HPE IMC APM Linux Application Monitor Configuration Examples

Size: px
Start display at page:

Download "HPE IMC APM Linux Application Monitor Configuration Examples"

Transcription

1 HPE IMC APM Linux Application Monitor Configuration Examples Part number: Software version: IMC APM 7.2 (E0401) Document version: 1 The information in this document is subject to change without notice. Copyright 2016 Hewlett Packard Enterprise Development LP

2 Contents Introduction 1 Prerequisites 1 Configuration restrictions and guidelines 1 Example: Using APM to monitor Linux 2 Network requirements 2 Adding a Linux application monitor 2 Configuring global thresholds for the Linux application monitor 4 Verifying the configuration 5 Viewing the Linux application monitor report 5 Viewing a threshold alarm 12 i

3 Introduction This document provides examples for configuring APM to monitor Linux applications in a data center. Linux is a popular open source operating system. Its running affects services on the system. By monitoring Linux, you can understand the performance of the Linux application. Prerequisites Before you configure APM to monitor a Linux application, complete the following configurations: Start the Linux operating system. Make sure the APM server can communicate with the Linux application. To view traffic statistics in the monitor report of the Linux application, make sure at least one probe is configured in APM. Perform one of the following tasks: To monitor the Linux application through an agent, deploy the agent on the host on which the Linux operating system is installed. To monitor the Linux application through SNMP: Enable and configure SNMP for the host on which the Linux operating system is installed. For more information about enabling SNMP on Linux, see the Linux help. Obtain the read-only community strings. To monitor the Linux application through CLI: Enable and configure Telnet or SSH on Linux. For more information about enabling Telnet or SSH on Linux, see the Linux configuration guide. Obtain the user name and password of the Telnet or SSH user who has the Linux administrator's privileges. Configuration restrictions and guidelines When you configure APM to monitor the Linux application, follow these restrictions and guidelines: To monitor the following IPMI indexes, set Use IPMI to Enable when you add the Linux application monitor: Memory. Power supply. Temperature. Fan. Board. Chassis. If the Linux application is monitored through SNMP, you cannot monitor the following indexes: I/O state. Error log. Version. inode. Zombie process. 1

4 Zombie process number. Vol group. Session information. Example: Using APM to monitor Linux Network requirements As shown in Figure 1, a company has multiple Linux VMs running on a server in the data center. The server administrator intends to monitor the Linux operating systems by using APM. Figure 1 Network diagram Table 1 Host addresses and software versions Host IP address Software version Windows Server 2008 R2 IMC IMC PLAT 7.2 (E0403) IMC APM 7.2 (E0401) Server Red Hat Enterprise Linux 6.4 (Santiago) Adding a Linux application monitor 1. Log in to IMC. 2. Click the Resource tab. 3. From the navigation tree, select Application Manager > Add Application. 4. Click Linux of the Linux Server Monitor category. 5. Enter the IP address of the host where the Linux application to be monitored is installed in the IP Address field. The Name field is automatically populated with Linux_ Set the monitor type: a. Select SSH from the Monitor Type list. b. Click the Configure icon. c. In the dialog box that appears, select Password from the Authentication Mode list. d. Enter the SSH user name and password in the Username and Password fields, respectively. e. Use the default settings of other parameters. f. Click OK. 7. Enable IPMI monitoring: a. Select Enable from the Use IPMI list. b. Enter the IP address of the baseboard management controller (BMC) for IPMI monitoring. 2

5 c. Enter the user name and password of the BMC for IPMI monitoring. 8. Use the default settings of other parameters. Figure 2 Adding a Linux application monitor 9. Click OK. The application monitor named Linux_ appears on the application monitor list, as shown in Figure 3. Figure 3 Viewing the application monitor list 3

6 Configuring global thresholds for the Linux application monitor 1. Click the Resource tab. 2. From the navigation tree, select Application Manager > Configurations. 3. Click Threshold Configuration. The Threshold Configuration page appears. 4. Click the Global Threshold tab. 5. Click Linux Server Monitor next to Application Category. 6. Click Linux next to Application Type. The list displays all Linux indexes for which you can configure thresholds, as shown in Figure 4. Figure 4 Global threshold list This example describes threshold settings of the File System Usage Ratio parameter. 7. Click the Modify icon for the File System Usage Ratio parameter. The Modify Threshold page appears. 8. Configure the following parameters, as shown in Figure 5: Select Enable from the Enable Level-1 Threshold list. Set a level-1 threshold value in the Threshold field. Set an alarm trigger frequency in the Trigger Times field. Select Enable from the Enable Level-2 Threshold list. Set a level-2 threshold value in the Threshold field. Set an alarm trigger frequency in the Trigger Times field. APM generates a level-1 or level-2 threshold alarm when the File System Usage Ratio parameter meets the alarm trigger conditions for the level-1 or level-2 threshold. 4

7 Figure 5 Modifying thresholds 9. Click OK. Verifying the configuration Viewing the Linux application monitor report 1. Click the Resource tab. 2. From the navigation tree, select Application Management > Application Monitor. The application monitor list displays all application monitors. 3. Click Linux_ to display the report. Figure 6 shows part of the Linux application monitor report. The report contains index values obtained from the most recent polling of the application. Figure 6 Linux application monitor report 5

8 The following sections describe some fields in the report. CPU Usage Ratio The CPU Usage Ratio area contains the following fields, as shown in Figure 7: CPU Usage Ratio CPU usage ratio of the Linux application. Click the Set Threshold icon to set alarm thresholds for the CPU usage. History Record Click the History Record icon to view the history graph of the CPU usage ratio. Figure 7 CPU Usage Ratio Memory Usage Ratio The Memory Usage Ratio area displays information about physical memory and swap memory. The Memory Usage Ratio area contains the following fields, as shown in Figure 8: Physical Memory Physical memory of the Linux application, which corresponds to the physical memory bar. Swap Swap memory of the Linux application, which corresponds to a disk space. Total Total amount of the physical or swap memory. In Use Size of the physical or swap memory in use. Click the History Record icon to view the history graph of the physical or swap memory in use. Usage Ratio Physical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/total memory x 100%. Click the Set Threshold icon to set alarm thresholds for the physical or swap memory. Click the History Record icon to view the history graph of the physical or swap memory usage. 6

9 Figure 8 Memory Usage Ratio Ping Test When the polling interval expires, APM pings the Linux host by sending a maximum of three ICMP packets. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after sending out all ICMP packets, it considers the ping test a failure. The Ping Test area contains the following fields, as shown in Figure 9: Response Time Round trip response time of the Linux application. Click the History Record icon to view the history graph of the response time. Packets Sent Number of ICMP packets that are sent. The maximum value is 3. Click the History Record icon to view the history graph of the sent packets. Packets Received Number of ICMP response packets that are received. The value is 0 or 1. Click the History Record icon Figure 9 Ping Test to view the history graph of the received packets. System Load APM counts the average system load over 1 minute, 5 minutes, and 15 minutes. The average system load records the average number of processes in the run queue over a specific time interval. An overloaded system results in severe performance issues. The load threshold value varies by CPU model. The System Load area contains the following fields, as shown in Figure 10: System Load/Min Average system load over the last 1 minute. Click the History Record icon to view the history graph of the system load over the last 1 minute. 7

10 System Loads/5 Min Average system load over the last 5 minutes. Click the History Record icon to view the history graph of the system load over the last 5 minutes. System Loads/15 Min Average system load over the last 15 minutes. Click the History Record icon to view the history graph of the system load over the last 15 minutes. Figure 10 System Load File System Usage Ratio The Linux file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. Use the File System Usage Ratio area to display how the available disk space is used. The File System Usage Ratio area contains the following fields, as shown in Figure 11: Name Mount point of the file system in the Linux directory structure. File System Usage Ratio Space usage ratio of the Linux file system. Click the Set Threshold icon to set alarm thresholds for the file system usage. Click the History Record icon to view the history graph of the file system usage ratio. In Use Used space of the file system. Click the History Record icon to view the history graph of the used file system space. Free Space Free space of the file system. Click the History Record icon to view the history graph of the free file system space. Figure 11 File System Usage Ratio 8

11 Network Interface The Network Interface area contains the following fields, as shown in Figure 12: Interface Name Identifier of a network interface card in Linux. APM monitors both physical and virtual (logical) network interface cards. Receive Rate Receive rate of a network interface card. Click the Set Threshold icon to set alarm thresholds for the receive rate of Linux network interface cards. Send Rate Send rate of a network interface card. Input Error Packet Rate Number of inbound error packets per second on a network interface card. Output Error Packet Rate Number of outbound error packets per second on a network interface card. Figure 12 Network Interface Process By default, the list does not contain any processes. To monitor processes on Linux, click the Configuration icon to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio. The Process area contains the following fields, as shown in Figure 13: Config Click the Config icon to select processes to be monitored in the monitor list window. Process Name Name of the monitored process. For processes with the same name but different Process Identifiers (PIDs), APM collects the CPU usage ratio and the memory usage ratio for each process. For example, the Apache application might generate a lot of httpd processes, and APM collects the CPU usage ratio and the memory usage ratio for each httpd process selected. ID Unique identifier of the process on the operating system. Parent ID ID of the parent process for the process. CPU Usage CPU usage ratio of the process. Click the Set Threshold icon to set alarm thresholds for CPU usage. Click the History Record icon to view the history graph of CPU usage. Memory Usage Memory usage ratio of the process. Click the History Record icon to view the history graph of memory usage. CPU Time Duration that the process occupies the CPU. 9

12 Figure 13 Process I/O State APM can monitor the I/O status of disks, partitions, or logical volumes in Linux. The I/O State area contains the following fields, as shown in Figure 14: Device Name Name of the disk, partition, or logical volume in Linux. I/O Read Rate Data output rate of the disk, partition, or logical volume in Linux. I/O Write Rate Data input rate of the disk, partition, or logical volume in Linux. Figure 14 I/O State inode The inodes are required when you create a file or directory in the Linux file system. If inodes are used up, you cannot create a file or directory in the file system. The inode area contains the following fields, as shown in Figure 15: File System File system on the Linux server. Total Total number of available inodes in the file system. Click the History Record icon to view the change trend of the total number of inodes in the file system. Free Number of inodes that are not used in the file system. Click the History Record icon to view the change trend of the number of idle inodes in the file system. In Use Number of inodes that have been used in the file system. Click the History Record icon to view the change trend of the number of used inodes in the file system. inode Usage Ratio Usage of inodes in the file system. Click the Set Threshold icon to set alarm thresholds for file system inode usage. Click the History Record icon to view the history graph of inode usage in the file system. 10

13 Figure 15 inode Vol Group Logical volume management manages disk partitions in the Linux operating system. It combines one or more physical disks to a volume group and creates a logical volume for the volume group. One logical volume equals a disk partition. The Vol Group area contains the following fields, as shown in Figure 16: Name Name of the volume group. Size Size of the volume group. Click the History Record icon to view the history graph of volume group size. In Use Volume group space in use. Click the History Record icon to view the change trend of used volume group space. Free Space Volume group space that is not used. Click the History Record icon to view the history graph of free volume group space. Usage Ratio Usage of volume group space. Click the Set Threshold icon to set alarm thresholds for space usage of the volume group. Click the History Record icon to view the history graph of space usage of the volume group. Figure 16 Vol Group Session Information The Session Information area displays Linux session login information. The Session Information area contains the following fields, as shown in Figure 17: User Name User who has logged in to Linux. TTY TTY used by the user. Login IP Client IP address used by the user to log in to Linux. The value of :0 indicates that the user logs in to Linux through the console. Login Time Time when the user logged in to Linux. Idle Idle time after the user logged in to Linux. Command Most recently executed command after the user logged in to Linux. 11

14 Figure 17 Session Information Viewing a threshold alarm 1. Open the Linux application monitor report. When a threshold alarm is generated, the health status of the Linux application monitor changes. The Monitor Information area displays the unrecovered alarms, as shown in Figure 18. Figure 18 Monitor information 2. Click the alarm information to view alarm details, as shown in Figure

15 Figure 19 Alarm details 13

Section 5 Configuring the Partition for Enterprise Output Manager (EOM)

Section 5 Configuring the Partition for Enterprise Output Manager (EOM) Section 5 Configuring the Partition for Enterprise Output Manager (EOM) The Enterprise Output Manager (EOM) partition runs on an enterprise partition platform (EPP) and is intended for running the product.

More information

5nine Cloud Monitor for Hyper-V

5nine Cloud Monitor for Hyper-V 5nine Cloud Monitor for Hyper-V Getting Started Guide Table of Contents System Requirements... 2 Installation... 3 Getting Started... 8 Settings... 9 Authentication... 9 5nine Cloud Monitor for Hyper-V

More information

NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide

NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide Sachin Maheshwari, Anand Ranganathan, NetApp October 2012 Abstract This document provides

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System

Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System DEPLOYMENT GUIDE Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System Version 1.0 Deploying F5 with Cacti Open Source Network Monitoring System Welcome to the F5 and Cacti deployment

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

How to Program a Commander or Scout to Connect to Pilot Software

How to Program a Commander or Scout to Connect to Pilot Software How to Program a Commander or Scout to Connect to Pilot Software Commander and Scout are monitoring and control products that can transfer physical environmental conditions and alarm sensor electrical

More information

NAS 109 Using NAS with Linux

NAS 109 Using NAS with Linux NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on

More information

Integrating with IBM Tivoli TSOM

Integrating with IBM Tivoli TSOM Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

User's Guide. System Monitor - Performance Monitoring Services 5.0

User's Guide. System Monitor - Performance Monitoring Services 5.0 User's Guide System Monitor - Performance Monitoring Services 5.0 Preface System Monitor - Performance Monitoring Services (hereafter referred to as "System Monitor - Performance Monitoring Services")

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool

MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool TECHNOLOGY DETAIL MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool INTRODUCTION Storage system monitoring is a fundamental task for a storage administrator.

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Equalizer VLB Beta I. Copyright 2008 Equalizer VLB Beta I 1 Coyote Point Systems Inc.

Equalizer VLB Beta I. Copyright 2008 Equalizer VLB Beta I 1 Coyote Point Systems Inc. Equalizer VLB Beta I Please read these instructions completely before you install and configure Equalizer VLB. After installation, see the Help menu for Release Notes and the Installation and Administration

More information

Monitoring IBM HMC Server. eg Enterprise v6

Monitoring IBM HMC Server. eg Enterprise v6 Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

WNMS Mobile Application

WNMS Mobile Application WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted

More information

Command Center 5.0 2015-05-15 13:29:23 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Command Center 5.0 2015-05-15 13:29:23 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Command Center 5.0 2015-05-15 13:29:23 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Command Center 5.0... 11 Command Center 5.0... 13 Release Notes...

More information

Dell Server Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager User's Guide

Dell Server Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager User's Guide Dell Server Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager User's Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make

More information

Configure Cisco Unified Customer Voice Portal

Configure Cisco Unified Customer Voice Portal Cisco Unified Customer Voice Portal Configuration, page 1 Configure Gateways, page 1 Transfer Unified CVP Scripts and Media Files, page 2 Unified Customer Voice Portal Licenses, page 2 Configure SNMP,

More information

Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4

Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4 Install Cacti Network Monitoring Tool on CentOS 6.4 / RHEL 6.4 / Scientific Linux 6.4 by SK Cacti is an open source, front-end for the data logging tool called RRDtool. It is a web based network monitoring

More information

1 Download & Installation... 4. 1 Usernames and... Passwords

1 Download & Installation... 4. 1 Usernames and... Passwords Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...

More information

How to integrate Verax NMS & APM with Verax Service Desk

How to integrate Verax NMS & APM with Verax Service Desk How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Features Overview Guide About new features in WhatsUp Gold v14

Features Overview Guide About new features in WhatsUp Gold v14 Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...

More information

Configuring WMI Performance Monitors

Configuring WMI Performance Monitors Configuring WMI Performance Monitors With WMI, WhatsUp Gold Premium Edition monitors and sends alerts based on performance counters that are reported from Microsoft Windows devices. The data collected

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Understanding DRAC/MC Alerts

Understanding DRAC/MC Alerts Understanding DRAC/MC Alerts The Dell Remote Access Controller/Modular Chassis (DRAC/MC) provides various alerting mechanisms by which administrators can monitor and manage the components within a Dell

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Acronis Monitoring Service

Acronis Monitoring Service Acronis Monitoring Service USER GUIDE Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting up website

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 2 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You

More information

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Smart Business Architecture for Midsize Networks Network Management Deployment Guide Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart

More information

Perfmon Collection Setup Instructions for Windows Server 2008+

Perfmon Collection Setup Instructions for Windows Server 2008+ Perfmon Collection Setup Instructions for Windows Server 2008+ Performance statistics are critically vital for the long-term health and capacity management of an enterprise environment. Unless a third-party

More information

Application Performance Monitoring for WhatsUp Gold v16.1 User Guide

Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Contents Table of Contents Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application

More information

Lab 8.3.13 Configure Cisco IOS Firewall CBAC

Lab 8.3.13 Configure Cisco IOS Firewall CBAC Lab 8.3.13 Configure Cisco IOS Firewall CBAC Objective Scenario Topology In this lab, the students will complete the following tasks: Configure a simple firewall including CBAC using the Security Device

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

VMware vsphere Data Protection Advanced 5.5

VMware vsphere Data Protection Advanced 5.5 Data Protection Advanced 5.5 EMC Data Domain Integration TECHNICAL WHITE PAPER Table of Contents Data Domain Configuration... 4 Architecture Overview.... 4 vsphere Data Protection Advanced Client Support....

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.

More information

Server Management Tools (ASMT)

Server Management Tools (ASMT) 1 Auspex Server Management Tools (ASMT) Introduction This module presents the Auspex Server Management Tools, or ASMT. This is a graphical interface which allows you to perform most NetServer system administration

More information

Prerequisites and Configuration Guide

Prerequisites and Configuration Guide Prerequisites and Configuration Guide Informatica Support Console (Version 2.0) Table of Contents Chapter 1: Overview.................................................... 2 Chapter 2: Minimum System Requirements.................................

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

Application Performance Monitoring for WhatsUp Gold v16.2 User Guide

Application Performance Monitoring for WhatsUp Gold v16.2 User Guide Application Performance Monitoring for WhatsUp Gold v16.2 User Guide C o n t e n t s CHAPTER 1 Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application

More information

Using the IPMI interface

Using the IPMI interface Using the IPMI interface The T800, T1600 and T3200 server models are equipped with an IPMI interface with KVM / IP functionality. This enables you to access the server console if it becomes inaccessible

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

4. Getting started: Performing an audit

4. Getting started: Performing an audit 4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,

More information

MCTS Guide to Microsoft Windows 7. Chapter 10 Performance Tuning

MCTS Guide to Microsoft Windows 7. Chapter 10 Performance Tuning MCTS Guide to Microsoft Windows 7 Chapter 10 Performance Tuning Objectives Identify several key performance enhancements Describe performance tuning concepts Use Performance Monitor Use Task Manager Understand

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...

More information

Plesk 8.3 for Linux/Unix System Monitoring Module Administrator's Guide

Plesk 8.3 for Linux/Unix System Monitoring Module Administrator's Guide Plesk 8.3 for Linux/Unix System Monitoring Module Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670

More information

User s Manual. Management Software for Inverter

User s Manual. Management Software for Inverter WatchPower User s Manual Management Software for Inverter Table of Contents 1. WatchPower Overview... 2 1.1. Introduction... 2 1.2. Features... 2 2. WatchPower Install and Uninstall... 2 2.1. System Requirement...

More information

BlackBerry Enterprise Server Version: 5.0. Monitoring Guide

BlackBerry Enterprise Server Version: 5.0. Monitoring Guide BlackBerry Enterprise Server Version: 5.0 Monitoring Guide SWD-567890-0331093029-001 Contents 1 BlackBerry Enterprise Server monitoring solution... 5 BlackBerry Monitoring Service... 5 Web address and

More information

Creating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen

Creating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen Creating Basic Custom Monitoring Dashboards by Antonio Mangiacotti, Stefania Oliverio & Randy Allen v1.1 Introduction With the release of IBM Tivoli Monitoring 6.3 and IBM Dashboard Application Services

More information

NAS 242 Using AiMaster on Your Mobile Devices

NAS 242 Using AiMaster on Your Mobile Devices NAS 242 Using AiMaster on Your Mobile Devices Learn to use AiMaster on your mobile devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use AiMaster

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Using Additional Pollers with WhatsUp Gold v16.0 Learn how to install, configure, and manage pollers for load balancing on your WhatsUp Gold system

Using Additional Pollers with WhatsUp Gold v16.0 Learn how to install, configure, and manage pollers for load balancing on your WhatsUp Gold system Using Additional Pollers with WhatsUp Gold v16.0 Learn how to install, configure, and manage pollers for load balancing on your WhatsUp Gold system Contents CHAPTER 1 Polling Overview WhatsUp Gold Polling

More information

Monitor the Cisco Unified Computing System

Monitor the Cisco Unified Computing System Monitor the Cisco Unified Computing System Using Sentry Software Monitoring for BMC ProactiveNet Performance Management White Paper September 2010 August 2010 Contents What You Will Learn... 3 Overview...

More information

Server Management Agent for Windows User s Guide. Server Management 2.0 and Higher

Server Management Agent for Windows User s Guide. Server Management 2.0 and Higher Server Management Agent for Windows User s Guide Server Management 2.0 and Higher March 2008 . unisys imagine it. done. Server Management Agent for Windows User s Guide Server Management 2.0 and Higher

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 3 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You

More information

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted

More information

Overview of Inventory Management

Overview of Inventory Management CHAPTER 1 Inventory Management in Cisco Prime LAN Management 4.2 groups the various activities in LMS involved in managing your inventory: your network devices. You can access these features from the Inventory

More information

Monitoring Operation Manual (US Region)

Monitoring Operation Manual (US Region) NTT Communications Cloudⁿ Monitoring Operation Manual (US Region) Ver.1.0 Any secondary distribution of this material (distribution, reproduction, provision, etc.) is prohibited. 1 Version no. Revision

More information

Managing User Security: Roles and Scopes

Managing User Security: Roles and Scopes CHAPTER 10 These topics describe how Cisco ANA implements a two-dimensional security engine combining a role-based security mechanism with scopes (groups of NEs) that are granted to users. In addition,

More information

Install Guide for JunosV Wireless LAN Controller

Install Guide for JunosV Wireless LAN Controller The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which

More information

freesshd SFTP Server on Windows

freesshd SFTP Server on Windows freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone

More information

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)

More information

Network performance monitoring. Performance Monitor Usage Guide

Network performance monitoring. Performance Monitor Usage Guide Network performance monitoring Performance Monitor Usage Guide Purpose of document This document provides an overview of the features available in the network performance monitoring system, hosted within

More information

Getting Started Guide

Getting Started Guide Cove r Business-Oriented Network Management Solution Getting Started Guide (UPM 4.1) Copyright 2015 Colasoft LLC. All rights reserved. 0 UPM Activation Input the IP address of UPM server in the address

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Getting Started with Database Provisioning

Getting Started with Database Provisioning Getting Started with Database Provisioning VMware vfabric Data Director 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

LogMeIn Network Console Version 8 Getting Started Guide

LogMeIn Network Console Version 8 Getting Started Guide LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...

More information

Nimsoft Monitor. zones Guide. v1.3 series

Nimsoft Monitor. zones Guide. v1.3 series Nimsoft Monitor zones Guide v1.3 series Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed, without

More information

First Steps to Using PacketShaper ISP

First Steps to Using PacketShaper ISP First Steps to Using PacketShaper ISP TABLE OF CONTENTS OVERVIEW...1 DETERMINING YOUR PACKETSHAPER ISP DEPLOYMENT STRATEGY...2 ISP Upstream Link...2 Cable or DSL Head End...2 USING THE CLASSIFICATION-ACCELERATOR

More information