirements (such as supported
application levels or any hardware requirements that are unique to a certain
agent). For this information, see the user’s guide for the agent that you are
installing.
Notes:
1. The Tivoli Enterprise Portal desktop client is supported on marked platforms. However, the
browser client is supported only on Windows computers running Internet Explorer 6.
2. The Monitoring agent column indicates the platforms on which an agent is supported. It
does not indicate that any agent runs on any platform. For example, to monitor a Linux
computer, you must use a Linux monitoring agent, not a Windows monitoring agent.
3. * For Windows 2003 Server: If you do not plan to deploy Service Pack 1 in your environment
at this time, you must download and install Microsoft Installer 3.1, which is available from
the Microsoft Download Web site (www.microsoft.com/downloads).
4. For information about installing the Tivoli Enterprise Monitoring Server on z/OS, see the
Program Directory that comes with that product. For information about configuring the
monitoring server on z/OS, see the IBM Tivoli Monitoring Services on z/OS Program Directory,
GI11-4105.
Required software
Table 29 lists the required software for IBM Tivoli Monitoring.
Table 29. Required software for IBM Tivoli Monitoring
Component where the software is required
Notes:
1. The only supported database for a Linux portal server is DB2.
2. Each database requires a driver:
v JDBC-DB2 driver for DB2
v MS SQL JDBC driver for MS SQL
v Oracle JDBC driver for Oracle
3. If you are installing Tivoli Enterprise Portal on a Linux computer, an OS user is required to support the
configuration of DB2. If such a user does not exist, the installation program attempts to create it. If the
installation program does not have the required authority, the installation fails.
4. IBM Tivoli Monitoring supports MS SQL Server 2000 only if the data is limited to code points inside the Basic
Multilingual Plane (range U+0000 to U+FFFF). This restriction does not apply to IBM DB2.
For all operating systems, see the GSKit documentation for the full set of
prerequisites related to that software, which is installed during the IBM Tivoli
Monitoring install. The GSKit documentation is available at http://www-
1.ibm.com/support/docview.wss?uid=pub1sc32136300.
If you want to remove just one component such as an agent, see “Uninstalling an
individual IBM Tivoli Monitoring agent or component” on page 142.
5. Click OK.
A progress window (Figure 29) is displayed.
After Tivoli Enterprise services have stopped, you are prompted to indicate
whether you want to remove the Tivoli Enterprise Portal database (Figure 30).
6. Click Yes.
Another window (Figure 31) is displayed to request required information for
removing the database:
7. Type the password for the DB2 administrator in the Admin Password field and
click OK.
The following progress window (Figure 32 on page 141) is displayed.
where $itm_installdir is the path for the home directory for IBM Tivoli
Monitoring.
2. Run the following command:
./uninstall.sh
Note: If for any reason, the UNIX uninstallation is not successful, run the
following command to remove all IBM Tivoli Monitoring directories:
rm -r itm_installdir
where $itm_installdir is the path for the home directory for IBM Tivoli
Monitoring.
2. Run the following command:
./uninstall.sh
For example, to remove the DB2 data source from the DB2 command line, run the
following command: DB2
UNCATALOG SYSTEM ODBC DATA SOURCE <datasource_name>
Uninstalling the IBM Tivoli Monitoring 5.x endpoint agent from the
Tivoli management region
Run the following command to remove the IBM Tivoli Monitoring 5.x endpoint
agent from the Tivoli management region:
wuninst ITM61AGT <tmr_servername> -rmfiles
IBM can have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information that has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
Trademarks
IBM, the IBM logo, AF/Remote, AIX, Candle, DB2, Hummingbird, i5/OS,
OMEGAMON, OS/390, OS/400, Passport Advantage, RS/6000, Tivoli, Tivoli logo,
Tivoli Enterprise, Tivoli Enterprise Console, and z/OS are trademarks or registered
trademarks of International Business Machines Corporation in the United States,
other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names can be trademarks or service marks of
others.
F H
field suppression in format description 114 heartbeat
fields frequency 66
Circular Gauge 50 missed 66
IBM Tivoli Enterprise Console server 72 purpose 66
Linear Gauge 49 testing exercise 66, 67
log entry 112, 116 history data
padding with zeros 121 configuring 39, 40, 65
Tivoli Enterprise Login window 76 permission to configure 40
UNIX Log Agent customer configuration 107 Warehouse Proxy prerequisite 39
URL monitoring 102 Hot Standby
Warehouse Proxy 40 backup for hub monitoring server 97
filters configuration 97, 98
clearing 57 continuous availability 97
color-coded 77 verifying 99
criteria, adding 57 hub monitoring server
dynamic type 73 application support, adding 21
events backup 97
console properties, setting 47 communication protocol 23, 25
types, controlled viewing 74 configuring 20
viewing 76 default values 39
names 76 failure fallback 97
operators 77 host name 25
prefilters and postfilters 56 information gathering 80
queries, using 56 installing and configuring 7
required 57 naming 72, 80
severity 76 planning to install 4, 5, 25
situations 62 purpose 66
status 77
tools 74
types 73, 76
floating point numbers 122
I
icons
format command 110
Acknowledge 45
format description components 113
Bar chart 48
data mapping specifications 118
Browser 48
data type 115
Circular Gauge 50
field suppression 114
clock 45
literals 113
Close Situation event 46
offsets 114
Close Situation Event 46
size 115
conventions xii
width 114
Create new Situation 44
formatting mapped data 119
Create New Situation 43
forwarding events 72
Dragging mouse pointer 60
Edit Navigator View 60
Enterprise level item 60
G Event Console 46
gateways event, acknowledged 45
ignored by Scan tool 81 Graphic 48
information gathering 80 Graphic View 59
infrastructure component 82 graphic view, creating 59
location 79 indicators 37
mapping 81 Linear Gauge 49
Index 149
icons (continued) Linux (continued)
linked chain 45 monitoring server environment 5
Message Log 47 portal desktop client 32, 33
Mouse hand pointer 59 portal server, installing 22, 24
Navigator editor 59 test environment 5
New Policy 51 literals in format description 113
Notepad 48, 49 Locking Conflict workspace 106
Pie chart 48 logs
Plot chart 48 ASCII 110
Properties 47, 48, 49 command syntax for generic users 112
Properties editor 49 daemons 106
Query 49, 56, 57 data collection, configuring 42
Query editor 57 dynamically changing during monitoring agent
removing 60 activity 109
Save 47 entry times 125
Saving 59 example format for generic user 111
Select 59 format description 112
selecting 60 monitoring other types 110
Situation editor 44, 45 selecting for monitoring 106
Split Horizontally 46, 59 supported types 110
Split Vertically 46, 59 timestamps 125
status indicator 45 user, generic 110
Stop situation 46, 52
Table 48
Target mouse pointer 60
Terminal 48
M
manuals
Thresholds 47
See also publications
Time span 55
feedback ix
Tivoli Enterprise Portal Desktop Client 41
online ix
Universal Message Console 47
ordering ix
infrastructure road map 84
mapping data
installing
format 119
agents 3
specifications 118
backup monitoring server 98
mapping format specifier components 120
basic 3
data type 122
DB2 3
escape characters 123
environment layout 3, 4
literals 120
high-level steps 3
options 120
hub server 3
precision 122
portal desktop client 3
size 122
portal server 3
width 121
preconfiguration 3
Message Log icon 47
requirements for hardware and software 3
messages 102, 108
metafiles
adding to the Universal Agent 100
J importing 100
Java SDK 22, 27, 31 monitoring application script 100
JDBC drivers 64 metrics, using to create situations 96
missed heartbeat from monitoring agent, meaning 66
monitoring agents
K application support 103
configuring 3, 98
kernel daemons 67, 108
daemons 67
keywords
deployment 13
conventions xii
heartbeats 66, 67
modifying configuration 105
installing 3
Korn shells 109
managed system status 66
non-operating system 3
online or offline status 66, 67
L product codes 21
layout of environment 4 refreshing 109
leading zeros 121 starting and stopping 69
legal notices 145 summarization and pruning 63
Linear Gauge icon 49 types 69
Linux users’ guides troubleshooting information 102
configuring portal server 25 monitoring application script 100
daemons 67
Index 151
R system conditions, monitoring (continued)
using workspaces 106
RAS log 106 System Overview workspace 106
reflex action 54
refresh signal 110
replacements for placeholder attribute value 87
road map for the infrastructure 84 T
row limit, setting 47 Take Action commands, creating and sending 54
Target mouse pointer icon 60
Terminal icon 48
S text months 125
threshold
Save icon 47 indicator 47
scan directives quick 47
definition and purpose 112 Thresholds icon 47
examples of correct usage 113 Time span icon 55
scansets 117 time span, setting 55
scheduling work with policies 51 timestamps 125
Secondary TEMS 98 Tivoli Enterprise Portal Browser
Select icon 59 See also browsers
severity statuses 77 client support 35
sharing Navigator items 60 memory requirement 135
shells, Bourne, Korn, and C 109 mode 49
Situation editor icon 44 starting client 38
situations support 25
all, viewing 69 Tivoli Enterprise Portal Desktop Client icon 41
associated 61, 62 Tivoli Enterprise Portal Server 3
closing 46 agents support 34
creating 43 communication protocols 23
definition and purpose 37 configuring 23
editing 44, 45 configuring on Linux 25
editor 43 database name 25
embedded 96 encryption key when installing 23
Expert Advice 106 installing 4
exporting details to a file 68 Linux 5, 22, 24
flyover listings 45 required support 3, 33
forwarding 75 starting 26
generating 39 stopping 34
managing 68 upgrade environment 5
monitoring agents, default settings for each 38 Windows 4, 22
opening 105 Tivoli Monitoring Services logs 42
pure events 46 Tivoli software information center xi
reflex action 54, 70 Tivoli technical training xii
sampled events 46 toolkit image 83
status of each 38 tools
stopping 46, 51 access 92
triggering an event 39 upgrade 92
UDB_DB_SQL_Fail_High 105 trace and logging information 102
UDB_Status_Warning 105 trademarks 146
UNIX 44 training, Tivoli technical xii
viewing 38 typeface conventions xii
size in format description 115
SOAP
information 70, 87
port 87 U
server 87 UDB_DB_SQL_Fail_High situation 105
Solaris servers UDB_Status_Warning situation 105
hardware requirements 133 Universal Agent
portal installation exceptions 35 adding metafile 100
supported versions for ITM components 133 configuring and starting 101
Split Horizontally icon 46 customer monitor creation 99
Split Vertically icon 46 installing 99
Stop situation icon 46, 52 monitoring a URL 101
syntax for environment variables monitoring application script 100
See environment variables Universal Message Console icon 47
syslog daemon configuration file 108 Universal Message console view 47
system conditions, monitoring UNIX
using situations 105 commands help 68
Index 153
X
XML output file for infrastructure upgrade 84
Y
year, omitting from entry times 126
Z
zeros
leading 121
trailing 121
Printed in USA
SC32-1803-00