Centralizing Console and Log Management Across the zenterprise
|
|
|
- Roberta O’Neal’
- 10 years ago
- Views:
Transcription
1 Centralizing Console and Log Management Across the zenterprise Mike Sine IBM, Advanced Technical Skills, Americas March 13, 2012 Session: 10757
2 Agenda Introduction Centralized vs Distributed Management Hybrid or Combining the Methodologies Central Area Central Collection Where to start? Model z/os mature practices z/vm tools functionality (SCIF) Console Management Syslog Management Enterprise event management 2
3 Central vs Distributed Management PROs of Central One place to look for messages One system to maintain, simplify maintenance, rules, alerts, etc CONs of Central Shipping large number of messages across network UDP reliability PROs of Distributed Less Network traffic CONs of Distributed Multiple systems to maintain Multiple sources for support of business applications across the enterprise 3
4 Hybrid or Combining Methodologies The best of both worlds It may not be possible technically, politically, or cost effective to completely centralize console and log management. However, organizations who consolidate where appropriate/possible can realize the benefits of centralized management at some level.
5 zenterprise makes it easier Powerful Hypervisor (Full OS with tools and applications) Central Area: Tightly Integrated Network(s) The reliability of log messages improves the closer the syslog server is to the source generating the messages. Central Collection: Centralized Operations and Network Centers
6 Agenda Introduction Centralized vs Distributed Management Hybrid or Combining the Methodologies Central Area Central Collection Where to start? Model z/os mature practices z/vm tools functionality (SCIF) Console Management Syslog Management Enterprise event management 6
7 Where to Start z/os has a mature management structure around the system console NetView or equivalent enhancements to message attributes System Automation in response to specific messages Integration to Enterprise level event monitoring z/vm Someone needs to be watching the house (operations) Focus often on distributed solutions for Linux on System z z/vm and CMS guests often ignored z/vm as a central base for Linux management often missed zbx Introduces additional virtual and physical servers Focus often on distributed solutions for Linux on System z Geographical and architecture advantages present the opportunity to include in Enterprise Management structure.
8 Where to Start z/vm zbx Provide z/os style console management practices to the z/vm system and its service machines Centralize Linux on System z with z/vm Tools Centralize blade physical and virtual server logs with z/vm Tools Enterprise Management Roll up appropriate console and log events to Enterprise Manager.
9 Where to Start: z/vm Virtual Server sprawl has increased distributed management structures in the traditionally centralized mainframe arena. z/vm SCIF PROP (customers can code features similar to vendor features) Vendor solution(s) z/vm Console Management Syslog Management Linux on System z Console Management Syslog Management zbx Syslog Management
10 z/vm Tooling z/vm SCIF (Single Console Image Facility) By means of SCIF, a user logged on to a single virtual machine can control one or more disconnected virtual machines. The controlling virtual machine is called the secondary user. A disconnected virtual machine being controlled is called a primary user. Operations Manager for z/vm will be an example SCIF base tool for this presentation.
11 Operations Manager for z/vm Increase productivity Authorized users view and interact with monitored virtual machines without logging onto them Multiple users view/interact with a virtual machine simultaneously Improve system availability Monitor virtual machines and processes Take automated actions based on console messages Reduce problems due to operator error View & interact with consoles View spool files Monitor spool usage Console monitoring Service Virtual Machine being monitored Schedule tasks Operations Manager for z/vm Take action Console monitoring Service Virtual Machine being monitored Automation Routine activities done more effectively with minimal operations staff Schedule tasks to occur on a regular basis Integration Fulfill take action requests from OMEGAMON XE on z/vm and Linux Send alerts to Netcool/OMNIbus
12 Features and Functions Monitor service machine consoles Monitor spool usage Monitor system events View and interact with monitored consoles from authorized user IDs Find and view spool files Schedule events/actions Dynamic configuration Separation of access control
13 Monitor Service Machine Consoles TEST Message 1 TEST Message 2 TEST Message 3 Operations Manager OPER Message 1 OPER Message 2 OPER Message 3 LNX Message 1 LNX Message 2 LNX Message 3 TCP Message 1 TCP Message 2 TCP Message 3 Test Data OPERATOR LINUX TCP/IP Data space 1 Data space 4 slog Message 1 slog Message 2 slog Message 3 syslog data Data space 2 OPER Message 1 OPER Message 2 Filtered TEST Message 1 TEST Message 2 Data space 3 LNX Message 1 LNX Message 3 TCP Message 1 TCP Message 2 Data space 5 slog Message 1 slog Message 2 slog Message 3 Data space 6 OPER Message 1 LNX Message 1 LNX Message 2 TCP Message 1 slog Message 1 slog Message 2 TEST Message 1 OPER Message 2 Daily log DIRM Message 1 LNX Message 1 LNX Message 2 TCP Message 1 DIRM Message 2 TCP Message 2 Unfiltered
14 Monitor Service Machines Define rules to Scan console messages for text matching Includes column, wildcard, and exclusion support Optionally restrict to specific user ID(s) Take actions based on matches Multiple rules can apply to one message Rules processed in order of definition in the configuration file FINAL option available to indicate no additional rules should be evaluated
15 View and Interact with Consoles Authorized users can view live consoles of monitored service machines and guests Multiple users can view the same console simultaneously No need to logon to the service machine to see its console Test data and Linux syslog data treated as a console Views can be defined to look at a group of consoles in one view Full screen mode Scroll up and down to view and search historical data Auto scroll (on or off) as new output is displayed on the console From command line, issue commands back to the monitored console Amount of data that is visible depends on specified or default data space size Rules/actions may modify the view Suppress messages from the console Hold or highlight messages with color, blinking, etc. Authorized users can view the log file Can also request a copy of the log file from today or a previous day
16 View and Automate with Syslogs Messages Authorized users can view syslog messages as if they were live consoles of monitored service machines Multiple users can view the same syslog console simultaneously No need to logon to the service machine to see its messages Views can be defined to look at a group of syslog consoles in one view Full screen mode Scroll up and down to view and search historical data Auto scroll (on or off) as new output is displayed on the console From command line, issue commands back to the monitored console Amount of data that is visible depends on specified or default data space size Rules/actions may modify the view Suppress messages from the console Hold or highlight messages with color, blinking, etc. Authorized users can view the log file Can also request a copy of the log file from today or a previous day
17 Monitor and View Spool Files Create spool monitors to trigger actions when Percent of spool usage falls within a specified range Percent of spool usage increases at a specified rate Actions triggered can be the same actions used by console monitoring Authorized users can Display a list of spool files based on one or more attributes Owner Size Date created From the list the user can View the contents of an individual spool file Transfer, change, or purge a spool file
18 Schedule Events and Actions Define schedules Hourly, daily, weekly, monthly, or yearly, nth weekday of the month Once on specified month, day, year, and time At regular intervals Every x hours and y minutes Within a specified window of time Specify start time Specify conflicting schedules Specify maximum time to defer this schedule Within limits Restrict to specific days of the week: Monday through Sunday plus holidays Restrict to certain hours of the day Specify the action associated with the schedule Actions specified are the same as those for console and spool monitoring
19 Respond to System Events Create monitors for z/vm system events (*VMEVENT) related to user IDs Logon Logoff Failure condition (typically CP READ) Logoff timeout started Forced sleep started Runnable state entered (VM READ) Free storage limit exceeded Optionally restrict to specific user ID(s) Specify the action associated with the event Actions specified are the same as those for schedules and console and spool monitors
20 Agenda Introduction Centralized vs Distributed Management Hybrid or Combining the Methodologies Central Area Central Collection Where to start? Model z/os mature practices z/vm tools functionality (SCIF) Console Management Syslog Management Enterprise event management 20
21 Console Management Most z/os customers provide a centralized management console in their operations center. This is often the system console enhanced with products like IBM Tivoli NetView for z/os to: highlight messages, automate actions associated with known messages, and suppress messages. Highlighted and held messages are designed to grab the operator s attention Most operations staff is accustomed to this type of message monitoring and quickly adapts to the look and feel.
22 Console Management z/vm OPERATOR user ID is similar to a systems console. May not be appropriate to suppress messages on the OPERATOR user ID. Providing direct access to the OPERATOR console for those other than system support is often not desired. Creating a custom console for the operations staff with: appropriate authorization, message attributes, and automation often provides the perfect console for operations staff in a manner that they find very familiar. Re-introduce z/vm to the Operations Staff
23 Console Management Create a new CMS guest as the Operation s Console. The console for the z/vm and Linux messages will be a standard z/vm CMS guest user ID. This CMS user ID will only get the permissions appropriate for the operations staff (in our example privilege class G). The user ID will be named OPER8. Operations Manager for z/vm rules can be defined Look for critical messages to be forwarded to OPER8 (filter stage), and have attributes applied to them for viewing by operations staff (attribute stage).
24 Console Management: Filter Stage The first stage of processing is to determine if the console message received is one appropriate for forwarding to OPER8. Once a message meets the filter criteria via an Operations Manager for z/vm rule: An action will be defined to send the message to OPER8. The message can be sent in its original or modified form.
25 Console Management: Filter Stage * DEFRULE NAME(ABEND),+ MATCH(*abend*),+ EXCLUDE(*remote*),+ EXUSER(OPER8),+ ACTION(MSGOPER8) * DEFACTN NAME(MSGOPER8),+ COMMAND(CP MSGNOH OPER8 &U : &T),+ OUTPUT(LOG),+ ENV(LVM) *
26 Console Management: Attribute Stage The second phase of processing is to apply input actions to the messages to draw attention to the operations staff indicating the severity of the alert. DEFRULE NAME(ABENDHLT),+ MATCH(*abend*),+ USER(OPER8),+ ACTION(HLTHOLD) * DEFACTN NAME(HLTHOLD),+ INPUT(AHI,HLD) *
27 Console Management: Attribute Stage The well-known input actions are: AAL. Activates an audible alarm when the message is displayed. ABL. Sets the extended display attribute to blink. AHI. Sets the display attribute to high intensity. ARV. Sets the extended display attribute to reverse video. AUL. Sets the extended display attribute to underline. CBL. Sets the extended display color to blue. CCY. Sets the extended display color to cyan. CGR. Sets the extended display color to green. CPI. Sets the extended display color to pink. CRE. Sets the extended display color to red. CWH. Sets the extended display color to white. CYE. Sets the extended display color to yellow. HLD. Holds the message on the user's console until it is removed.
28 Console Management: Attribute Stage
29 Console Management: Attribute Stage
30 Console Management: Attribute Stage
31 Agenda Introduction Centralized vs Distributed Management Hybrid or Combining the Methodologies Central Area Central Collection Where to start? Model z/os mature practices z/vm tools functionality (SCIF) Console Management Syslog Management Enterprise event management 31
32 Syslog Management Why consider Syslog Management? Linux on System z zbx: The zenterprise BladeCenter Extension (zbx) is the new infrastructure for extending System z qualities of service and management capabilities. Business or Application level monitoring of remote systems.
33 Syslog Management The ability to collect data across the zenterprise and beyond in a central location, across platforms, and manage them in a manner consistent with the console management and across the platforms provides a comprehensive management solution consistent with qualities of service and capabilities of the mainframe.
34 Syslog Management Loghost: Is an alias defined to a system s /etc/hosts file defining a central destination for syslog messages. Defining z/vm as the Loghost defines a z/vm application as the central host for the zenterprise syslog s. Example: Operations Manager for z/vm provides the DEFTCPA configuration statement to allow Operations Manager to be a loghost. When Operations Manager receives syslog data, it is treated in the same manner as console data.
35 Syslog Management: z/vm Tasks Specifying the DEFTCPA configuration statement In your Operations Manager configuration file (OPMGRM1 CONFIG, by default), add the following statement: DEFTCPA NAME(LXSYSLOG),+ TCPUSER(TCPIP),+ TCPAPPL(GOMRSYL),+ TCPADDR( ),+ TCPPORT(00514),+ PARM(LXSYSLOG UTF8)
36 Syslog Management: z/vm Tasks Authorizing Operations Manager to listen on the TCPIP port Add the following line to the file PROFILE TCPIP (on TCPMAINT s 198 disk on the authors system): 514 UDP OPMGRM1 ; OPERATION MANAGER SYSLOG PORT For this port change to take affect, recycle TCPIP. To dynamically activate these changes without restarting the TCPIP server, use the NETSTAT OBEY command. netstat obey port 514 udp opmgrm1 noautolog
37 Syslog Management: Linux tasks Several syslog daemons exist for Linux, Unix, and Windows platforms. Three popular ones are: 1. syslogd Original Syslog Daemon 2. syslog-ng content-based filtering, rich filtering capabilities, flexible configuration options (ex: port flexibility) and adds TCP for transport. 3. rsyslog features of syslog-ng plus on-demand disk buffering, reliable syslog over TCP, SSL, TLS and RELP, writing to databases, alerting.
38 Syslog Management: Linux tasks Linux syslogd configuration Update /etc/hosts dem1zvm.demopkg.ibm.com dem1zvm loghost Configure /etc/syslog.conf Restart syslogd /etc/init.d/syslog restart
39 Syslog Management: Linux tasks AIX syslogd configuration Update /etc/hosts dem1zvm.demopkg.ibm.com dem1zvm loghost Configure /etc/syslog.conf Restart syslogd refresh s syslogd
40 Syslog Management: Linux tasks syslog-ng configuration Configure /etc/syslog-ng/syslog-ng.conf The syntax for the destination statement is as follows: destination <destname> { destdriver params; destdriver params;... ; }; destination loghost { udp(" " port(515));}; The syntax for the log statement is as follows: log { source S1; source S2;... filter F1; filter F2;... destination D1; destination D2;... }; log { source(src); filter(f_messages); destination(loghost); }; Restart syslogd /etc/init.d/syslog restart
41 Syslog Management: Linux tasks rsyslog configuration Configure /etc/rsyslog.conf The syntax for rsyslog is very simple: Name/ip:port (port optional) = UPD = TCP protocol TCP example: Restart syslogd /etc/init.d/service rsyslog restart
42 Syslog Management: Test Scenario Testing the syslog route to Operations Manager A simple way to test your configuration changes in Operations Manager, TCP/IP, and Linux is to use the Linux logger command. The logger command makes entries in the system log. It provides a shell command interface to the syslog(3) system log module. The syntax follows: logger [-isd ] [-f file ] [-p pri ] [-t tag ] [-u socket ] [message... ] logger this is a syslog message from hasl106.
43 Syslog Management: Test Scenario
44 Syslog Management: Test Scenario To view the syslog from Operations Manager, use the following command from an authorized user on z/vm: gomcmd opmgrm1 viewcon user(lxsyslog) DEFTCPA NAME(LXSYSLOG),+ TCPUSER(TCPIP),+ TCPAPPL(GOMRSYL),+ TCPADDR( ),+ TCPPORT(00514),+ PARM(LXSYSLOG UTF8)
45 Syslog Management: Test Scenario
46 Logging Best Practices Source: Forward syslog messages from clients to a secure syslog server. Enable NTP clock synchronization on all clients and on the syslog server. It is very important for all systems reporting logs to be using the same time server, so that logs are all synchronized. Without doing this, it can be difficult or impossible to accurately determine the sequence of events across systems or applications. (Not for zlinux) Group like sources into the same log file. (i.e. mail server, MTA, spamassassin and A/V scanner all report to one file) Use an automated tool to establish a baseline of your logs and escalate exceptions as appropriate. Review your records retention policy, if applicable, and determine if anything kept in logs falls under that policy. If so, establish retention periods based on the records policy. Legal requirements for keeping logs vary by jurisdiction and application. The sweet spot for log retention appears to be one year. Shorter than 1 year, and it is likely that key data would be unavailable in the wake of a long running attack, and longer than one year is most likely wasting disk space. Include logs and log archives in a standard backup process for disaster recovery. Change read/write permissions on logs files so they are not accessible to unprivileged user accounts.
47 Logging Best Practices Source: Syslog is a simple protocol and is easy to wrap some very effective security around. The goal is remove as many opportunities for the central syslog server to be compromised as practical. There are 4 aspects to hardening a syslog server: The operating system The network The application The users and administrators Centralizing with z/vm application on zenterprise uniquely addresses these security recommendations of syslog.org.
48 Enterprise level console/syslog management: View & interact with consoles View spool files Schedule tasks Monitor spool usage Operations Manager for z/vm Console monitoring Take action Console monitoring Service Virtual Machine being monitored Service Virtual Machine being monitored Centralized console/syslog management. Message log console for operations and automation. Similar to z/os console management for host based operations. System z Hardware Management Console (HMC) with Unified Resource Manager z/os System z Host Syslog Consol e Linux Linux z/tpf on on z/vse System z System z z/vm System z PR/SM z HW Resources Support Element Select IBM Blades Optimizers Syslog Syslog Linux on AIX on System x 1 POWER7 Blade Virtualization Blade Virtualization DataPower 1 Blade HW Resources zbx IBM Smart Analytics Optimizer Future Offering Future Offering Data space 6 OPER Message 1 LNX Message 1 LNX Message 2 TCP Message 1 slog Message 1 slog Message 2 TEST Message 1 OPER Message 2 Daily log DIRM Message 1 LNX Message 1 LNX Message 2 TCP Message 1 DIRM Message 2 TCP Message 2 Private data network (IEDN) Note: All statements regarding IBM's plans, directions, and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
49 Agenda Introduction Centralized vs Distributed Management Hybrid or Combining the Methodologies Central Area Central Collection Where to start? Model z/os mature practices z/vm tools functionality (SCIF) Console Management Syslog Management Enterprise event management 49
50 Enterprise Event Management z/os tools today integrate with most Enterprise Management solutions z/vm Tools collecting z/vm, Linux, and syslog data often interface to Enterprise Management solutions Staging Collection at the console and syslog management level allows pre-filtering only forwarding appropriate events to the Enterprise Manager.
51 A Platform for Centralization of Events IBM Tivoli OMNIbus z/os Distributive Platforms Event Management OMNIbus solution TNM/IP Networking Voice CICS z/vm Message transport Workload EMS EMS TEC Probes Security Storage Networking Data Application Servers WorkStation Software Other Vendors Network / Systems Automation IMS DB2
52 Tivoli ITNM Netcool/Impact Business Service Manager ITM Event Pump for z/os OMEGAMON XE NetView for z/os Operations Manager for z/vm Combined Web Views Business Views Operator Views Information Tivoli Integrations Gateways Events Trouble Ticketing RDBMS Customer Care EMS OMEGAMON Non-IBM Non-IBM ITM TEC MOM Probes Physical Plant Transmission Layer Network Layer Application Layer
53 Summary z/os Console and event management is a mature process in most datacenters z/vm tools can be used to bring z/vm and Linux consoles into the mature management process of the datacenter. Centralizing syslog management with z/vm Tools allows syslog data to: Be included in the mature processes of the datacenter Meet syslog best practice standards z/os and z/vm tooling integrates well with Enterprise event management roll-up.
54 Resources Creating an Event Console with Automation for z/vm and Linux Routing Linux and UNIX SYSLOG data to IBM Operations Manager for z/vm Integrating IBM Operations Manager for z/vm with IBM Tivoli Netcool/OMNIbus Automatically Logging on a User at Linux System Boot time for Console Management
55 Hindi Russian Traditional Chinese Thank You English Korean Gracias Spanish Obrigado Brazilian Portuguese Arabic Grazie Italian Simplified Chinese Danke German Merci French Tamil Japanese Thai
Centralizing Console and Log Management Across the zenterprise
Across the zenterprise SHARE Session 14055 Tracy Dean, IBM [email protected] August 2013 Special Notices and Trademarks Special Notices This presentation reflects the IBM Advanced Technical Skills organizations
Automating Operations on z/vm and Linux on System z
Automating Operations on z/vm and Linux on System z Operations Manager for z/vm Tracy Dean, IBM [email protected] April 2009 Operations Manager for z/vm Increase productivity Authorized users view and interact
Managing z/vm and Linux Performance Best Practices
Managing z/vm and Linux Performance Best Practices Mike Sine IBM February 7, 2013 Session Number 12471 Special Notices and Trademarks Special Notices This presentation reflects the IBM Advanced Technical
Backing Up and Restoring a z/vm Cluster and Linux on System z Guests
SHARE Session 10246 Backing Up and Restoring a z/vm Cluster and Linux on System z Guests Tracy Dean, IBM [email protected] March 2012 Agenda Recommended practices Requirements for these scenarios Overview
Integrate z/vm into your z/os and Linux for System z Scheduling Environments Mike Sine IBM. Friday, February 8, 2013 Session Number: 12465
Integrate z/vm into your z/os and Linux for System z Scheduling Environments Mike Sine IBM Friday, February 8, 2013 Session Number: 12465 Session Abstract Many customers today have integrated Linux for
IBM Infrastructure Suite for z/vm and Linux
IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM [email protected] October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite
z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products
Tivoli Software z/vm and Linux on zseries Performance Monitoring An Update on How and With What Products Laura Knapp [email protected] August 2006 2006 IBM Corporation Agenda Opportunity New work loads
Backup and Restore Manager for z/vm
Managing Backup and Recovery of z/vm and Linux on System z Backup and Restore Manager for z/vm Tracy Dean, IBM [email protected] April 2009 Product Overview Backup Requested by administrators Full or incremental
Customer Experiences:
Customer Experiences: Managing the z/vm and Linux on z Systems Infrastructure Tracy Dean IBM [email protected] June 2015 Agenda What does managing include? What tools or products can you use? Customer scenarios
Managing z/vm & Linux Performance Best Practices
Managing z/vm & Linux Performance Best Practices Mike Sine Session: 16476 Thursday, March 5, 2015: 3:15 PM-4:15 PM Insert Custom Session QR if Desired. Special Notices and Trademarks Special Notices This
Red Condor Syslog Server Configurations
Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail
Actual trends in backup protection solution IBM Backup Products and Services
Actual trends in backup protection solution IBM Backup Products and Services Gražvydas Govaras IT Architektas 2013-03-19 Tivoli Storage Manager Fastback Continuos Data Protection solution for Windows and
CA VM:Operator r3. Product Overview. Business Value. Delivery Approach
PRODUCT SHEET: CA VM:OPERATOR CA VM:Operator r3 CA VM:Operator is an automated console message management system for z/vm and mainframe Linux environments. It allows you to minimize human intervention
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Options for Backing Up and Restoring z/vm and Linux Guests
Options for Backing Up and Restoring z/vm and Linux Guests Tracy Dean, IBM [email protected] June 2013 Agenda Recommended practices and available options Backing up and restoring z/vm Backing up and restoring
Building Effective Dashboard Views Using OMEGAMON and the Tivoli Enterprise Portal
1 IBM Software Group Tivoli Software Building Effective Dashboard Views Using OMEGAMON and the Tivoli Enterprise Portal Ed Woods IBM Corporation 2011 IBM Corporation IBM s Integrated Service Management
Arwed Tschoeke, Systems Architect [email protected] IBM Systems and Technology Group
Virtualization in a Nutshell Arwed Tschoeke, Systems Architect [email protected] and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler [email protected] 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
Options for Backing Up and Restoring a z/vm Cluster and Linux on System z Guests
Options for Backing Up and Restoring a z/vm Cluster and Linux on System z Guests SHARE Session 14588 Tracy Dean, IBM [email protected] March 2014 Agenda Recommended practices and available options Backing
SHARE in Pittsburgh Session 15591
Top 10 Things You Should Be Doing On Your HMC But You're NOT You Probably Are Tuesday, August 5th 2014 Jason Stapels HMC Development [email protected] Agenda Setting up HMC for Remote Use Securing User
IBM Tivoli End-to-End Software Asset Management Solutions
IBM Tivoli Business and Performance Automation IBM Tivoli End-to-End Software Asset Management Solutions IBM Tivoli License Compliance Manager for z/os, IBM Tivoli Contract Compliance Manager, and IBM
An E2E integrated approach to IT Asset Management
IBM Software Group An E2E integrated approach to IT Asset Carmen Ces IT Specialist SWG Tivoli, IBM Agenda IBM Software Group What is IT Asset? Why Business needs it? Business Priorities segments descriptions
Implementing Tivoli Storage Manager on Linux on System z
IBM Software Group Implementing Tivoli Storage Manager on Linux on System z Laura Knapp [email protected] 2006 Tivoli Software 2006 IBM Corporation Agenda Why use Linux on System z for TSM TSM Some basics
Backup Strategies for z/vm and Linux on z Systems
Backup Strategies for z/vm and Linux on z Systems Tracy Dean IBM [email protected] June 2015 Agenda Positioning Recommended practices and available options Backing up and restoring z/vm Backing up and restoring
IBM Tivoli Monitoring for Applications
Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including
Tracy Dean, IBM [email protected]. August 2014. Backing Up and Restoring a z/vm Cluster and Linux on System z Guests. SHARE Session #15727.
Backing Up and Restoring a z/vm Cluster and Linux on System z Guests SHARE Session #15727 Tracy Dean, IBM [email protected] August 2014 Agenda Recommended practices and available options Backing up and restoring
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM August 10, 2011: 1:30 PM-2:30 PM Session 9917 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
IBM Tivoli Monitoring for Databases
Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric
SOA Governance and the Service Lifecycle
IBM SOA SOA Governance and the Service Lifecycle Naveen Sachdeva [email protected] IBM Software Group 2007 IBM Corporation IBM SOA Agenda What is SOA Governance? Why SOA Governance? Importance of SOA
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog
The use of Accelerator Appliances on zenterprise
De Smet Hendrik IT Architect 13/05/2011 The use of Accelerator Appliances on zenterprise 2011 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM Sr Consulting IT Specialist Session 10723 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.OSA Express
Business Activity Monitoring of non-ibm activity
Business Activity Monitoring of non-ibm activity WebSphere Technical Sales Agenda Intro to BPM & BAM WebSphere Business Monitor Talking to WebSphere Business Monitor Demo using WebSphere Message Broker
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Cutting Through the Hype: Straight Talk About the Mainframe and Cloud Computing. Straight talk on cloud computing
Glenn Anderson, IBM Lab Services and Training Cutting Through the Hype: Straight Talk About the Mainframe and Cloud Computing Summer SHARE August 2014 Session 15593 Straight talk on cloud computing What
CA Products for z/vm Old Dogs with New Tricks
CA Products for z/vm Old Dogs with New Tricks Yvonne DeMeritt Sr. Sustaining Engineer CA Objective -Provide information on CA s z/vm product offerings that are available to assist you in meeting your z/vm
Managing IBM Lotus Notes Domino 7 Servers and Users. Course Description. Audience. Course Prerequisites. Machine Requirements.
Managing IBM Lotus Notes Domino 7 Servers and Users Course Code: 190-722 Course Title: Managing IBM Lotus Notes Domino 7 Servers and Users Duration: 3 classroom equivalent days Price: 990 USD + IVA Course
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer
Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer Session 11523 August 8, 2012 Mike Bonett IBM Corporation, IBM Advanced Technical Skills [email protected] 1 Corporation Trademarks
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Reliable log data transfer
OWASP Switzerland Chapter December 2015 Reliable log data transfer About (r)syslog, logstash, and log data signing A field report [email protected] Agenda Why we need log data transfer Syslog
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
syslog - centralized logging
syslog - centralized logging David Morgan A logging system Conforming programs emit categorized messages Messages are candidates for logging syslog handles the logging performed by syslogd per /etc/syslog.conf
IBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
SmartCloud Analytics Log Analysis
SmartCloud Analytics Log Analysis Clyde Richardson ([email protected]) Technical Sales Specialist Anuja Deedwaniya ([email protected]) IBM z Systems Enterprise Architect Paul Smith (Smitty) ([email protected])
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
Private Cloud for WebSphere Virtual Enterprise Application Hosting
Private Cloud for WebSphere Virtual Enterprise Application Hosting Tracy Smith Nationwide Insurance February 7, 2013 Session Number 12884 www.linkedin.com/in/tracysmith2 [email protected] Private
Marco Mantegazza WebSphere Client Technical Professional Team IBM Software Group. Virtualization and Cloud
Marco Mantegazza WebSphere Client Technical Professional Team IBM Software Group Virtualization and Cloud Agenda Cloud Computing: Introduction How to build private Cloud with WebSphere WebSphere Virtual
UPSTREAM for Linux on System z
PRODUCT SHEET UPSTREAM for Linux on System z UPSTREAM for Linux on System z UPSTREAM for Linux on System z is designed to provide comprehensive data protection for your Linux on System z environment, leveraging
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
The case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
z/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
Outgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
Learn How to Leverage System z in Your Cloud
Learn How to Leverage System z in Your Cloud Mike Baskey IBM Thursday, February 7 th, 2013 Session 12790 Cloud implementations that include System z maximize Enterprise flexibility and increase cost savings
CICS Modernization & Integration
CICS Modernization & Integration Modernization easier than thought The irony is that host applications are probably better suited for exposure as part of an SOA than many applications based on more modern
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
HelpSystems Web Server User Guide
HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot
Device Integration: Checkpoint Firewall-1
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
IBM Global Technology Services March 2008. Virtualization for disaster recovery: areas of focus and consideration.
IBM Global Technology Services March 2008 Virtualization for disaster recovery: Page 2 Contents 2 Introduction 3 Understanding the virtualization approach 4 A properly constructed virtualization strategy
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
The syslog-ng Premium Edition 5F2
The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
Table of Contents. Authors Wendy Wong, Senior Software Architect, and the SOLVE:Operations/Linux Connector team. Print Edition: WW180311
Table of Contents The Essentials 1 SECTION 1: ARCHITECTURE 2 CA Mainframe Connector for Linux on System z 2 What is it? 2 What does CA Mainframe Connector do? 2 How does CA Mainframe Connector work? 3
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
IBM Tivoli Monitoring for Network Performance
Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination
GFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Managed Services - A Paradigm for Cloud- Based Business Continuity
Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise
Distributed syslog architectures with syslog-ng Premium Edition
Distributed syslog architectures with syslog-ng Premium Edition May 12, 2011 The advantages of using syslog-ng Premium Edition to create distributed system logging architectures. Copyright 1996-2011 BalaBit
The syslog-ng Premium Edition 5LTS
The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).
ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2
Remote Client Program... 3. Web Client... 39
Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group
Cisco TelePresence VCR MSE 8220
Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR
Knowledge Base Articles
Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has
Cloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
z/tpf FTP Client Support
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 z/tpf FTP Client Support Name: Jason Keenaghan Venue: Main Tent AIM
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
