Centerity Monitor Standard Edition 3.8 ADMINISTRATION GUIDE VERSION 07.14

Size: px
Start display at page:

Download "Centerity Monitor Standard Edition 3.8 ADMINISTRATION GUIDE VERSION 07.14"

Transcription

1 Centerity Monitor Standard Edition 3.8 ADMINISTRATION GUIDE VERSION 07.14

2 About This Guide 2 Contents About This Guide... 6 End-User License Agreement (EULA)... 6 Before You Begin... 6 Audience... 6 Related Documentation... 6 Technical Support... 7 Chapter 1: Overview... 8 Centerity Monitor standard edition - Introduction... 8 Centerity Monitor main features... 9 Start Using Centerity Monitor Chapter 2: Hosts & Services Administration Overview New Host Wizard Host Setting General Host settings Monitoring Hosts with Dynamic IP Address Command Properties Associated Services Auto Add Services Host Dependencies Asset Management & Host Inventory Host Details Extended host information Proxy Server Discovery Engines Duplicate a Host Adding ahost Profile to An Existing Host Adding aservice to an ExistinG Host Chapter 3: Policy Manager

3 About This Guide 3 Overview Exporting Policy via Policy Manager Insatll policy safety mechanisim Chapter 4: Business Service Management (BSM) Overview CONFIGURATION Chapter 5: Service Profiles Creating A New Service Profile General Settings Command Properties Notification Settings Status Settings Misc. Settings Service Extended information Service Details Edit a Service Profile Displaying a List of Hosts with a Specific Service Service Search Options Edit a Host-Associated Service Applying a Service Profile to Multiple Hosts or Hosts Groups Chapter 6: Contacts and Contact Groups Creating a New Contact Host Notifications Service Notifications User Settings Contact Permissions Creating a New Contact Group Adding a Contact Group to a Host Group Add a Contact Group to a Host-assigned Service Add a Contact Group to a Service Profile Chapter 7: Plug-ins, Templates and Service Profiles

4 About This Guide 4 Overview Adding a New Plug-in Plug-in Information Screen Command Templates Creating Host /Service Check Commands Working With Commands Creating Notification Templates Assigning a Check Command to a Service Profile Chapter 8: Maps Overview Visual Layouts - Hypermap Visual Layouts - Topology HyperMap Visual Layouts Air View Visual Real-Time Layouts Advanced Designer Settings Visual Live Layouts Module Views & Slide Shows Chapter 9: Host & Services Dependencies Host Dependencies Service Dependencies Chapter 10: Escalation HOST ESCALATIONS HOST GROUP ESCALATIONS SERVICE ESCALATIONS Chapter 11: Settings Overview General Tab Web Settings Tab Status Settings Tab Logging Tab Other Settings tab Resource Settings Tab

5 About This Guide 5 Distributed Monitoring Tab System Settings Tab Categories Import / Export Media Manager Task Scheduler Chapter 12: Graphs Configurations Overview Graph builder methodology Disable Generic Graph Creation Assigning Graph To service Availability Graphs Chapter 13 - Reports and Report Scheduler Reports option Creating a New Report Template Creating a New Scheduled Report Editing Report Template Remove Report Template Managing Report Templates Edit Scheduled Reports Manage Scheduled Reports Setting Report Scheduler Mail Server Chapter 14 Backup and Recovery Backup Restore

6 About This Guide 6 About This Guide This Centerity Monitor Administration Guide describes how to configure and administer the Centerity Monitor system. End-User License Agreement (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of Centerity s EULA can be found at Before You Begin This manual assumes that you have installed the Centerity Monitor software and logged into the web administration as described in the Centerity Monitor Installation guide. For installation guide please click HERE. Audience This Admin-Guide is intended for network and system administrators who responsible for the implementation and operation of the Centerity system in the organization. The system administration should be the system administrator familiar with basic IT-system (Linux, Windows etc.) and networking configuration Related Documentation Please review the ReleaseNotes.txt file in your Centerity Monitor software. This file contains the latest information about new features, updates, technical notes, and resolved problems. If the information in the ReleaseNotes.txt file differs from the information found in the Centerity Monitor manuals, use the information in the ReleaseNotes.txt file. Centerity Monitor User Guide describes the Monitor console options for Centerity Monitor standard edition software. For download click here User Guide 6

7 Technical Support 7 Technical Support For technical support, contact Centerity at: support@centerity.com, Phone (EMEA) (EXT 1 for support) Phone (U.S.) Or contact your local Centerity partner. Check our website ( for additional information and most updated technical information. Under the support section you can find useful information including online forums, Template, Service Packs, Certified Plug-ins and more. With any support contact please provide the following information: License version Server s configuration and operating system, including any OS patches that have been applied. Detailed description of the requires support assistance Relevant attachments such as error messages, memory dumps, compiler listings, and error logs 7

8 Chapter 1: Overview 8 Chapter 1: Overview CENTERITY MONITOR STANDARD EDITION - INTRODUCTION Centerity Monitor Standard Edition (CMS) is an enterprise class all-in-one IT and Business service management (BSM) monitoring platform for the entire IT environment including Servers, Networks, DB, Applications, passive-equipment, Clouds, SAAS and much more. Centerity Monitor Standard Edition enables simplify all aspects of network and IT management as well as information flow, and enhance business performance. Centerity Monitor Standard Edition provides accurate measurements, drill down root cause analysis, real time statistics, live network maps graphs and most advanced features. Centerity Monitor' End-User Experience monitoring and Business Service Management capabilities allow for high level presentation of business processes and the delivery of high quality services to end users. 8

9 Chapter 1: Overview 9 CENTERITY MONITOR MAIN FEATURES o o o o o o o o o o o o o o o o o Fast and easy deployment across large heterogenic networks. Multi-Tenant - Centerity Enterprise edition enable multi-tenant management. Ideal for MSP's and organizations with multiple entities and several stand-alone networks. All-In-One Unified and Comprehensive monitoring platform - a single Glass Pane for all essential network information. Widest range of "out of the box" monitoring service packs: Operating Systems - Windows, Linux, Solaris, HP-UX, AIX, AS400, FreeBSD, VMS and more. Virtualization VMware, Hyperv, Citrix, Solaris-Zone, VDI's and more. Network & Security Devices Routers, Switches, Load Balancers, Acceleration tools, Radio devices, Firewalls, VOIP systems and more. Applications - Microsoft, IIS, ISA, Share Point, Bea web Logic, SAP, People-Soft and more. Databases - Oracle, MS SQL, MySQL, DB2, Sybase, Cache and more. Storage NetApp, EMC, HP, IBM, Hitachi, Dell and more. Passive Equipment Monitoring - UPS, Cameras, Storage, Air-conditions, Automatic doors / gates, IP phones etc. Cloud monitoring - private and public. SAAS monitoring SLA compliance, performance and availability monitoring. Desktops and peripherals PC's, VDI's, Printers and more. Advanced Business Services Management (BSM) - In addition to the infrastructure monitoring features, Centerity Monitor provides the most advanced tools to measure and analyze business services SLA and user experience, monitoring. Most Advanced Features And Module all included! Assets management Real-Time Layouts (unique feature for Centerity!) Real-time Hyper-Maps VMware Topology maps User-Experience monitoring Ticketing management including escalations Repots Center Flexibility - In addition of hundreds of predefined best-practice monitoring templates and service packs for most Data-Center technologies, Centerity Monitor Standard Edition provides an easy way to customize proprietary monitoring plug-ins within very short time and vendor independency. 9

10 Chapter 1: Overview 10 START USING CENTERITY MONITOR LOG-IN TO CENTERITY MONITOR Open Web- Browser Insert server IP address Type user-name & Password use Monitor / Admin tabs The Centerity Monitor installation ISO configures the Linux OS to fully operational status. Use the server IP address to access the system from a web-browser. AUTHENTICATION AND PERMISSIONS Centerity Monitor installation includes 2 default users: Administration Web Login Web administrator: admin Web administrator Password: admin Standard User Web Login Standard login user: user Standard login password: user Note: Do not delete these users before you set a new users and assign them to the monitored hosts and services. 10

11 Chapter 2: Hosts & Services Administration 11 Chapter 2: Hosts & Services Administration OVERVIEW Centerity Monitor provides multiple methods to add new hosts and services from the web interface Admin Menu. Advanced users can use the command line, however, it is recommended to use the admin-gui only. This chapter will describe the web administration options and how to add or modify settings of hosts, Hosts groups, and services. In order to define new monitoring, a certain hierarchy needs to be implemented. The diagram below explains the Host group Host Service internal topology from the monitor server point of view. Monitor Topology Host Group HostA HostB HostC HostD Service Service Service Service Service Service *Service must be associates to a Host and host must be associates to Host group. Host group - A host group contains one or more hosts under one group. Host - Monitored element in the network. Host can be physical or virtual server, workstation, router, etc. Service - A service definition is used to identify monitored metric or KPI associated to a host. Each host can have multiple associated services. For best practice - Use the Centerity host templates and service templates (See Chapter 5 Plugins, Templates and Service Profiles ). For virtual devices such as clusters, databases etc.it is required to define a virtual host and assign the desired services to it.new Host Wizard Centerity provides the Host wizard to add a new host with predefined best practice services template: 11

12 Chapter 2: Hosts & Services Administration Go to Admin menu Host 2. Select the Wizard option from the top right corner of the page 3. Fill out the wizard form ( detailed instructions provided below) 4. Save the new host. 5. Test the host and services. Admin menu Host Wizard Save After every new configuration in the admin section, it is mandatory to run the install policy process in order to activate the new configuration in the monitoring server. Please refer to Chapter8 Policy Manager which explains the steps of policy installation. 1. Hostname - this is used to define a short name used to identify the host. It is used in Host Group and service definitions to reference this particular host. Hosts can have multiple services (which are monitored) associated with them. 2. Description - this is used to define a longer name or description used to identify the host. It is provided in order to allow you to more easily identify a particular host. 3. IP Address - IP Address of the host. It is advised not to use DNS names. In case of DNS problems you will not be able to do proper monitoring 4. Click on the globe icon in order to DNS resolve the host. Be sure to re-enter the IP address before saving. 5. Host Group - this is used to define which host group the host belongs to. For example, if you have a cluster of web servers you will able to report on and see availability of this group. 6. Host Category - this sets how the devices are displayed in the business service views and which information is available to the Inventory Collector. 7. Host Template - This sets predefined host template that includes pre-defined advanced settings for this host (i.e. check command, event handler etc.) 8. Parents -this is used to define a list of short names of the "parent" hosts for this particular host. Parent hosts are typically routers, switches, firewalls, etc. that lie between the monitoring host and remote hosts. A router, switch, etc. which is closest to the remote host is considered to be that host's "parent". 12

13 Chapter 2: Hosts & Services Administration Host Profile - Determine which Services will be applied from the predefined templates available in the Host Profile menu Note: Hold Shift key to select more than one host in the parents setting or one or more host group. 13

14 Chapter 2: Hosts & Services Administration 14 HOST SETTING The system allows verity of advanced settings such as Event handlers, Flap Detection, control notifications etc. and allows specific settings for each host. Note: After adding new a host using the wizard interface you are still able to edit and set advanced features from the screen below In the host properties there are 7 tabs for advanced settings and configurations: 1. General Tab - Define the basic host settings and modification. All fields are required 2. Advanced Tab Extended settings options with advanced capabilities. Read the section below for detailed information regarding available options for the host. 3. Service tab You can see all the services associated with this host and assign new services in this tab. 4. Dependencies tab You can see all host dependencies and assign new dependencies in this tab. 5. Inventory Tab Setting of Hardware, Software and administrative information. (Most information can be collected automatically with the inventory discovery tool). 6. Details tab limited host inventory allows you to set important notes for this host such as: host ID, hardware type, author, and phones. 7. Extended Host info Tab allows you to define host image coordinates in 2D real time map and provide alternate text for the host image Note: You will be prompted to supply missing information. 14

15 Chapter 2: Hosts & Services Administration 15 GENERAL HOST SETTINGS General host settings are used to define the host properties in the system: Host name Description IP Address Enable / Disable Host Template Host Category Host Group Parrent SAVE Install Policy 1. Host name: Define a short name to the host. This name should be exclusive to the host. 2. Description: Define detailed description of the host in order to allow clear identification of any host. 3. IP Address: Define the IP address of the host. FQDN can be used as well to identify the host instead of an IP address (require available DNS services!) 4. Enable/Disable Host: Enabling or disabling the host. Any change in disabled host configuration will not be exported to the system during policy installation. 5. Host Template: Pre-defined set of services to be associate with the host (i.e. check command, event handler etc ) 6. Host Category: Define how the devices should be displayed in the business service views and which information is available to the Inventory Collector. 7. Host Group: Define the host group of the host. 15

16 Chapter 2: Hosts & Services Administration Parents / Child: Define the parent-child relationship between two hosts. Every host can be a parent or child of other host. (Host can be a parent only if the enabled as parent is checked) Note: Parent-child definition is mandatory to generate automatic topology map and root-cause analysis (outages dashboard) 9. Save as Host Profile - Before saving this template you can create a Host Profile from the specified settings and then associate the template with new or existing hosts. At the bottom left of the Host settings page across from the Save button, you will see Save as Host Profile. Mark the checkbox and click Save. This will create a new Template with the name of the Host. 10. Delete Deletes the host. MONITORING HOSTS WITH DYNAMIC IP ADDRESS The following instructions explain how to monitor a host with a dynamic IP address (like DHCP). Set DNS server Add new host Verify & install policy Step 1 Setting DNS server In order to monitor hosts with dynamic IP, the system uses hostname from the DNS server rather than fixed IP address. Connect to the Centerity server via SSH using your favorite SSH client like putty Edit the /etc/resolve.conf file so it will include your domain search suffix and your DNS servers, for example: Step 2 - Define the new host in the web GUI Log-in to the Centerity monitor console. Define the host to monitor in the system. Insert host name in the IP address (see example below) Step 3 - Run the policy manger 16

17 Chapter 2: Hosts & Services Administration 17 COMMAND PROPERTIES Host Commands Properties In order to activate the check command option, check the box in the advanced tab as shown in the example below. 1. Host Check Command: This feature allows to check host availability over single check rather than one of the multiple services associated to the host. Enabling this option will perform single alert in case of host down status. 2. Test Command - This command will process a ping check to the host in order to verify connectivity (up / down). The command must return a status of OK (0) other ways, Centerity Monitor will assume that the host is down. If the argument stays blank, the host will not be checked and Centerity Monitor will constantly assume the host is up. 17

18 Chapter 2: Hosts & Services Administration Max checks attempts - The number of samples (checks) before changing from OK state. Setting this value to 1 will cause Centerity Monitor to generate an alert without retrying the host to be checked again. Notifications Settings Note: The minimum value for this option is "1". 1. Notifications enable / Disable - This is used to determine whether or not notifications for this host are enabled. 2. Notification period - Specify the Time frame which notifications for this host will be sent to authorized contacts. 3. Notification interval - Specify the time intervals before re-notifying authorized contacts about the last status. Setting this value to 0 will disable the re-notification. 4. Notifications options Specify the statuses to be notified - Unreachable, Down, and Recovered Other Settings 1. Event handler enabled- enable / disable event handler command. 2. Event handler command -Specify the Event Handler command that should be execute whenever a change in the state of the host is detected. 3. Flap detection enabled - Determines whether or not flap detection is enabled for this host. More information on flap detection can be found in the Flap Detection Section. 18

19 Chapter 2: Hosts & Services Administration Flap threshold - Specifies the low state and high change threshold used in flap detection for this host. More information on flap detection can be found in Flap detection Section. 5. Retain status information - Determines whether or not status-related information about the host is retained across program restarts 6. Retain non-status information - Determines whether or not non-status information about the host is retained across program restarts. 7. Performance Data - Determines whether or not the processing of performance data is enabled for this host. Note: Disabling performance data will disable graphs creation and history archive. 8. Stalking - Determines whether or not the stalking for this host is enabled. 9. Stalking options - Determines which host states "stalking" is enabled for. Valid options are a combination of one or more of the following: o = stalk on UP states, d = stalk on DOWN states and u = stalk on UNREACHABLE states. 19

20 Chapter 2: Hosts & Services Administration 20 ASSOCIATED SERVICES Associated Services provides a quick way to attach a new service or multiple services to an existing host. Adding a new service Select Service Profile select service / services press "Add" Run Install Policy 1. In the Service tab select the required service profile. 2. Select the service or multiple services (Ctrl + mouse click). 3. Press the add button. 4. Run install policy. Deleting a service Select the service checkbox and click "delete". 20

21 Chapter 2: Hosts & Services Administration 21 Resetting a service Reset history graph and data allows you to remove the service history. This can be useful if there are errors with the graphs. Select the service checkbox and click "Reset". Service Properties 1. Name -The selected service name. Renaming service profile s original name will change the display. 2. Description -Service description. 3. Service Category Define the category of this service. 4. Enable / Disable service Enable status will export this service with the host configuration; Disable status will not export the service current configuration with the host definitions. You can click on the Enabled / Disabled text to switch between states. 5. Service template this is the original Service name used by this service. 6. Contact Group The contact groups assigned to the service. 21

22 Chapter 2: Hosts & Services Administration 22 AUTO ADD SERVICES Centerity V3.X allows advanced discovery and automatic attachment of optional services such as hardware metrics, services, system KPIs and processes to the monitored host. Admin Menu - Host Services Tab Press "+" icon Select KPIs / Metrics Press "Add" & Save Install Policy Press the + icon to open the list of optional metrics and check the box of the required services. Click the "Add" button to complete the attachment process. The following pop-up screen will be opened: All automatic services include best-practice thresholds. In order to modify the thresholds use the service properties under the host screen 22

23 Chapter 2: Hosts & Services Administration 23 HOST DEPENDENCIES Please refer to page 108. ASSET MANAGEMENT & HOST INVENTORY OVERVIEW The asset management module provides complete view of the host inventory including system information, hardware configuration, services, processes etc. This functionality is optional and do not impact the monitoring process for this host. The information can be defined manually, but be aware that it will be erased each time that an inventory scan occurs. 1. General Information tab - General information about the Host / Device such as Operating System, Service Packs, Patches, Owner, Organization, Configuration and more. An image can be selected for this host that will be displayed when viewing the host inventory in the Monitor Console. (See Importing Images and Sounds). 2. System Information tab - Display system information such as product ID (S/N), installation directory, boot device, time zone, Language, uptime etc.. 3. Hardware Information tab -Displays hardware information such as manufacturer, model, system type etc. 3.1 Processor information - CPU information of the remote host, such as: MHz, Stepping, Model, and CPU manufacturer. 3.2 Memory information - Real Memory and Virtual Memory / Swap on Host in Megabytes available. 3.3 Bios information - Hardware information of the Computer BIOS; includes manufacturer, version, description and serial. 23

24 Chapter 2: Hosts & Services Administration Disk Information - Logical disk information for floppy and Zip drives, hard disks, and CD / DVD devices. Disk size and free space information provided in bytes. 3.5 Network Information - Network device information such as: IP address, MAC Address, subnets, gateway, and computer name. 4. Service information - Provides Service State information such as: current state, service name, and Service Display Name. This information can be used when monitoring services with the Centerity Agent. 5. Processes Information - Provides Process Name and Process ID to facilitate the automation of tasks in regards to specific processes. HOST DETAILS Host Details tab allows adding customized administrative information. This information is optional and has no effect on the monitoring process. Admin Menue Host Details Tab Host Details 1. OS: Host operating system. 2. Service Pack: Host most recent service pack. 3. Software: Software that is installed on the host. 4. Software license: You can store product license here. 24

25 Chapter 2: Hosts & Services Administration Additional IP Addresses: If the host has another constant ip. 6. Default Gateway: Host's default gateway. Hardware 7. Model/Brand: The server's brand. 8. Manufacturer: Server manufacturer. 9. Processor: Amount and processor info. 10. Memory: Memory amount on server. 11. MAC Address: Network card's physical address. 12. Host ID: This is used for the UNIX / Linux specific Host ID. 13. Serial - Device serial number 14. Warranty - Warranty of the equipment Additional Info 15. Supplier name: details about supplier 16. Supplier Contact Details: details about your supplier. 17. Authority Person: The person in charge of this device and his details 18. Computer Location: Location of the devices such as: Computer room, cabinet number, etc. 19. Mandatory Services: This is for administrative information only. It specifies the mandatory services used by this host. 20. Optional Services: This is for administrative information only. It specifies the optional services used by this host. 21. Notes: Custom notes. SNMP Information 22. Community: Host SNMP community 23. Version: available SNMP versions: 1, 2c Port: Device SNMP Port 25. Username: specify username for security feature in SNMP V3 26. Password: specify password for security feature in SNMP V3 Note: Host details can be used with Centerity Send and important data can be attached to the message 25

26 Chapter 2: Hosts & Services Administration 26 EXTENDED HOST INFORMATION 1. Image -This variable is used to define the name of a GIF, or PNG images that may be associated with this host. 2. Disable image in map - this option allows you to remove undesired hosts from your network map 3. Image Alternate text -This variable is used to define an optional string that is used in the ALT tag of the image specified by the <icon image> argument. 4. External URL Define an external URL to access related websites or local libraries directly from the host properties screen. The URL will be opened in new windows or in the Centerity frame. Note: Host Detail Link should be checked to enable host inventory. 26

27 Chapter 2: Hosts & Services Administration 27 PROXY SERVER Centerity Monitor Proxy Server provides a simple and powerful way to monitor Operating System resources that are not accessible directly from the Centerity server. The proxy Server is a regular Centerity windows agent which acts as a single gateway between the Centerity server and monitored components. This Proxy Agent needs to be installed on a dedicated Windows workstation or Windows Server platform. Centerity Proxy Server configuration is done by using the Agent Discovery" option under Admin Section. Once the scanning process is done, select the option Enable as Parent in the General host settings. This option will define this host as a proxy server during Proxy Agent Discovery process. Network Settings - In order to start using the Proxy Server, port 5666 TCP must be enabled between the Proxy Server and Centerity Server. For monitoring a remote server which is agent based, this port should be also enabled between the Proxy Server and the remote server. On other scenarios, make sure that the relevant port for the check is open and accessible (Ex. port 161 for SNMP monitoring). Proxy Service Settings - Proxy services settings are the same as the regular Centerity services, with only one parameter added. The first argument in each service needs to be changed to the designated Proxy Server IP address or name. It is recommended to make this change in the service 27

28 Chapter 2: Hosts & Services Administration 28 template for all related hosts rather than define a manual change on each host that the proxy service belongs to. Proxy Monitoring Service Packs - In addition to the default proxy monitoring service packs that comes with Centerity installation, there are many related packs available on Centerity support site under the category Downloads Centerity Service Pack. Search for the key word "proxy" to get all the relevant packs. DISCOVERY ENGINES 28

29 Chapter 2: Hosts & Services Administration 29 HOST DISCOVERY Centerity Monitor provides advanced automatic discovery engines for hosts in the network: 1. Agent Discovery - after deploying Centerity Agents across your network, Centerity Monitor can detect them and allow you to assign profiles from the list of host profiles. 2. WMI Discovery Centerity engine can detect any server that is open for WMI. 3. Network Discovery- Network discovery provides a fast way to identify which hosts are available across the network 4. SNMP Discovery -Centerity Monitor can scan SNMP enabled devices with predefined SNMP Templates and allow you to assign profiles from the list of SNMP profiles. 5. VMware Discovery a quick way to scan the "VMware Data Center" or "VMware ESX" and insert all virtual machines to monitor. 6. Proxy Agent Discovery - does the same action as "Agent Discovery" via proxy server. 7. Proxy VMware Discovery does the same action as "VMware Discovery" via proxy server. 8. Proxy Network Discovery does the same action as "Network Discovery" via proxy server. 9. Proxy SNMP Discovery - does the same action as "SNMP Discovery" via proxy server. 10. Proxy WMI discovery Centerity engine can detect any server that is open for WMI over proxy agent. 29

30 Chapter 2: Hosts & Services Administration 30 INVENTORY DISCOVERY 1. Agent Inventory Discovery- Centerity Monitor can collect Hardware and Software information from Centerity Agents. 2. VMware Inventory Discovery - Centerity Monitor s built in asset management allows you to collect host hardware and service information from VMware. 3. Proxy VMware Inventory Discovery - Centerity Monitor s built in asset management allows you to collect host hardware and service information from VMware via Proxy. 4. Proxy Agent Inventory Discovery - Centerity Monitor can collect Hardware and Software information from Centerity Agents via Proxy server. 5. Proxy WMI - Centerity Monitor can collect Hardware and Software information from WMI enabled servers via Proxy. 6. WMI Inventory - Centerity Monitor can collect Hardware and Software information from WMI enabled servers. 30

31 Chapter 2: Hosts & Services Administration 31 AGENT DISCOVERY Centerity Monitor Agent Discovery provides powerful way to discover and monitor wide range of resources and metrics that are not visible or accessible over Agentless methods. Centerity Agents also provide a secured way to collect performance data from Operating systems using SSL and IP based access list. Compared to other protocols such as WMI, Telnet, SSH, or SNMP, Centerity Agents consume much less bandwidth (about 1-2 kb per query). 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / URL Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 3. Port - Centerity agent communicate with Centerity server over port 5666 as default. For nonstandard port it is mandatory to update this field. 4. Password Password for a password protected agents. 5. Scan Type - Centerity Monitor Agent for Windows, Linux, and Solaris includes SSL support for highest security. Other Operating Systems such as HPUX, AIX, VMS, and AS400 do not offer these 31

32 Chapter 2: Hosts & Services Administration 32 capabilities due to Operating System limitations. Choose one of the following options to detect your Admin Menu Discovery - Agent discovery Scan Type Insert IP address / range of IPs Speicfy ports Scan network View results agents: 5.1. SSL Agents Scan for SSL-enabled agents 5.2. NO SSL Agents Scan for older agents without SSL Support 5.3. SSL & NO SSL Agents Scan for agents using both SSL and NO SSL. Note: SSL & NO SSL discovery process requires more time 6. Timeout The default time-out is 10 seconds. The timeout period can be set up to 300 seconds. 7. Skip existing hosts Will skip any host that already exists in the system. 8. Debug Log Writes a debug log to the database. AGENT SCAN RESULT After selecting View Network Scan Result and clicking Execute, all the hosts with Centerity Agent that were detected will be listed. The information will be displayed in 6 columns: Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. 32

33 Chapter 2: Hosts & Services Administration 33 IP Address Displays the IP address of the remote Agent Mode SSL / No SSL modes are available. Depends on your agent installation OS Centerity Monitor agents and above display inventory information about the Operating System and builds. Version Agent version installed on the remote Host Profile Host profile to apply to the host. Note: It is mandatory to apply profile to each host PROXY AGENT DISCOVERY This option will perform the same process as described in the previous chapter (AGENT DISCOVERY) through a proxy agent. Admin Menu Discovery - Agent discovery Scan Type Insert IP address / range of IPs Select Proxy Server Speicfy ports Scan network View results 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible. 33

34 Chapter 2: Hosts & Services Administration Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / URL - Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 3. Proxy Server This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 4. DNS Server - This field is used to determine which DNS Server to use. 5. Port - Centerity Monitor agent using port 5666 for standard operations. If you install the agent on anon-standard port you need to configure the Agent Discovery to search this port. 6. Scan Type - Centerity Monitor Agent for Windows, Linux, and Solaris includes SSL support for maximum security. Other Operating Systems such as HPUX, AIX, VMS, and AS400 do not offer these capabilities due to Operating System limitations. Choose one of the following options to detect your agents: 6.1. SSL Agents Scan for SSL-enabled agents 6.2. NO SSL Agents Scan for older agents without SSL Support 6.3. SSL & NO SSL Agents Scan for agents using both SSL and NO SSL. 7. Skip existing hosts Will skip any host that already exists in the system. Note: This last option takes more time to detect agents, since the Scanner scans each device twice. 8. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 9. Skip existing hosts Will skip any host that already exists in the system. 10. Debug Log Writes a debug log to the database. PROXY AGENT SCAN RESULT After selecting View Network Scan Result and clicking Execute, all hosts with Agents that were detected will be listed. 34

35 Chapter 2: Hosts & Services Administration 35 The information will be displayed in 6 columns: Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address Displays the IP address of the remote Agent Mode SSL / No SSL modes are available. Depends on your agent installation OS Centerity Monitor agents and above display inventory information about the Operating System and builds. Version Agent version installed on the remote Host Profile Host profile to apply to the host. Note: It is mandatory to apply template to each host 35

36 Chapter 2: Hosts & Services Administration 36 SNMP DISCOVERY Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from network devices such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. Centerity Monitor provides SNMP plug-ins that works with all thirdparty SNMP management interfaces to monitor the status of managed devices and applications. Admin Menu Discovery - SNMP discovery Scan Type Insert IP address / range of IPs Insert community name Speicfy ports and SNMP version Scan network View results 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 36

37 Chapter 2: Hosts & Services Administration IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 3. Community - SNMP Community of the remote device; either read only or read/write can be used. 4. Port - Specify SNMP port for the device (if other than port 161) 5. SNMP Version - Centerity Monitor supports all SNMP protocols: 5.1. V. 1 using standard community V. 2c using standard community V. 3 Using advanced SNMP security features. 6. Username / Password - If SNMP version 3 is used, specify the Username and Password set on the remote device for accessing information. 7. Timeout -Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 8. Ping Scan - This option is useful when you have multiple SNMP communities and you want only to detect what SNMP enabled devices are available. Do not use Ping Scan if you will be continuing further to a sub scan. 9. Rescan Devices - When changes occur on your SNMP enabled devices you will need to rescan them. This feature allows you to rescan current device and replace / append current information to the existing device. Append new information: Collect more information about interfaces, new memory, etc. Replace new information: Replace existing information with the newly detected information, for example if an existing interface changed names it'll change it, as opposed to the "Append new information" section. Note: this feature only works if the service name is in the exact format name of the SNMP profile template, and has not been edited. SNMP SCAN RESULT Centerity SNMP discovery engine requires 3 Steps: 1. Define the IP address (or IP range) and the SNMP community. 2. View which hosts were found by the SNMP discovery tool and choose for each host a specific SNMP scan profile template 37

38 Chapter 2: Hosts & Services Administration 38 For multiple hosts / devices with the same Profile mark the checkbox near the Global SNMP Profile and select the appropriate profile. 3. Click the Scan button for intensive scan on the remote device to find all the sub components and information available. Note: selecting Save without assigning any SNMP profile will create a host with no services. The install policy process will alert about such events. Once the intensive scan has finished, select View Scan Results again to view the discovery results. If the correct template was assigned, there will be a list of all available information. Host Name - a fully qualified domain name resolved by the DNS. If no DNS name is found, the IP address will be displayed. IP Address Displays the IP address of the remote Agent Service - Number of Services that will be monitored. Information displays the banner information from the scan result. Profile displays the SNMP Profile that was chosen for this scan. Click on the to open a list of all the Service profiles that were defined in the SNMP Scan template Service the service name assigned for the profile entry Description description specified in the profile entry Identifier identifier is usually the OID specified in the entry Found the number of items defined as Service. If you de-select the checkbox on the right it will remove all entries under this Service. SNMP Discovery Search: Allows search within the results by Name, description, status etc. 38

39 Chapter 2: Hosts & Services Administration 39 When you expand the service entry you will see the entire list of Services relating to the service as described below: ID Index number Attributes the number of available checks on this port. ifinerrors Current errors on this port. ifinoctates Current number of octets on this port. ifoperstatus Current status on this port. ifoutdiscards Current outgoing discards on this port. Note: if nothing is found in the intensive scan and you are certain that the proper host profile has been chosen, please refer to our online forums in order to find a proper solution, or contact Centerity Support team for additional help. 39

40 Chapter 2: Hosts & Services Administration 40 PROXY SNMP DISCOVERY This option will perform the same process as described in the previous chapter (SNMP DISCOVERY) through a proxy agent. Admin Menu Discovery - Proxy SNMP discovery Scan Type Insert IP address / range of IPs Insert community name Speicfy ports and SNMP version Scan network View results 10. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 40

41 Chapter 2: Hosts & Services Administration IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 12. Community - SNMP Community of the remote device; either read only or read/write can be used. 13. Port - Specify SNMP port for the device (if other than port 161) 14. SNMP Version - Centerity Monitor supports all SNMP protocols: V. 1 using standard community V. 2c using standard community V. 3 Using advanced SNMP security features. 15. Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 16. Username / Password - If SNMP version 3 is used, specify the Username and Password set on the remote device for accessing information. 17. Timeout -Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 18. Ping Scan - This option is useful when you have multiple SNMP communities and you want only to detect what SNMP enabled devices are available. Do not use Ping Scan if you will be continuing further to a sub scan. 19. Rescan Devices - When changes occur on your SNMP enabled devices you will need to rescan them. This feature allows you to rescan current device and replace / append current information to the existing device. Append new information: Collect more information about interfaces, new memory, etc. Replace new information: Replace existing information with the newly detected information, for example if an existing interface changed names it'll change it, as opposed to the "Append new information" section. Note: this feature only works if the service name is in the exact format name of the SNMP profile template, and has not been edited. PROXY SNMP SCAN RESULT Centerity SNMP discovery engine requires 3 Steps: 4. Define the IP address (or IP range) and the SNMP community. 5. View which hosts were found by the SNMP discovery tool and choose for each host a specific SNMP scan profile template 41

42 Chapter 2: Hosts & Services Administration 42 For multiple hosts / devices with the same Profile mark the checkbox near the Global SNMP Profile and select the appropriate profile. 6. Click the Scan button for intensive scan on the remote device to find all the sub components and information available. Note: selecting Save without assigning any SNMP profile will create a host with no services. The install policy process will alert about such events. Once the intensive scan has finished, select View Scan Results again to view the discovery results. If the correct template was assigned, there will be a list of all available information. Host Name - a fully qualified domain name resolved by the DNS. If no DNS name is found, the IP address will be displayed. IP Address Displays the IP address of the remote Agent Service - Number of Services that will be monitored. Information displays the banner information from the scan result. Profile displays the SNMP Profile that was chosen for this scan. Click on the to open a list of all the Service profiles that were defined in the SNMP Scan template Service the service name assigned for the profile entry Description description specified in the profile entry Identifier identifier is usually the OID specified in the entry Found the number of items defined as Service. If you de-select the checkbox on the right it will remove all entries under this Service. SNMP Discovery Search: Allows search within the results by Name, description, status etc. 42

43 Chapter 2: Hosts & Services Administration 43 When you expand the service entry you will see the entire list of Services relating to the service as described below: ID Index number Attributes the number of available checks on this port. ifinerrors Current errors on this port. ifinoctates Current number of octets on this port. ifoperstatus Current status on this port. ifoutdiscards Current outgoing discards on this port. Note: in case of no results after the intensive scan, please refer to the support online forums in order to find a proper solution, or contact Centerity Support team for further help. 43

44 Chapter 2: Hosts & Services Administration 44 VMWARE DISCOVERY Centerity Monitor provides powerful discovery engine for Virtual Centers, ESXs and virtual machines. The VMware discovery process includes automatic dynamic topology map of the VMware and apply monitored metrics with multiple scan options. Admin Menu Discovery - VMware Scan Type VC/ESX User / password Host Group Port Scan network View results 1. Select Scan Type - Scan type allows you to choose between the entire V-Center scan and a single ESX Server scan Virtual Center - will scan the virtual center with all ESXes and virtual machines under it Virtual Center name Type in the V-Center name or IP address VC username - insert the V-Center administrator username VC password insert the V-Center administrator password ESX username insert the ESX administrator username ESX password insert the ESX administrator password Host-group Define the host-group that the hosts will be attached to Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist Dc or ESX This option identify changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan in order to add them to the monitoring process) Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 44

45 Chapter 2: Hosts & Services Administration ESX - will scan the ESX and all virtual machines under it ESX name - This field is used for discovering a specific Esx to scan. This field can be filled with the ESX name or IP address ESX username insert the ESX administrator username ESX password insert the ESX administrator password Host-group Define the host-group that the hosts will be attached to Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist Dc or ESX This option identify changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan in order to add them to the monitoring process) Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 45

46 Chapter 2: Hosts & Services Administration 46 VMWARE SCAN RESULTS To view the scan results select "View VMware Scan Results" and click on the "Execute" button. Add hosts to monitoring server: View VMware Scan Results Execute Select Hosts Define Profiles and choose other options Select the host that you want to add to monitor server and specify the profile. Press the save button. Save Run Policy Global host profile Select Global host profile to apply the same profile to all selected hosts. Create map this option will generate topology map automatically 46

47 Chapter 2: Hosts & Services Administration 47 PROXY VMWARE DISCOVERY Centerity Monitor provides powerful discovery engine for Virtual Centers, ESXs and virtual machines. The VMware discovery process includes automatic dynamic topology map of the VMware and apply monitored metrics with multiple scan options. Admin Menu Discovery - VMware Proxy Scan Type VC/ESX User / password Host Group Port Scan network View results 2. Select Scan Type - Scan type allows you to choose between the entire V-Center scan and a single ESX Server scan Virtual Center - will scan the virtual center with all ESXes and virtual machines under it Virtual Center name Type in the V-Center name or IP address VC username - insert the V-Center administrator username VC password insert the V-Center administrator password ESX username insert the ESX administrator username ESX password insert the ESX administrator password Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings Host-group Define the host-group that the hosts will be attached to Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist Dc or ESX This option identify changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan in order to add them to the monitoring process) 47

48 Chapter 2: Hosts & Services Administration Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states) ESX - will scan the ESX and all virtual machines under it ESX name - This field is used for discovering a specific Esx to scan. This field can be filled with the ESX name or IP address ESX username insert the ESX administrator username ESX password insert the ESX administrator password Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings Host-group Define the host-group that the hosts will be attached to Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist Dc or ESX This option identify changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan in order to add them to the monitoring process) Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 48

49 Chapter 2: Hosts & Services Administration 49 PROXY VMWARE SCAN RESULTS To view the scan results select "View VMware Scan Results" and click on the "Execute" button. Add hosts to monitoring server: View VMware Scan Results Execute Select Hosts Define Profiles and choose other options Select the host that you want to add to monitor server and specify the profile. Press the save button. Save Run Policy Global host profile Select Global host profile to apply the same profile to all selected hosts. Create map this option will generate topology map automatically 49

50 Chapter 2: Hosts & Services Administration 50 NETWORK DISCOVERY A Network discovery provides a fast way to identify which hosts are available across the network (either internal or external) and detect which ports are opened and respond. The map file for the port names is located in the /etc/services directory on the Centerity appliance. When saving the detected hosts and opened ports, Centerity Monitor will assign TCP / UDP service checks to the corresponding ports and try to monitor availability and response time. Admin Menu Discovery - Network discovery Scan Type Insert IP address / range of IP Port Range press "scan network" view results Save & Install policy 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1 IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible. 1.3 Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / addresses range / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 3. Port Ranges - By default, Centerity Monitor will try to scan the specified host from Port 1 to If you specify All Ports, Centerity Monitor will try to scan the Host from port 1 to 65535, which takes longer. 50

51 Chapter 2: Hosts & Services Administration Protocol Type - Select which protocols to detect. By default, Centerity Monitor tries to detect TCP and UDP Services. 5. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 6. Force Scan - Hosts with ICMP or PING blocked are not available for the standard network scan and will be not detected. If you still want to detect these hosts and devices, choose this option. Centerity Monitor will not try to ping the host, but will immediately start port detection for each IP / Range specified the IP address field. NETWORK SCAN RESULT When selecting View Network Scan Results Centerity Monitor will display available ports and their Name Mapping. For example, if port 21 was opened on the remote Host, Centerity Monitor will show: Service: ftp Port: 21 Protocol: tcpstate: open. 1. Service this is the mapped service name from /etc/services 2. Port Port number detected by Centerity Monitor 3. Protocol Either TCP (Transmission Control Protocol over Internet Protocol) or UDP (User Datagram Protocol) 4. State - Service state is Open, Filtered or Closed. Open means that an application on the target machine is listening for connections/packets on that port. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Centerity Monitor cannot tell whether it is open or closed. Closed ports have no application listening on them Note: Use the Checkbox in the upper right corner to add / remove all hosts and services When clicking on Save, all selected hosts will be saved and the scan results will be cleared 51

52 Chapter 2: Hosts & Services Administration 52 PROXY NETWORK DISCOVERY This option will perform the same process as Network Discovery. In this option, the discovery process will be activated through a proxy agent. 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / addresses range / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 3. Proxy Server This field is used to define the Proxy server. 4. DNS Server - determine the DNS Server. 5. Port Ranges - By default, Centerity Monitor will try to scan the specified host from Port 1 to If you specify All Ports, Centerity Monitor will try to scan the Host from port 1 to 65535, which takes longer. 6. Scan Type - Scan type allows you to choose which protocols to detect. By default, Centerity Monitor tries to detect TCP and UDP Services. You can reduce scan time by selecting one or the other, depending on your situation. 7. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 52

53 Chapter 2: Hosts & Services Administration 53 FORCE SCAN - HOSTS WITH ICMP OR PING BLOCKED ARE NOT AVAILABLE FOR THE STANDARD NETWORK SCAN AND WILL BE NOT DETECTED. IF YOU STILL WANT TO DETECT THESE HOSTS AND DEVICES, CHOOSE THIS OPTION. CENTERITY MONITOR WILL NOT TRY TO PING THE HOST, BUT WILL IMMEDIATELY START PORT DETECTION FOR EACH IP / RANGE SPECIFIED THE IP ADDRESS FIELD. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 53

54 Chapter 2: Hosts & Services Administration 54 WMI DISCOVERY Centerity Monitor Agent provides a simple and powerful way to monitor Operating System resources that are not available through Agentless methods. WMI is a set of extensions to the Windows Driver Model that provide information and notifications. Admin Menu WMI Discovery Scan Type IP Address URL Admin User Password Domain Name Scan Network 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to section above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/ IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly Admin user, password and domain name Fill out this information to get WMI access to the server. 54

55 Chapter 2: Hosts & Services Administration Skip existing hosts Will skip hosts who are already listed in Hosts. WMI SCAN RESULT Select View Network Scan Result and clicking Execute, all Centerity Agents that were detected will be listed. View Network Scan Result Execute The information will be displayed in 6 columns: 1. Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. 2. IP Address Displays the IP address of the remote Agent 3. OS Centerity Monitor agents and above display inventory information about the Operating System and builds. 4. OS Bit 32bit/64bit System 5. Service Pack Displayed which service pack is installed. 6. Profile Host profile to apply to the host. Note: If no template is chosen an empty Host entry will be created. PROXY WMI DISCOVERY 55

56 Chapter 2: Hosts & Services Administration 56 Proxy WMI discovery provides a simple way to find out which hosts are available across the network (either internal or external) and detect which ports are opened and respond. When saving the detected hosts and opened ports, Centerity Monitor will assign TCP / UDP service checks to the corresponding ports and try to monitor availability and response time. Note: This option also allows you to examine and detect security exploits that can be found on your network, such as disabled firewalls, unwanted services listening etc. Note: A Proxy server will be listed only when it is enabled as a parent in host settings. Admin Menu Proxy WMI Scan Type IP Address URL Proxy Server Admin User Password Domain Name 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/ IP Address (es) / URL - Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 2. Proxy Server This field is used to determine which Proxy server to use. 3. Admin user, password and domain name Fill out this information to get WMI access to the server. 56

57 Chapter 2: Hosts & Services Administration Skip existing hosts Will skip hosts who are already listed in Hosts. Admin Menu Execute PROXY WMI SCAN RESULT After selecting View Network Scan Result and clicking Execute, all Centerity Agents that were detected will be listed. The information will be displayed in 6 columns: Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address Displays the IP address of the remote Agent OS Centerity Monitor agents and above display inventory information about the Operating System and builds. OS Bit 32bit/64bit System Service Pack Displayed which service pack is installed. Profile Host profile to apply to the host. Note: If no template is chosen an empty Host entry will be created. AGENT INVENTORY DISCOVERY 57

58 Chapter 2: Hosts & Services Administration 58 Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Agent Inventory Scan Type IP Adress / Range Port Scan Type Password Timeouts Scan Network 1. Select Scan Type - Define the scan type of the inventory scanner 1.1. Select Hosts Select specific host or multiple hosts (by pressing the shift button while selecting) 1.2. All Hosts Collect inventory information for all hosts Note: if you do not run collector on regular basis and you wish to track only changes, choose specific hosts. 2. Scan Type 2.1. Agent Centerity Monitor agent discovery provides all the detailed information described in Chapter 2 Asset Management / Host Inventory 2.2. SNMP Collect Simple SNMP information. 3. Port Specify a different port if you install Centerity Monitor agents on different ports. 4. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 58

59 Chapter 2: Hosts & Services Administration Agent Inventory Discovery Scan Results - When discovery is finished you can see which Hosts and services were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host services. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. AGENT INVENTORY SCAN RESULT Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. Currently, there are 2 Asset management configuration methods available: 1. Agent Centerity Monitor Agents 1.4 and above support advanced asset management collectors and provide information about: General Computer information, Hardware information, and Software information. 2. SNMP Currently Centerity Monitor uses default SNMP agent and detects simple information available by SNMP such as: manufacturer, Location, and description. 59

60 Chapter 2: Hosts & Services Administration 60 AGENT PROXY INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information via Proxy server. This is currently done manually from the web admin GUI or using the command line. Admin Menu Inventory Tab Proxy Agent Inventory Scan Option Proxy Server Speicfy ports Timeouts Scan network View results 1. Select Scan Option - Define the scan option of the inventory scanner 1.1. Select Hosts Select specific host or multiple hosts (by pressing the shift button while selecting) All Hosts Collect inventory information for all hosts Select Host Group - Select specific Host Group or multiple Host Groups (by pressing the shift button while selecting) Note: if you do not run the collector on regular basis and you wish to track only changes, choose specific hosts. 2. Proxy Server This field is used to determine which Proxy server to use. 3. Port Centerity Monitor agent using port 5666 for standard operations. If you install the agent on anon-standard port you need to configure the Agent Discovery to search this port. 4. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 5. Debug Log Check to Enable Debug Log 60

61 Chapter 2: Hosts & Services Administration 61 AGENT PROXY INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Services were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Services. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. VMWARE INVENTORY DISCOVERY Centerity Monitor has an asset management tool that allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. 61

62 Chapter 2: Hosts & Services Administration 62 Admin Menu Discovery Inventory Select Datacenter ESX User / Password Port Scan network View results 1. Select Data Center Select main Data Center. 2. Select Hosts to scan Select internal Hosts to scan. 3. ESX username insert the ESX administrator username. 4. ESX password insert the ESX administrator password. 5. Port - Centerity Monitor VMware discovery uses port 443 for standard operations. If you use an anon-standard port you need to configure the VMware Discovery to search this port. VMWARE INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Services were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Services. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. PROXY VMWARE INVENTORY DISCOVERY 62

63 Chapter 2: Hosts & Services Administration 63 Centerity Monitor has an asset management tool that allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Select Datacenter ESX User / Password Port Scan network View results 6. Select Data Center Select main Data Center. 7. Select Hosts to scan Select internal Hosts to scan. 6. Proxy Server - This field is used to determine which Proxy server to use. 8. ESX username insert the ESX administrator username. 9. ESX password insert the ESX administrator password. 10. Port - Centerity Monitor VMware discovery uses port 443 for standard operations. If you use an anon-standard port you need to configure the VMware Discovery to search this port. VMWARE INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Services were found and save the desired hosts in Centerity Monitor configuration. 63

64 Chapter 2: Hosts & Services Administration 64 The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Services. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. 64

65 Chapter 2: Hosts & Services Administration 65 WMI INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory WMI Inventory Choose Hosts / Host Groups Admin User Password Domain Scan Network 1. Scan Options: Choose Host / Host Group. 2. Select Hosts: Select desired hosts / host groups to scan inventory on. 3. Admin User: Domain admin user. 4. Password: Domain admin user password. 5. Domain Name: The domain name. 6. Debug Log: If you wish to have a debug log on this. The debug log writes to Centerity database. WMI INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Services were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: 65

66 Chapter 2: Hosts & Services Administration 66 View Inventory Scan results view the scan results and save / skip Host Services. New Inventory Scan remove current scan result and start scanner from beginning. WMI PROXY INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory WMI Inventory Choose Hosts / Host Groups Select Proxy Server Admin User Password Domain Scan Network 1. Scan Options: Choose Host / Host Group. 2. Select Hosts: Select desired hosts / host groups to scan inventory on. 3. Proxy Server: Select proxy server (must be a parent host.) 4. Admin User: Domain admin user. 5. Password: Domain admin user password. 6. Domain Name: The domain name. 7. Debug Log: If you wish to have a debug log on this. The debug log writes to Centerity database. WMI PROXY INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Services were found and save the desired hosts in Centerity Monitor configuration. 66

67 Chapter 2: Hosts & Services Administration 67 The following options are available after Centerity Monitor has finished the scan: View Inventory Scan results view the scan results and save / skip Host Services. New Inventory Scan remove current scan result and start scanner from beginning. DUPLICATE A HOST Centerity Monitor provides an easy way to create a new host from an existing host using the Duplicate Host action. This will create an exact copy of a specific host and change only the unique identifiers, such as: Host name, Description and IP Address. The steps for duplicating host in the admin menu are: 1. Go to the Hosts interface and check the checkbox of the host you want to duplicate 2. Select Duplicate from the drop down menu on the right bottom and click Submit 3. Enter the new Host Name, Description, and IP Address 4. Click Save Admin Menu Host Duplicate Submit Save Note: In case of host name duplication, Remove or disable one of the hosts before running Policy Manager. 67

68 Chapter 2: Hosts & Services Administration 68 ADDING AHOST PROFILE TO AN EXISTING HOST Centerity Monitor allows adding an additional Host profile to an existing host. For example, creating a standard host, using the Windows Server profile and applying the Microsoft Exchange Monitoring profile: 1. Go to the Hosts interface and check the checkbox on the right, for the host you want to update. 2. Select Profile from the drop down menu on the right bottom and click Submit 3. Select the Host profile you created 4. Click Change to apply the new host profile Admin Menu Host Profile Submit Change Click Preview button In order to explore which services are available in the specific profile. 68

69 Chapter 2: Hosts & Services Administration 69 ADDING ASERVICE TO AN EXISTING HOST Centerity Monitor allows adding new definitions, expand Service monitoring & add new applicable service metrics for existing host. New services can be added from the admin menu under the Host administration 1. Go to the Hosts interface and choose a Host from the List by clicking on it 2. Select Service Tab 3. Choose from Service Category or All Service Profile List 4. Click Add to add new service to the host profile Admin Menu Host Service Add Save Note: Select multiple services by holding down the Shift or Ctrl key while clicking on the names. 69

70 Chapter 3: Policy Manager 70 Chapter 3: Policy Manager OVERVIEW Centerity Monitor Policy Manager is used to execute various procedures after some changes are made to the product configuration. For example, configure hosts and services, define new check commands, re-draw the map, etc. EXPORTING POLICY VIA POLICY MANAGER Admin Menu Policy Manager Verfity Policy Install 1. Choose Policy Manager from the Admin Menu 2. Click the Verify Policy button on the top right corner of the page. Centerity Monitor requires that all changes will be validated and verified before execution. The Verify and Install process examines all the newly created and changed data. When a problem occur Policy Manager will provide a specific alert describing the configuration issues with related data to assist on fixing the problem 70

71 71 Policy Manager Safety mechanism will prevent Centerity Monitor from exporting corrupted data to the monitor engine. Once configuration is validated and there are no problems, the system will present the following: Total Warnings: 0 Total Errors: 0 When validation completed with no errors, Install Policy button on the bottom right will become clickable. Click on the button and in few seconds all configurations will be updated. Note: If there are configuration problems and total warning and errors values are not zero, the Install Policy button will not be clickable. You will now be prompted Policy Installed Successfully as shown below. Note: If needed, the option to revert changes to the last configuration exist. This should be done in order to roll back the changes just made. INSATLL POLICY SAFETY MECHANISIM Centerity Monitor has a safety mechanism to prevent several users from exporting the configuration at the same time, resulting data duplication. Once the message Policy Manager currently running appears, that means that the Policy manager already has a copy of the configuration in memory. For this situation, three options exist: 1. Verify clear the current working copy and revalidate configuration. 2. View view the current running configuration and allow policy installation. 3. Clear cancel the install policy process. 71

72 Chapter 4: Business Service Management (BSM) 72 Chapter 4: Business Service Management (BSM) OVERVIEW Business Service Views are an effective approach for managing Information Technology (IT) from the perspective of the business. They can increase business value through better management of IT and processes. Centerity Monitor can build a logical map containing layers of components such as network, web services, databases, storage, etc. Then, Centerity Monitor calculates the Service utilization overall and for every component layer. Business Service Management leaves no stone unturned. Business services, activities, processes, transactions, etc., are understood from the business user's perspective, internally and externally, in their terms, their language, and their performance expectations, while understanding the impact on their jobs, productivity, goals and objectives, etc. CONFIGURATION 1. Login to Centerity monitor admin section using your favorite web browser. 2. Under the management tab in the admin section of the system click on "Service Views" : 3. In the services views screen click on the "+" button. 72

73 Chapter 4: Business Service Management (BSM) In the following screen fill in all of the fields in the following order: Service Group Name: The name that you want to give to your new BSM process. Description: The description that you want to give to your new BSM process. Enable / Disable View: Leave the enable checkbox always marked. Category: Select the new BSM category (Windows, Linux, Application etc.) Host Group: Select the host group that the new BSM process will be associated to. Sub Group: Select the sub group that the new BSM process will be associated to (if you have defined sub groups in the system). Contact Groups: Select the contact groups that will be associated to the BSM process. Weight Calculation: Select the checkbox in order to enable weight calculation for layers and services. Map: Select the map you want associated with this BSM process. 5. After you have filled in all of the relevant fields go to the "advanced" tab by clicking on it. 6. In the advanced tab fill in the warning and critical thresholds for the BSM availability, and also fill in the "OK Range", "Warning Range", and "Critical Range" according to the thresholds you gave to main BSM availability, for example: 73

74 Chapter 4: Business Service Management (BSM) After you have defined the thresholds of the BSM availability, go to the "Levels" tab. 8. Inside the levels tab you will need to add levels into your BSM process, by adding levels you will be able to set the amount of percentage that each level will consume for the hole BSM process, also you will be able to pinpoint the exact cause of a mission critical problem in the organization. Inside the level tab add the levels that are relevant to your BSM process (like "DB", "Networking", and "Application", "Storage" etc.),give them a description and also set the amount of weight that each level will take from the hole BSM process, for example: Keep in mind that all of the levels will have to sum up to 100%. You can also define a certain level to be a breakdown level (breakdown level is a level that will breakdown the hole BMS process if that specific level will be in a critical state critical state is defined by the percentage you choose next to the breakdown check box). 74

75 Chapter 4: Business Service Management (BSM) After finishing with the entire levels configuration go to the "Members" tab. 10. Inside the members tab you will need to add all of the relevant checks to the BSM process from all of the monitored checks, also you will need to assign each check to the relevant level that you have already defined and give each check the weight of that check from the level. 11. Under the "Add Hosts & Services" block click on the "Select Host" drop down menu button and choose the host that you want to add checks from, then all of the checks that are associated to the host will appear and you will need to mark the checks that you want to add and click on the "Add" button on the right side like so: You can also select checks from a service list or a host group list of services. 12. Continue to add all of the relevant checks from all of the relevant hosts that you want to associate to your BSM process. 13. After you have finished adding all of the relevant checks you will need to associate each check to a level that you have already defined, in order to that click on the drop down menu on the right side of each check and choose the level that the check will be associated to, like so: 14. You will need to do that operation to each check that you have added. 15. After you have finished associating all of the checks to their levels click on the "save" button in the lower right side of the screen. 16. Inside the members tab, after you have saved you will see tabs with names of the levels that you have defined, by clicking on one of them you will automatically see all of the checks that are associated to that level, and you will also be able to set the weight of each check inside the level. You will also be able to say if each check is a breakdown check (breakdown check is a check that will breakdown the hole BMS process if that specific check will be in a critical state) by marking 75

76 Chapter 4: Business Service Management (BSM) 76 the "Breakdown" checkbox under each check. Here is an example: 17. After you have finished defining the weights of checks inside the entire levels click on the "save" button on the lower right side of the screen. 18. After you have saved your new BSM process go to Policy Manager in the admin menu, and run the new policy. 19. After that, inside the monitor menu click on the "Service Views" button, and a screen that contains all of the BSM processes in the system will appear. In that screen you will be able to see your new BSM process and his current availability status in %: 20. You can drill down to a specific BSM view by clicking on it. 21. Inside the BSM process that you have clicked on you will be able to see all of the levels availability that you have defined, and also the checks that that level contains in order to pin point a problem and get an exact idea on what is causing the problem: 76

77 77 77

78 Chapter 5: Service Profiles 78 Chapter 5: Service Profiles OVERVIEW A service definition is used in order to identify a "service" that runs on a specific host. The term "service" can used using several meanings. It can mean an actual service that runs on the host (POP, SMTP, HTTP, etc.) or some other type of metric (KPI) associated with the host (response to a ping, number of logged in users, free disk space, etc.). Service profiles are templates contains for example: Monitoring metrics, such as: CPU, Memory, Disk Usage, and Network Traffic; Contact group, related to the service Monitoring schedule Checks to perform against the remote hosts and services Etc. Centerity Monitor provides hundreds of best practice Service Profiles that are suitable in most cases for standard applications. The service settings and thresholds can also be modified to fit your particular needs. CREATING A NEW SERVICE PROFILE Admin Menu Management Services To create a new Service Profile, Choose the main Admin screen and click on Services to access the Service Management screen. Click + on the top right corner of the Service Management view. 78

79 Chapter 5: Service Profiles 79 The following window will be opened: GENERAL SETTINGS 1. Service Name - The name of the service which will be displayed in the monitor under the host configuration. The service name may contain spaces, dashes, and colons (semicolons, apostrophes, and quotation marks should be avoided). Services are uniquely identified with their Template Name and Service Descriptions. 2. Service Description Clear description for the specific service. 3. Service Type - Catalog the service under a service type. This is useful information for creating Business Service Views which allows to create statistics and sub level trees. 4. Enable / Disable Service - Enable or disable the service for this host. 5. Service Template - This is the template that can be found under Templates Service which allows to save time by using general template settings for multiple services. Any unique settings should be defined under each host. 6. Contact Groups - A list of the short names of the contact groups that should be notified whenever there are problems (or recoveries) with this service. Hold down the Ctrl or Shift key to select multiple Contact Groups. 7. Host & Host Groups Members Assign the Service Profile to Hosts and/or Host Groups. Hold down the Ctrl or Shift key to select multiple items Host Members select multiple hosts to add this service 7.2. Host Groups select multiple host groups to add this service 8. In order to add multiple instances of a Service Profile to a host, for instance if the host has multiple CPUs or NICs, you will need to either create multiple Service Profiles with unique names and descriptions, or add the Service Profile from the Host Menu. 79

80 Chapter 5: Service Profiles 80 COMMAND PROPERTIES Select the command tab to activate the option. The line should turn green and the option you selected will override the one from the template. In the example above, the Service Check Command and the Checks Period information will be applied to the Service, but the Arguments won't be applied because the checkbox on the right is not activated. If they are available in the Host template, they will be used from there. 1. Service Check Command The specific command Centerity Monitor runs in order to check the status of the service. 2. Command Settings - A macro information defined for this check command in Templates Commands Service. 3. Arguments Command-line arguments that should be passed to the check command. 4. Checks Period - Specify the short name of the time period during which active checks of this service can be made. Time and Scheduler Periods can be defined using Templates Time Periods. 5. Time Period A fixed time period in which the service check will be execute. 6. Scheduler Period A specific date and time period in which the service check will be executed. Note: Scheduler Period will change the service from active to passive settings 7. Max Check Attempts - The number of times that Centerity Monitor will retry the service check command if it returns any state other than an OK state. Setting this value to 1 will cause Centerity Monitor to generate an alert without retrying the service check again. 80

81 Chapter 5: Service Profiles Normal Check Interval - Defines the number of "time units" to wait before scheduling the next "regular" check of the service. "Regular" checks occur when the service is in OK state, or when the service is in a non-ok state, but has already been rechecked the maximum number of times. Unless you have changed the interval length from the default value of 60, this number will represent minutes. 9. Retry Check Interval The number of "time units" to wait before scheduling a re-check of the service. Services are rescheduled at the retry interval when they have changed to a non-ok state. Once the service has been re-checked the maximum number of times without a change in status, it will revert to being scheduled at its "normal" rate as defined by the check interval value. Unless you have changed the interval length from the default value of 60, this number will represent minutes. NOTIFICATION SETTINGS 1. Notification Enabled Enables or disables notifications for this Service. 2. Notification Period - Time period during which notifications of events for this service can be sent out to contacts. If a service event occurs during a time frame which is not covered by the time period, no notifications will be sent out. 3. Notification Interval - Number of "time units" to wait before re-notifying a contact that this service is still down or unreachable. Unless you have changed the interval length from the default value of 60, this number will represent minutes. If you set this value to 0, Centerity Monitor will not re-notify contacts about problems for this service - only one notification will be sent out. 4. Notification Options - This determines which notifications for the service should be sent out. Valid options are a combination of one or more of the following: Recovered, Critical, Warning, and Unknown 81

82 Chapter 5: Service Profiles 82 STATUS SETTINGS 1. Active Check - Determines if active checks of this service are enabled. 2. Passive Check - Determines if passive checks of this service are enabled. 3. Is volatile A volatile service is one that changes its status too often. This option detects those kinds of services. 4. Parallelize check - Determines if a service check can be parallelized. By default, all service checks are parallelized. Disabling parallel checks of services can result in major collector performance issues 5. Obsess over service - Determines if Centerity Monitor will obsess over service checks results and run the obsessive compulsive service processor commands. We recommend this option only for distributed monitoring. MISC. SETTINGS 6. Freshness checks Determines if freshness checks are enabled for this service. These settings useful when passively monitoring a service while the remote host does not report at a regular interval (heartbeat). For more information on passive monitoring refer to Centerity Website support section "Centerity Windows Passive Monitoring Guide". 7. Freshness threshold - Specifies the freshness threshold (in seconds) for this service. Centerity Monitor will determine a freshness threshold to use automatically when setting this value to 0, 8. Event Handler Run action as a result of change events. Can trigger actions on remote services such as restart service, reboot computer, delete temp file, run scripts, etc. 9. Enable / Disable Event Handler Determines if event handler for this service is enabled. 10. Event Handler Command - The command defined in the Event Handler section 11. Flap Detection Determines if flap detection is enabled for this service. Centerity Monitor supports the detection of hosts and services that are "flapping". Flapping occurs when a service or host changes state too frequently, resulting in a many problem and recovery notifications. Flapping can be indicative of configuration problems (i.e. thresholds set too low) or real network problems. 12. Flap Threshold Defines low and High Thresholds for Flap Detection Mechanism Low flap threshold - Specifies the low state change threshold used in flap detection for this service. 82

83 Chapter 5: Service Profiles High flap threshold Specifies the high state change threshold used in flap detection for this service. 13. Process performance data Determines whether processing of performance data is enabled for this service. Note: If you disable Data performance for specific service graph information will not be created 14. Retain status information Determines whatever status-related information about the service is retained across program restarts. 15. Retain non status information - Determines whether non-status information about the host is retained across program restarts. 16. Stalking Enabled - When enabled, this allows to log changes in service and host checks even if the state of the host or service does not change. When stalking is enabled for a particular host or service, Centerity Monitor will watch that service very carefully and log any changes occur. This can be very helpful for later analysis of the log files. 17. Stalking options - Determines which host states stalking is enabled. Valid options are a combination of one or more of the followings: OK, Critical, Warning, or Unknown. 83

84 Chapter 5: Service Profiles 84 SERVICE EXTENDED INFORMATION Extended service information entries effect on how information is displayed and has no effect on monitoring. 1. Graph / Service Details - Choose a Graph Icon and link to daily graph of performance or other data relevant for the service check. Information Icon will be displayed and link to Service information and availability. 2. Graph type - Customized graph or a pre-defined graph from the drop-down list. The customized graph are available from the Graphs menu allowing to apply colors, legends; mathematical functions, prediction formulas and more. Reports available from Centerity Service Packs and allows to view custom service reports. For more information, please visit the Centerity website Support section. 3. External URL Link to an external URL for the service. Will appear in the status tab when viewed in the monitor. 4. Notes URL Link to an external URL, such as a CRM application or any other application. 5. Icon Image alternate text - Set text for mouse over icon. 84

85 Chapter 5: Service Profiles 85 SERVICE DETAILS Service details screen which available from the Service Information display allows to access the information related to this service such as: 1. Threshold - Threshold settings for OK, Warning, and Critical 2. Software Define the software which is actually behind this service. For example, if you monitor HTTP service you can specify Apache. 3. License - license type or serial number for this software 4. Expiration - Expiration date of warranty or License expiration. 5. Manufacturer - Details of the software manufacturer. 6. Manufacturer URL - Website link of the software manufacturer. 7. Purchased - The date the software was purchased or installed 8. Comments - Any additional information might be relevant 85

86 Chapter 5: Service Profiles 86 EDIT A SERVICE PROFILE Admin Menu Management Services To edit a Service Template, go to the Admin menu and click Service from the left menu to display all of the service profiles available. You can search for a specific service from the search box on the page. After you find the desired template click the edit link the Service Properties column UPDATE ALL SERVICE MEMBERS VS. DELETE ALL SERVICE MEMBERS There are two primary differences between the update function and the delete function: 1. Delete all Service Members (hosts) - Removes the service from all hosts that are using it. This is useful while removing a check from a large number of hosts. 2. Update All Service Members (hosts) - Update any changes made to the service on all hosts that are currently being monitored. Changes to the service will only apply to hosts added in the future. The Service Name will stay unique on every host. 86

87 Chapter 5: Service Profiles 87 DISPLAYING A LIST OF HOSTS WITH A SPECIFIC SERVICE To view all hosts that are associated with a particular Service Profile, either click on the name of the Service in the Services page, or click on the number in the Number of Hosts column. SERVICE SEARCH OPTIONS To locate a specific Service Profile you can use the Search Box at the top of the page, or display by Service Type from the drop down menu. 1. Search Service - Search for a Service Profile name. You may enter partial keywords to find your desired service. Search also be used by using the Service Type drop down menu to locate a specific service by category. 2. Search Member - Search for Services which has been assigned to Hosts. Selecting Member and entering a partial name of the Service, will display the associated Services and Hosts. From those search results you can perform tasks such as Enable, Disable, or Delete. 87

88 Chapter 5: Service Profiles 88 EDIT A HOST-ASSOCIATED SERVICE There are 2 methods to access a service that is assigned to a host: 1. Directly from Host From the Hosts menu, choose the desired host and scroll to the Associated Services table and click on the Service name. 2. Service Profile host list From the Service Profile, click on the Service name to display all hosts that are using this service. Click Edit and you will be taken to the Service Definition screen for this Service on the particular Host. Note: you cannot change the Host name from this screen. Save as template - Before saving this Service you can create a Service Profile from the specified settings and then associate the template with new or existing hosts. At the bottom left of page, across from the Save button, you will see Save as template. Mark the checkbox and click Save. This will create a new Template with the name of the Service. 88

89 Chapter 5: Service Profiles 89 APPLYING A SERVICE PROFILE TO MULTIPLE HOSTS OR HOSTS GROUPS Adding a Service to a host was covered in Chapter 2: Administering Hosts. Follow these directions to add a service to one host, several hosts, or to host groups. Admin Menu Management Services From the Service Definition screen, select the Host(s) in the Host Members list. Additionally, you may apply the Service to Host Group(s) by selecting the groups from the Host Groups list. Note: You can add multiple hosts or host groups by holding down the shift button while clicking on several hosts or host groups. 89

90 Chapter 6: Contacts and Contact Groups 90 Chapter 6: Contacts and Contact Groups CREATING A NEW CONTACT A contact definition is used to identify persons who should be contacted when a problem occur. 1. Contact Name Short name used to identify the contact. It is referenced in contact group definitions. The $CONTACTNAME$ macro will contain this value. 2. Contact Alias long name or description for the contact. The $CONTACTALIAS$ macro will contain this value. 3. Enable / Disable Contact Define the active state of a contact. 4. Contact Groups Assigned contact groups for the specific contact 5. Contact address. Mandatory in order to receive notifications. 6. Phone Number Contact phone number. Mandatory in order to receive SMS notifications. 7. User password Contact password. Also can be automatically generated by pressing the "Generate" button. 90

91 Chapter 6: Contacts and Contact Groups 91 HOST NOTIFICATIONS 1. Host Notification Period - Time period during which the contact can be notified about host problems or recoveries. 2. Host Notification Options - Host states for which notifications can be sent out to this contact. Valid options are a combination of one or more of the following: Recovered, Unreachable, and Down. 3. Host notification commands: List of commands used to notify the contact of a host problem or recovery. Multiple notification commands can be selected by holding down the Ctrl or Shift key while selecting the commands. All notification commands are executed when the contact needs to be notified. 91

92 Chapter 6: Contacts and Contact Groups 92 SERVICE NOTIFICATIONS 1. Service Notification Period - Time period during which the contact can be notified about service problems or recoveries. 2. Service notification options States the notifications to be sent out to this contact. Valid options are a combination of one or more of the following: Recovered, Critical, Warning, and Unknown 3. Service notification commands - List of commands used to notify the contact of a service problem or recovery. Multiple notification commands can be selected by holding down the Ctrl or Shift key while selecting the commands. All notification commands are executed when the contact needs to be notified. 92

93 Chapter 6: Contacts and Contact Groups 93 USER SETTINGS The address for the contact. Depending on how you configure your notification commands, it can be used to send out an alert to the contact. The $CONTACT $ macro will contain this value. 2. Phone - Phone number for the contact. Depending on how you configure your notification commands, it can be used to send out an alert page to the contact. The $CONTACTPAGER$ macro will contain this value. 3. User Password - Password for the user to login to Centerity Monitor. The password is encrypted by default but you can generate a password for the user by clicking the Generate button. The password will be displayed until you click Save. Note: After you save the contact, the password is encrypted and not available for viewing in Centerity Monitor web. 93

94 Chapter 6: Contacts and Contact Groups 94 CONTACT PERMISSIONS Centerity Monitor allows to manage user permissions and control which information and commands users can access. User permissions can be set to view only a specific services or hosts by removing all permissions listed below (only allowing the user Web Login). 1. Web Login Determines if user can access the Monitor Console, Dashboard, reports, etc. Note: If you disable user permissions for all host / system information, the user will not be able to view the dashboard, and this feature will be removed from the menu. 2. Authorized for system information - Set user permissions to view system/process information in the extended information. 3. Authorized for system commands - Set user permissions to issue system/process commands via the command. 4. Authorized for configuration information - Set user permissions to view configuration information in the configuration. Users in this list can view information on all configured hosts, host groups, services, contacts, contact groups, time periods, and commands 5. Authorized for all hosts - Set user permissions to view status and configuration information for all hosts. Users in this list are also automatically authorized to view information for all services. 6. Authorized for all host commands - Set user permissions to issue commands for all hosts via the command. Users in this list are also automatically authorized to issue commands for all services 7. Authorized for all services - Set user permissions to view status and configuration information for all services. Users in this list are not automatically authorized to view information for all hosts, but only the hosts under their contact group. 94

95 Chapter 6: Contacts and Contact Groups Authorized for all service commands - Set user permissions to issue commands for all services via the command. Users in this list are not automatically authorized to issue commands for all hosts and not automatically authorized to view status or configuration information for all hosts. 9. Hide sensitive information - Remove Check command data and arguments from this user. If you are storing clear text passwords in the Arguments field in Service Profiles this will encrypt the data in the standard Monitor views. Note: Sensitive information will not be hidden in the admin menu. 10. Web administration - Grant user permissions to be administrator and have full access to system configuration, management and resources. CREATING A NEW CONTACT GROUP Admin Menu Management Users Contact Groups A contact group definition is used to group one or more contacts together for the purpose of sending out alert/recovery notifications. When a host or service has a problem or recovers, Centerity Monitor will find the appropriate contact groups to send notifications to, and notify all contacts in those groups. 1. Contact group name - Short name used to identify the contact group. 2. Alias - long name or description used to identify the contact group. 3. Contact Members - List of the short names of contacts that should be included in this group. Hold down the Shift or Ctrl key to select more than one name. 4. Add to all host groups Add the Contact Group to all Host Groups. 5. Add to all services - Add the Contact Group to all Services. 95

96 Chapter 6: Contacts and Contact Groups 96 Note: This does not add the contact group to a Service Profile. You need to assign the group manually to the Service Profile as described in Chapter 3 Service Profiles. ADDING A CONTACT GROUP TO A HOST GROUP In order to get alerts for a host a contact group that should be notified need to be set. To add new contact group to a specific host group go to the Host Group section from the main Admin screen and choose the desired Host Group. Then select the new contact group and click the Save button. 1. In order to give the contact group permissions check the Add Contact groups to all Hosts and Services under the selected Host group. 2. In order to remove permissions from the selected host groups check Remove Contact groups from all Services. The host group permissions affect Monitor view for the users in the selected contact group. Note: This only affects users who are not administrators. Administrators can see all the hosts. 96

97 Chapter 6: Contacts and Contact Groups 97 ADD A CONTACT GROUP TO A HOST-ASSIGNED SERVICE To add a new contact group to a specific service go to the host from the Hosts screen and select the desired Host. Select the associated service, and add the Contact Group(s) you wish to assign to the service and click the Save button. ADD A CONTACT GROUP TO A SERVICE PROFILE To add a new contact group to a specific Service Profile, go to the Services menu and edit your desired Service Profile by clicking on Edit, Then select the Contact Group(s) you want to assign to the service and click the Save button. 97

98 Chapter 7: Plug-ins, Templates and Service Profiles 98 Chapter 7: Plug-ins, Templates and Service Profiles OVERVIEW Centerity Monitor provides a flexible way to add new monitoring metrics (KPI) using the Plug-ins and Templates mechanism. By harnessing external APIs such as WMI, SNMP, Web Services, etc., you are able to query the status, performance, and availability of almost all hardware devices, operating systems, and applications. Centerity Monitor relies on external programs - called plug-ins, to check a service or host that is being monitored. This method delivers very high performance and more flexibility on user side. The plug-in generate action to perform the check and then simply returns the results to Centerity Monitor. Centerity Monitor will process the received results from the Plug-in and generate any necessary actions (running event handlers, sending out notifications, etc.). The correlation between plug-ins and service checks is fairly simple. When Centerity Monitor needs to check the status of a defined service, it will execute the plug-in specified in the Service Check Command, and use the arguments of the Service Definition. The plug-in will check the status of the service or resource specify and return the results to Centerity Monitor. Plug-ins are compiled executable or scripts (Perl, shell, etc.) that can be run from a command line to check the status of a host or service. Centerity Monitor uses the results from plug-ins to determine the current status of hosts and services on your infrastructure. Host & Service Architecture Host Template Host Service Template Service Profile Service Check Command Plugins 98

99 Chapter 7: Plug-ins, Templates and Service Profiles 99 MANAGING PLUG-INS Admin Menu Utilities Plug-ins Add Centerity Monitor allows to manage plug-ins from a simple web interface. It is simple to view and edit plug-in information, execute the checks online, view plug-in help, and much more. From the Admin menu, under the Utilities section, choose Plug-ins. The page will display the Plug-ins installed and available on the system. ADDING A NEW PLUG-IN Click the Add button in the top right of the page. New Plug In page will be displayed. There are three ways to upload new plug-ins: 1. Scan Directory Upload via FTP or sftp the new plug-in and click the Scan Directory button. This will detect new plug-ins available in the directory. For new plug-ins, the checkbox on the right is clickable. Mark new plug-in and click Save in order to save the new Plug-ins to the database. 2. Upload Local Plug-in Select a plug-in from your local computer and click Upload to send the plugin to Centerity Monitor and update the database. 3. Remote server file browser Upload the plug-in to your home directory and use this option to browse the file system remotely to find the new plug-in. 99

100 Chapter 7: Plug-ins, Templates and Service Profiles 100 PLUG-IN INFORMATION SCREEN 1. Plug-in Name - Short name of the plug-in. If it was chosen to upload the file and not use the automatic directory scan, this will become the plug-in name. 2. Plug-in Description - A long description of the plug-in. 3. Plug-in Type Select category for the selected plug-in. This is informational data only, but it allows you to be more efficient in your Plug-ins management. 4. File Location Click on the link to open or save the plug-in to your local computer for editing. 5. Comments any other relevant information related to the Plug-in. A command definition defines commands for service checks, service notifications, service event handlers, host checks, host notifications, and host event handlers. Command definitions can contain macros, but it is most important to make sure that it includes only those macros that are "valid" for the circumstances when the command will be used in Centerity Monitor. 100

101 Chapter 7: Plug-ins, Templates and Service Profiles 101 COMMAND TEMPLATES Command Templates are accessed from the Admin Menu, under Templates Commands. Admin Menu Templates Commands There are three different Command Templates used in standard operations: 1. Host Check Command These are instructions for Centerity Monitor to run on every host check occurs. Usually host checks are not run in regular intervals, only when one or more problems or state changes from OK to any other state. This Host command is bound to the host itself and can be defined in the Host Template or in the Host settings. 2. Service Check Command Service check command is used in every Service Profile assigned to a host, and it performs operations as defined. The information returned by the check command to Centerity Monitor is interpreted and analyzed, and spawns different actions which are eventually displayed in the Monitor Console. 3. Notification Commands Notification commands are used to notify the contact of a problem or recovery. All notification commands are executed when the contact needs to be notified, according to definitions. The maximum amount of time that a notification command can run is controlled by the notification timeout option. 101

102 Chapter 7: Plug-ins, Templates and Service Profiles 102 CREATING HOST /SERVICE CHECK COMMANDS Admin Menu Templates Commands Host / Service Add To create service command definition to use in Host definition or in the Service Profile choose Commands under Templates in the Admin menu and choose either Host Command or Service Command. A list of all available commands for Hosts and Services will appear. You can either locate a command similar to your new command and duplicate it, or create new Command definitions. To create a new Command, click the Add button at the top right corner of the page. 1. Host / Service Command Name Short command name that will be used by the monitor. It will also be displayed under the Service Profile. Choose a short name that will enable you to locate the command quickly. 2. Description A Long meaningful description. This is informational data only and does not affect the monitoring process. 102

103 Chapter 7: Plug-ins, Templates and Service Profiles Service Type Choose a category that fits the command to aid in batch operations or to display the commands by categories. 4. Select Plug-ins The plug-in used by the Host or Service command which will be executed with the arguments passed by the monitor server. 5. Command Definitions - Arguments that will be passed to the plug-in. For example, if the plug-in gets parameters such as H <ipaddress> -w <warning> -c <critical> you can specify here the exact settings such as H w 80% -c 90%, and these settings will be passed to the plug-in by default. It is also recommended to use macros (see Appendix A: Macros), and not hard-coded parameters. For example, in order use the host address, use $HOSTADDRESS$, for warning $ARG1$, and for critical $ARG2$.This will be taken from the arguments of the service. 6. Command Example Informational data only which does not affect the monitor. 7. Command Default Values Informational settings that will be applied to the Service Profile Arguments and will provide a display on how the command should be defined with a macro separator. 8. Comments Any other relevant information. When using macros in the Command Definitions field such as: $ARG1$ and $ARG2$ note that the separator between them is the! sign. Note: Click the Plug-in Help button to find out which command switches available for the current plug-in 103

104 Chapter 7: Plug-ins, Templates and Service Profiles 104 WORKING WITH COMMANDS There are three types of commands: 1. Vanilla Command - The command name is the name of a command that was previously defined. 2. Command w/ Arguments Same as "vanilla" command style, but with command options separated by a! character. Arguments are separated from the command name (and other arguments) with the! character. The command should be defined to make use of the $ARGx$ macros. Note: Centerity Monitor will handle a maximum of sixteen command line arguments ($ARG1$ through $ARG16$). 3. "Raw" Command Line - An actual command line to be executed. To do so the syntax must enclose the entire command line in double quotes. CREATING NOTIFICATION TEMPLATES Notification commands are very similar to the Standard Check commands but due to flexible enhancements, the notification field allows to enter a raw command in the definition. Example Send Mail alert for user: /usr/local/nagios/tools/centerity _send -f -t $CONTACT $ -u "$HOSTALIAS$ - $HOSTNAME$" -s m "Notification: $NOTIFICATIONTYPE$\r\n \r\nhost: $HOSTALIAS$\r\nAddress: $HOSTADDRESS$\r\nAddress: $HOSTADDRESS$\r\nState: $$HOSTSTATE$\r\nAdditional Info: $OUTPUT$\r\nDate/Time: $DATETIME$\r\n\n*** Message generated by Centerity Monitor ***\r\n\n" -cr host -ch $HOSTNAME$ 104

105 Chapter 7: Plug-ins, Templates and Service Profiles 105 Notification commands are assigned directly to contacts and used to notify the contact of a problem or recovery. Multiple notification commands should be separated by commas. All notification commands are executed when the contact needs to be notified. ASSIGNING A CHECK COMMAND TO A SERVICE PROFILE Once defining a Service Check Command, its need to be assigned the new command; to a new Service Profile or to an existing host. Add or edit the template as described in Chapter 3: Service Profiles. Open the Command Properties section and select the Service Check Command for your newly added template. Apply the new arguments as necessary. This option is also available to an existing Associated Service under Host in the Hosts Menu. Note: For convenience purposes, selecting a new check command replaces the content of the Arguments to fit the current argument format for the Check Command Template. 105

106 Chapter 8: Maps 106 Chapter 8: Maps OVERVIEW A network diagram is always important to visualize problems in your network. Centerity Monitor provides 4 types of maps 1. Air View 2. Hyper Map 3. Topology map 4. Live Network map The Hyper Map, Air View and Topology map will be created automatically based on hierarchy definition ant parent-child relationship. VISUAL LAYOUTS - HYPERMAP The Hyper map provides dynamic and interactive network layout and requires Java client to be displayed on your browser. By default, all hosts that are defined in the system will be presented in the hyper map automatically. 106

107 Chapter 8: Maps 107 VISUAL LAYOUTS - TOPOLOGY HYPERMAP The hyper map provides real-time indication about problems with the services in every host or host group. In case of new event, the host background color in the hyper map will present the status (yellow - warning, orange - unknown, red - critical). VISUAL LAYOUTS AIR VIEW 107

108 Chapter 8: Maps 108 VISUAL REAL-TIME LAYOUTS Centerity Visual Live Layouts Module provide fast and easy way to create verity of live layout such as geographical maps, business processes (BPM), Network chart etc.. The live layout presents the current status of each component including hosts, metrics (services), host groups and business services. Creating New Layout Admin Menu Maps press "+" to add new layout 1. From the admin menu bar select Map Map Designer Build Layout Save Enable Map 2. Press on the + button (right top corner) to open a new map builder. Fill in the new layout name and Click "OK" 108

109 Chapter 8: Maps Layout designing Centerity allows easy drag & drop process with verity of built-in icons and options to design advanced layouts. Each icon can represent one of the following objects in the system: 3.1. Host The system will present the host status as following: Host up with no warning only the icon Host Down Red Halo around the icon Host with one or more services in critical state red Halo with a service icon Host with one or more services in warning state Yellow Halo Host with one or more services in Unknown state Orange Halo 3.2. Host Group The system will present the host Group status as following: Host Group with no warning Clear icon with no halo Host Group with one or more hosts in down Red Halo around the icon Host Group with one or more services in critical state red Halo with a service icon Host Group with one or more services in warning state Yellow Halo Host Group with one or more services in Unknown state Orange Halo 3.3. Service - The system will present the host status as following: Service in OK state only icon or green led Service in critical state red Halo / Red led Service in warning state Yellow Halo / Yellow Led Service in Unknown state Orange Halo / Orange Led 3.4. Business Service The system will present the BSM percentage availability. 109

110 Chapter 8: Maps To add a new object to the layout, drag the selected icon from the left menu pane to the stencil and drop it. Double clicking on the icon will open the object properties window: 5. To add line-connection between two objects use the connector button drag the curser from one object to the other. Double clicking on the line will open advanced properties for the line status. 110

111 Chapter 8: Maps Saving new layout Click on the disk icon to save the new layout. 7. Enabling new layout - To enable / disable map, mark the checkbox and press the enable button on the screen top right corner. ADVANCED DESIGNER SETTINGS Centerity live layout module allows advanced designing settings. 1. Click on the "designer settings" button on the top right of the screen. The designer settings screen includes several options as follows: 1.1. Map Resolution - Define the layout resolution Background Selected background for the layout (any PNG / GIF file from the media manager can be selected as background) 1.3. Grid enable / disable grid lines Auto save define auto save. Note: Auto save will save automatically the latest version with no Redo option. 111

112 Chapter 8: Maps 112 VISUAL LIVE LAYOUTS MODULE VIEWS & SLIDE SHOWS The live layouts module allows to define automatic slide show of multiple selected layouts. Admin Menu - Maps Maps View "+" (Add New) Insert view properties Select members (2nd tab) Click OK to save 1. Select "Map Views" tab in the admin section 2. Press the + button on the top right corner 3. On that screen there are 2 tabs: "Views Settings" and "Views Members" 3.1. in the views settings tab fill in the information as following: View Name slide show name View description slide show description Slides Interval the time intervals between layouts Refresh Interval the refresh time intervals Map Title display the map title. 112

113 Chapter 8: Maps In the "Views Members" tab: Select the layouts that will appear in the slide show by checking the checkbox near the selected layout Click ok to save. 113

114 Chapter 9: Host & Services Dependencies 114 Chapter 9: Host & Services Dependencies HOST DEPENDENCIES Configuring New Host Dependencies: Admin Menu - Host Dependencies Tab Press "+" icon Select Dependencies Select Failure Criteria & Save Install Policy Click on the + icon. 1. Select Dependent hosts from the left column showing all available hosts. 2. Select their failure criteria up/down/unreachable. 3. Click "Ok". 114

115 Chapter 9: Host & Services Dependencies 115 Removing Host Dependencies: 1. Select the host you want to remove in the checkbox. 2. Click on the X button and click "Ok" to confirm. SERVICE DEPENDENCIES Adding New Service Dependencies: Admin Menu - Host Services Tab - Select Service Dependencies Tab - Click "+" Select Dependencies Select Failure Criteria & Save Install Policy Click on the + icon. 1. Select Dependent service from the left column showing all available services. 2. Select their execution failure criteria Ok/Warning/Unknown/Critical. 3. Select their notification failure criteria Ok/Warning/Unknown/Critical. 4. Click "Ok". Removing Service Dependencies: 1. Select the service you want to remove in the checkbox. 2. Click on the X button and click "Ok" to confirm. You can view and manage all dependent hosts and services from settings menu. 115

116 Chapter 9: Host & Services Dependencies 116 Managing host dependencies: Description: The host dependency description. Host Name: The host name. Dependent Host Name: The dependent host name. Notifications failure criteria: The host status on which the dependent host will fail, and will not send notifications to users. Comments: Admin comments. Managing service dependencies: Description: The service dependency description. Host Name: The host name of the service. Service Description: The service name and description. Dependent Host Name: The dependent host name. 116

117 Chapter 9: Host & Services Dependencies 117 Dependent Service Description: The dependent service name and description. Execution Failure Criteria: The host status, on which the dependent service will fail, will not continue checking the dependent service and will not send notifications about the service status. Notifications failure criteria: The host status on which the dependent service will fail, and will not send notifications to users. Comments: Admin comments. 117

118 Chapter 10: Escalation 118 Chapter 10: Escalation Centerity Monitor provides powerful solution for host and service notifications. This guide describe the escalations configuration on two levels: 1. Host escalations - escalate host events (up, unknown and down states.) 2. Host group escalations - handle multiple host escalations. 3. Service escalations - escalate all service events ok, warning, critical and unknown states. HOST ESCALATIONS 22. Login to Centerity monitor admin section. 23. Under the Users tab in the admin section of the system click on "Escalations" and then click Hosts : 24. In the host escalations screen click on the "+" button. 118

119 Chapter 10: Escalation In the following screen fill in all the fields in the following order: 1.1. Description: The escalation description Host Name: The escalated host First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). In the screenshot above, the notification will be escalate after 3 notifications to the first level escalations. The escalation will be sent 5 times to the escalation group every 10 minutes. If by then, the event isn t solved it ll send notifications to the first group again, etc. 25. Press save to keep escalation preferences. 119

120 Chapter 10: Escalation Go to the escalated host, click the Advanced tab: 27. Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). HOST GROUP ESCALATIONS 1. Login to Centerity monitor admin section using your favorite web browser. 2. Under the Users tab in the admin section of the system click on "Escalations" and then click Hosts : 3. In the host escalations screen click on the "+" button. 120

121 Chapter 10: Escalation In the following screen fill in all of the fields in the following order: 1.1. Description: The escalation description Host Name: The escalated host-group First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). In the screenshot above, the notification will be escalate after 5 notifications to the first level (NOC Team), The escalation will be sent once to the escalation group (System Administrators) and the NOC Team and then will stop. 4. Press save to keep escalation preferences 121

122 Chapter 10: Escalation Make sure each host within the host group has notifications enabled, Go to any each host and click the Advanced tab: 6. Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). SERVICE ESCALATIONS 1. Login to Centerity monitor admin section using your favorite web browser. 2. Under the Users tab in the admin section of the system click on "Escalations" and then click Services : 122

123 Chapter 10: Escalation In the service escalations screen click on the "+" button. 4. In the following screen fill in all of the fields in the following order: 4.1. Description: The escalation description Host Name: The host to choose the escalated service from Dependent Service: The escalated service First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). In the picture above, the notification will be escalated after 3 notifications are sent to the first level escalations (NOC Team), the escalation will be sent once to the escalation group and the first group as well (NOC Team and System Administrators) and will stop after that. 5. After you have filled in all of the relevant fields save the escalation preferences. 6. Go to the escalated service, click the commands tab: 123

124 Chapter 10: Escalation Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). 124

125 Chapter 11: Settings 125 Chapter 11: Settings OVERVIEW Centerity s Settings menu provides wide range of general settings for different personal preferences and maximum, performance. GENERAL TAB General Setting 1. Admin - This is the address for the administrator of the local machine. 2. Admin Pager - This is the pager number (or pager gateway) for the administrator of the local machine. 3. Date Format - This option allows you to specify what kind of date/time format Centerity Monitor should use in the web interface and date/time macros. 4. Select Timezone This option allows you to change timezone. 5. Service Check Execution - This option determines whether or not Centerity Monitor will execute service checks when it initially (re)starts. 6. Passive Service Check Acceptance - This option determines whether or not Centerity Monitor will accept passive service checks when it initially (re)starts. 7. Notifications Option - This option determines whether or not Centerity Monitor will send out notifications when it initially (re)starts. Event Handlers 1. Enable Event Handlers - This option determines whether or not Centerity Monitor will enable event handlers. 2. Global Host Event Handler - This option allows you to specify a host event handler command that is to be run for every host state change. 3. Global Service Event Handler - This option allows you to specify a service event handler command that is to be run for every service state change. 125

126 Chapter 11: Settings 126 Data Handling 1. Soft State Dependencies - This option determines whether or not Centerity Monitor will use soft service state information when checking service dependencies. 2. Process Performance Data - This value determines whether or not Centerity Monitor will process host and service check performance data. Status Note: Disabling this option eliminates graph creation 1. Retain State Information - This option determines whether or not Centerity Monitor will retain state information for hosts and services between program restarts. 2. Retention Update Interval - This setting determines how often (in minutes) that Centerity Monitor will automatically save retention data during normal operation. 3. Use Retained Program State - This setting determines whether or not Centerity Monitor will set various program-wide state variables based on the values saved in the retention file. 4. Use Retained Scheduling Info - This setting determines whether or not Centerity Monitor will retain scheduling info (next check times) for hosts and services when it restarts. 5. Aggressive Host Checking - Centerity Monitor tries to be smart about how and when it checks the status of hosts. WEB SETTINGS TAB 1. Screen Refresh Rate - This option allows you to specify the number of seconds between page refreshes for the status, status map, and extinfo CGIs. 2. Dashboard Refresh Rate - This option allows you to specify the number of seconds to refresh the Dashboard. Map Settings 1. Dashboard Map A - This option allows you to specify the default dashboard map A. 2. Dashboard Map B - This option allows you to specify the default dashboard map B. Sound Settings 1. Host Unreachable Sound - Play audio file when Host is unreachable. 2. Host Down Sound - Play audio file when Host is down. 3. Service Critical Sound - Play audio file when Service is in critical state. 4. Service Warning Sound - Play audio file when Service is in warning state. 5. Service Unknown Sound - Play audio file when service is in unknown state. 6. Normal Sound - Play audio file when state is ok. 126

127 Chapter 11: Settings 127 Web Admin Settings Rows per Admin Page - The number of rows to display on a single page in admin tab. Rows per Monitor Page - The number of rows to display on a single page in monitor tab. Persistent Tabs - Remember Last tab selected. Hyper Map Mode Choose between a full map view and a view of Host groups & Subgroups. STATUS SETTINGS TAB Host & Service Checks 1. Check External Commands - This option determines whether or not Centerity Monitor will check the command file for internal commands it should execute. 2. External Command Check Interval - Determines how often Centerity Monitor checks commands submitted. (I.e. from web, Passive Checks) 3. Check for Orphaned Services - This option allows you to enable or disable checks for orphaned service checks. Timing 1. Inter Check Sleep Time - Number of seconds that Centerity Monitor will sleep before checking to see if the next service check in the scheduling queue should be executed. 2. Inter Check Delay Method - This option allows you to control how service checks are initially "spread out" in the event queue. 3. Service Interleave Factor - This variable determines how service checks are interleaved. Interleaving allows for a more even distribution of service checks, reduced load on remote hosts, and faster overall detection of host problems. 4. Maximum Concurrent Checks - This option allows you to specify the maximum number of service checks that can be run in parallel at any given time. Specifying a value of 1 for this variable essentially prevents any service checks from being parallelized. 5. Service Reaper Frequency - This option allows you to control the frequency in seconds of service "reaper" events. "Reaper" events process the results from parallelized service checks that have finished executing. Timeouts 1. Interval Length - This is the number of seconds per "unit interval" used for timing in the scheduling queue, re-notifications, etc. "Units intervals" are used in the host configuration file to determine how often to run a service check, how often of re-notify a contact, etc. 2. Service Check Timeout - This is the maximum number of seconds that Centerity Monitor will allow service checks to run. If checks exceed this limit, they are killed and a CRITICAL state is returned. A timeout error will also be logged. 3. Host Check Timeout - This is the maximum number of seconds that Centerity Monitor will allow host checks to run. If checks exceed this limit, they are killed and a CRITICAL state is returned and the host will be assumed to be DOWN 127

128 Chapter 11: Settings Event Handler Timeout - This is the maximum number of seconds that Centerity Monitor will allow event handlers to be run. If an event handler exceeds this time limit it will be killed and a warning will be logged. 5. Notification Timeout - This is the maximum number of seconds that Centerity Monitor will allow notification commands to be run. If a notification command exceeds this time limit it will be killed and a warning will be logged. 6. Aggregate Status Updates - This option determines whether or not Centerity Monitor will aggregate updates of host, service, and program status data. If you do not enable this option, status data is updated every time a host or service checks occurs. 7. Aggregated Status Update Interval - This setting determines how often (in seconds) that Centerity Monitor will update status data in the status file. The minimum update interval is five seconds. LOGGING TAB General Settings 1. Log Rotation Method - This is the rotation method that you would like Centerity Monitor to use for your log file. 2. Use SYSLOG - This variable determines whether messages are logged to the SYSLOG facility on your local host. Retry Loggings 1. Log Notifications - This variable determines whether or not notification messages are logged. 2. Log Host Retries - This variable determines whether or not host check retries are logged. 3. Log Service Retries - This variable determines whether or not service check retries are logged. Service check retries occur when a service check results in a non-ok state. 4. Log Event Handlers - This variable determines whether or not service and host event handlers are logged. Event handlers are optional commands that can be run whenever a service or hosts changes state. State Logging 1. Log Initial States This variable determines whether or not Centerity Monitor will force all initial host and service states to be logged. 2. Log External Commands - This variable determines whether or not Centerity Monitor will log external commands that it receives from the external command file. 3. Log Passive Service Checks - This variable determines whether or not Centerity Monitor will log passive host and service checks that it receives from the external command file. 128

129 Chapter 11: Settings 129 Mail Settings These are the mail settings used to send out reports. 1. SMTP User Name: Represent s username account, 2. SMTP User Password: Represent s password account. 3. SMTP Server: Represents server address. 4. SMTP Alias Name: The that the will appear to be sent from. 5. SMTP TLS: Represents the use of TLS protocol. 1. You can also fill the following optional parameters: o SMTP Alias Name represent the FROM sender mail Note: If not specified, SMTP User Name will be used instead. o SMTP TLS option for TLS protocol. Note: auto is default value 2. After appending all changes click on Save button to complete update. OTHER SETTINGS TAB OSCP Commands 1. Obsess Over Services - This value determines whether or not Centerity Monitor will "obsess" over service checks results and run the obsessive compulsive service processor command you define. 2. Obsessive Compulsive Service Processor Command - This option allows you to specify a command to be run after every service check, which can be useful in distributed monitoring. This command is executed after any event handler or notification commands. 3. Obsessive Compulsive Service Processor Timeout - This is the maximum number of seconds that Centerity Monitor will allow an obsessive compulsive service processor command to be run. 4. Performance Data Processor Command Timeout - This is the maximum number of seconds that Centerity Monitor will allow a host performance data processor command or service performance data processor command to be run. 129

130 Chapter 11: Settings 130 Flap Detection 1. Enable Flap Detection - This option determines whether or not Centerity Monitor will try and detect hosts and services that are "flapping". Flapping occurs when a host or service changes between states too frequently, resulting in a barrage of notifications being sent out. 2. Low Service Flap Threshold - This option is used to set the low threshold for detection of service flapping. 3. High Service Flap Threshold - This option is used to set the high threshold for detection of service flapping. 4. Low Host Flap Threshold - This option is used to set the low threshold for detection of host flapping. 5. High Host Flap Threshold - This option is used to set the high threshold for detection of host flapping. Freshness 1. Check Service Freshness - This option determines whether or not Centerity Monitor will periodically check the "freshness" of service checks. 2. Service Freshness Check Interval - This setting determines how often (in seconds) Centerity Monitor will periodically check the "freshness" of service check results. SNMP Settings 1. Reset SNMP State - This option determines whether or not Policy Manager will reset all SNMP TRAPS services to status ok. Enable this function if you don't use retention state. 130

131 Chapter 11: Settings 131 SYSLOG Settings 1. Reset SYSLOG State - This option determines whether or not Policy Manager will reset all syslog services to status ok. Enable this function if you don't use retention state. Data Settings 1. Remove RRD data files - This option determines whether or not rrd data file will be removed upon service deletion. Note: If you choose not to enable file deletion and you add the service again, new data will be appended to the file. 2. History Data - This option determines whether or not history stored data will be removed. Select a period of time to keep historical data RESOURCE SETTINGS TAB This setting screen allows adding user-names and passwords for monitored hosts and services. All fields from $USER$3 are available. For secured credentials use fields $USER$20 - $USER$32 which hide the credentials text. DISTRIBUTED MONITORING TAB 1. Server name - Centerity Monitor distributed node name. 2. Enable distributed mode- Activate Centerity Monitor standard edition to act as node in enterprise distributed monitoring environment. Note: This feature require valid license in order to activate the monitor server in distributed environment with Centerity Monitor Enterprise edition. Please contact support team support@centerity.com for additional information. 3. Centerity Monitor Central Servers - Enter IP address or fully qualified domain name of Centerity Monitor enterprise console. Note: Multiple IPs can be specified and separated by comma. 131

132 Chapter 11: Settings 132 Security Settings 1. User Name - Enter username variable determines whether or not notification messages are logged. 2. Password- This variable determines whether or not Centerity Monitor will log passive host and service checks that it receives from the external command file. 3. Shared Secret- This variable determines whether or not Centerity Monitor will log passive host and service checks that it receives from the external command file. 4. Centerity Server Distributed Type - Activate Centerity Monitor Push / Pull distributed mode. 5. Monitor Server Instance - This feature allows you to run multiple copies of Centerity Monitor on the same machine. *Please consult Centerity Support team before editing this item* SYSTEM SETTINGS TAB Centerity Monitor allows you to manage the system without the need of any prior Linux knowledge. The system tab allows you to perform actions to the Centerity Server. 1. Start Monitor Server Restarts the monitor server and the associated processes. 2. Stop Monitor Server Stop the monitor server entirely. 3. Flush Hosts & Service Checks Removes all host and service monitor results and starts from the beginning. 4. Restart Monitor Server -Restarts the monitor server. CATEGORIES Note: Flush Hosts & Service Checks may require clicking the execute button more than once in order to flash the retention tables, and so the monitor server will not remember the last results. Through this tab you can manage the host categories for your monitor. 132

133 Chapter 11: Settings Name The category name. 2. Description The category description. 3. Comments Category comments. 4. Image A logo for the category. 5. Inventory Adds the category to a type of inventory scan. 6. Applet How to connect to the server in the monitor mode. IMPORT / EXPORT Through this tab you can import and export settings such as host profiles, database settings etc. 133

134 Chapter 11: Settings 134 Export: 1. Analyzers: Exports Graph analyzers: a. Single Analyzer: Allows export of a single analyzer. b. Multiple Analyzers: Allows selection of preferred analyzers. c. Output XML to Browser: Exports an XML output: d. Save file locally: exports a CSP file to local computer. 134

135 Chapter 11: Settings Graphs: Exports graphs + attached analyzers. a. Single Graph: Allows export of a single analyzer. b. Multiple Graphs: Allows selection of preferred analyzers. c. Output XML to Browser: Exports an XML output: d. Save file locally: exports a CSP file to local computer. 3. Host Information: Allows export of all host information on the Monitor: host name, alias, address, host template, parents. a. Output to the Browser: Exports a table of hosts: b. Save file locally: exports an EXCEL file to local computer. 135

136 Chapter 11: Settings Host Profile: Allows export of a host profile, including services and plugins. a. Output to the Browser: Exports an XML output: b. Save file locally: exports a CSP file to local computer. 5. Centerity Service Pack: Allows export of services including plugins. a. Single Service: Allows export of a single analyzer. b. Multiple Services: Allows selection of preferred analyzers. c. Output to the Browser: Exports an XML output: 136

137 Chapter 11: Settings 137 d. Save file locally: exports a CSP file to local computer. 6. Complete Database: Allows export of complete database settings. a. Output to the Browser: Exports an XML output. b. Save file locally: exports a DB file to local computer. Import: 1. Analyzers: Import Graph analyzers. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 2. Graphs: Import graphs + attached analyzers. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 3. Host Information: Import Host Information. a. Upload File: Allows import from EXCEL file. b. Paste data into browser: Allows pasting of Host Lists. 137

138 Chapter 11: Settings Host Profile: Allows import of a host profile, including services and plugins. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 5. Centerity Service Pack: Allows import of services including plugins. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 6. Complete Database: Allows import of complete database settings. a. Upload File: Allows import from DB file. b. Paste data into browser: Allows pasting of XML data. Note: Complete Database import will erase your current configuration! MEDIA MANAGER Through this tab you can add images and sounds to be used in the system. Adding an Image file: Admin Menu Settings - Media Manager press "+" to add new image Fill out name, description and select file Select proper category Save NOTE: Only GIF and PNG images are allowed. 138

139 Chapter 11: Settings Host: Used as host icons (Recommended: 40x40 resolution). 2. Service: Used as service icons (Recommended: 40x40 resolution). 3. Background Map: Can be used as map background. 4. Misc. images: Can be added to maps as an icon (Recommended: 40x40 resolution). Adding an Audio file: Audio files can be used as alert sounds for critical, warning etc. Admin Menu Settings - Media Manager Select "Sounds" as media type press "+" to add new sound Fill out name, description and select file Save 139

140 Chapter 11: Settings 140 TASK SCHEDULER The task scheduler can be used to schedule any action it can be an inventory scan, a script or a plugin that needs to be run on the monitor server without using crontab. Scheduling new event: 1. Click on the + sign to add a new schedule, and fill out the information on the general tab Name: Scheduler name Description: Scheduler description Category: Scheduler category Status: Enabled/Disabled Comments: Scheduler comments Task Details: Filled out automatically. 140

141 Chapter 11: Settings Settings: 2.1. Task run type: Select the desired task Select Task: Select from database: default, saved tasks Upload file: upload a script file Arguments: Additional arguments to the script/plugin Selected hosts: Host to execute the inventory/script/plugin on. 3. Triggers: 3.1. Time settings: Select time period hourly, daily, weekly, and monthly Select start time Select end time Select Timezone Task timeout: Select this option only if the task has to finish in a certain amount of time Scheduler settings: Choose how a task should be executed: wait for previous task to finish, run simultaneously etc. 4. Save. 141

142 Chapter 12: Graphs Configurations 142 Chapter 12: Graphs Configurations OVERVIEW Centerity Monitor provides powerful engine to produce verity of trends and time series data graphs. The value in these graphs differs from service to service and reflects the service performance. For example: CPU Usage in percentage Interface Traffic in Megabytes Disk Space in Gigabytes Services availability by returned value 0 or 1 such as power supplies and fans. Performance and Availability graphs will be automatically generated by Centerity collector which runs the following tasks: 1. Analyzer - engine which captures the Service check output information and analyzing the output according to predefined regular expressions disassemble the string to numerical values. 2. DB controller push the information to RRD files which are later can be viewed as graphs and if specified also to create raw data in Database datastore. 3. Graph Creator- building specific graph from the data sources that were captured and pushed to database and assigning it to the service. Mathematical functions and algorithms can be applied to specific graph such as calculation, division, summary and more. The mathematical functions uses HP RPN calculation format which all also described in appendix A. 142

143 Chapter 12: Graphs Configurations 143 GRAPH BUILDER METHODOLOGY In order to generate graph it is mandatory to define a service. For this example the Service Profile PING will be used (ping usually assigned to each host in order to measure Packet loss, Latency and availability). Monitor procedure 1. Centerity Monitor executes service checks to remote host either using Agent or Agent less methods. 2. The Plugin return data to the server and the data is being displayed in the web console. Several rules may execute according to the system settings such as Notifications, Event Handlers, Retry checks etc. 3. The Centerity Analyzer receives the data from the service check and match the regular expression database for the service PING. In the example below there is a regular expression of two (2) values - Packet loss and RTA : PING.*?(\d+)%.+?([.\d]+)\sms Explanation: If the output of the service is PING, than the first value will be applied to $1 is the first brackets and the second value applied to $2 will be the second bracket. The system allows to define any regular expression which available in programming languages such as C, PERL and more. 4. Graph settings allow you to visualize the data in your preferred display. Example Graph Result for service: PING 143

144 Chapter 12: Graphs Configurations 144 Creating Analyzer Rules Analyzer settings allows flexible capture of data from the plugin output. To create or edit rules follow these steps: Admin Menu > Reports> Analyzer "+" (Add New) Insert template properties Save Install Policy 1. From the admin menu Reports Analyzer 2. On the top right click + to add new analyzer 3. Set Template name and Template description.* 4. Select Template type in order to create search sorting more quickly from the main analyzer screen. 5. Paste the plugin output. For the PING Example paste the following data: PING OK - Packet loss = 0%, RTA = 0.05 ms 6. Presses analyze output to generate proper pattern match. NOTE: The analyzer produce pattern to match the rule of the plugin output. However, sometimes it requires some modifications such as removing characters like : or other nonalphanumeric special signs that can interfere the regular expression. For integer numbers the regular expression set the value (\d+) which mean capture complete number for number with fractions the regular expression is set to (\d+.?\d{0,}) which capture both numbers. Create Datasources depeding on how much (\d+) or (\d+.?\d{0,}) were found. 144

145 Chapter 12: Graphs Configurations Assign the capture entry while $1 represents the first entry, $2 the second etc. 8. Select the data source type. There are 4 available data sources: 8.1. GAUGE - Gauge data source represent values such as temperature, number of people in a room, CPU usage in percentage etc COUNTER - Counter is a data source that suitable for continuous incrementing counters such as the ifinoctets counter in a router. The COUNTER data source assumes that the counter never decreases, except when a counter overflows. The update function takes the overflow into account. The counter is stored as a per-second rate. When the counter overflows, RRDTool checks if the overflow happened at the 32bit or 64bit border and acts accordingly by adding an appropriate value to the result DERIVE - Derive data source used to store the derivative of the line sorting from the last to the current value of the data source. This can be useful for gauges. For example - to measure the number of people entering or leaving a room. Internally, derive works exactly like COUNTER but without overflow checks. So if your counter does not reset at 32 or 64 bit you might want to use DERIVE and combine it with a MIN value of ABSOLUTE - Absolute data source is suitable for counters which should be "reset" after the last value reading. This data-source should be used for fast counters which tend to overflow. Another usage is for counters such as number of messages since the last update. Note: It is recommended not to use special non-alphanumeric characters since the analyzer uses the name for internal usage. Paste the data whiteout white spaces in the start of the line or in the end of the line. 9. Data source Values It is not mandatory to create data sources for all entries. For example in the PING example if only the first value is required, than only one data source will be created and will be assigned to value "$1" An advanced option is to create a data source which executes mathematical calculation such as: "$1" * "$2" Other examples for optional mathetical functions: Memory value in Bytes can to be multiply by 1,000,000 (data source value should be $1 * 1000,0000) in order to be presented in Mega bytes Total memory used and memory free can be presented in data source ($1 + $2 ) * 1,000,

146 Chapter 12: Graphs Configurations 146 DISABLE GENERIC GRAPH CREATION By default Centerity Monitor uses 3 analyzer rules to capture unknown data and produce matched graphs. In some cases these rules does not apply to RRD files. It is recommended to disable Generic graph creation by going to the analyzer page selecting the 3 entries: DEFAULT 1 GUAGE DATA applies to 1 value in the plug-in output. DEFAULT 2 GUAGE DATA applies to 2 values in the plug-in output. DEFAULT 32 GUAGE DATA applies to 3 values in the plug-in output. And setting them to disable from the right bottom actions menu Creating Graph By default Centerity Monitor will display a basic graph with the time-frame of hourly, daily, weekly, monthly & yearly. Admin Menu > Reports> Graphs "+" (Add New) Insert Graphs General Setting Insert Graphs properties Setting Save To add a new graph or modify existing graph follow the instructions below: 1. From the admin menu --> reports --> Graphs --> add ("+" Button) 146

147 Chapter 12: Graphs Configurations General Graph Settings - Insert the graphs information 2.1. Garph name 2.2. Graph Description 2.3. Graph type Graph title 2.5. Vertical lables 2.6. Enable / Disable Graph 2.7. Comments 3. Using Macros - You can change the Graph title and the Vertical Label to to your needs using macros: $HOSTNAME$ - The hostname. $HOSTADDRESS$ - The host address. $HOSTALIAS$ - The host description. $SERVICENAME$ - The service name. $SERVICEDESC$ - The service description. $SERVICETEMPLATE$ - The Service Porfile. For Example: 4. Properties Tab 4.1. Graph format PNG format Graph Height the height of the graph. 147

148 Chapter 12: Graphs Configurations Graph Width the width of the graph Hrule / Vrule Legend - Force the generation of HRULE and VRULE legends even if those HRULE or VRULE will not be drawn because out of graph boundaries 4.5. X Grid Settings - The grid is defined by specifying a certain amount of time in the?tm positions. Optional time-frames are SECOND, MINUTE, HOUR, DAY, WEEK, MONTH or YEAR. This pair (?TM:?ST) needs to be specified for the base grid (G??), the major grid (M??) and the labels (L??). For the labels you also must define a precision in LPR and a strftime format string in LFM. LPR defines where each label will be placed. If it is zero, the label will be placed right under the corresponding line (useful for hours, dates etcetera). If you specify a number of seconds here the label is centered on this interval (useful for Monday, January etcetera). Example: MINUTE:10:HOUR:1:HOUR:4:0:%X 4.6. Y Grind Settings - -axis grid lines appear at each grid step interval. Labels are placed every label factor lines. You can specify -y none to suppress the grid and labels altogether. The default for this option is to automatically select sensible values Alterntate Y Grid - Place the Y grid dynamically based on the graph's Y range. The algorithm ensures that you always have a grid, that there are enough but not too many grid lines, and that the grid is metric. That is the grid lines are placed every 1, 2, 5 or 10 units. This parameter will also ensure that you get enough decimals displayed even if your graph goes from to No Minor grid lines In order to avoid anti-aliasing blurring effects RRDTool snaps points to device resolution pixels, these results in a crisper appearance. If this is not to your liking, you can use this switch to turn this behavior off Auto Scale Options Auto Scale - Sometimes the default algorithm for selecting the y-axis scale is not satisfactory. Normally the scale is selected from a predefined set of ranges and this fails miserably when you need to graph something like * sin(x). This option calculates the minimum and maximum y-axis from the actual minimum and maximum data values. Our example would display slightly less than to slightly more than Logartimic Auto Scale - Logarithmic y-axis scaling Alt Autoscale - will modify both the absolute maximum AND minimum values, this option will only affect the minimum value. The maximum value, if not defined on the command line, will be 0. This option can be useful when graphing router traffic when the WAN line uses compression, and thus the throughput may be higher than the WAN line speed Alt Auto scale Max - will modify both the absolute maximum AND minimum values, this option will only affect the maximum value. The minimum value, if not defined on the command line, will be 0. This option can be useful when graphing router traffic when the WAN line uses compression, and thus the throughput may be higher than the WAN line speed Auto Padding - support to make sure graph legend text lines up. 148

149 Chapter 12: Graphs Configurations Rigid Bounderis - Auto scaling will still permit those boundaries to be stretched unless the rigid option is set Base Value - If you are graphing memory (and NOT network traffic) this switch should be set to 1024 so that one Kb is 1024 byte. For traffic measurement, 1 kb/s are 1000 b/s Units Value - With this option y-axis values on logarithmic graphs will be scaled to the appropriate units (k, M, etc.) instead of using exponential notation. Note that for linear graphs, SI notation is used by default Upper Limit limits the graph to certain height* Lower Limit limit the graph from what number to start Units Length - How many digits should RRDTool assume the y-axis labels to be? You may have to use this option to make enough space once you start fiddling with the y-axis labeling Options additonal settings that available to RRDTool graph option. More information can be found on appendix C. Note: in order to set a graph to start at "0" set the value: l=0 5. Positiioning the graph Datasources After saving the general and properties settings a new tab will be generated. Thid tab contains the data sources that applied to the graph. The datasource order is layered the first one (1) will be the background bottom value, and the last ones will be on top. Example - Memory Usage graph with three values: (1) Total Memory (2) Used Memory and percentage value that will be displayed at the bottom of the graph. The output of this graph: 149

150 Chapter 12: Graphs Configurations Adding Data sources to Graph Data source contains all the information that was pushed from the analyzer function and can papulates the graph with data. There are several data source and advanced functunallity: 6.1. Data Source select the data source to appear in the graph and that has been defined in the analyzer settings Color select the color of the Data source in the graph. Only applies if the data source is not legend or comment or any other none graphical element specifed in graph type Graph Type AREA draw line and the area between the x-axis and the line will be filled COMMENT general text to add to the legend GPRINT print the values of the specfieid data source in the legend HRULE - Draw a horizontal line at value. HRULE acts much like LINE except that will have no effect on the scale of the graph LEGEND prints legend of the current data source LINE1 - Draw a line of the specified width onto the graph LINE2 - Draw a line of the specified width onto the graph Ticker line LINE3 - Draw a line of the specified width onto the graph the tickets line PRINT similar to GPRINT SHIFT shift the graph time frame. you can specify an offset of ( 7*24*60*60 = ) 604'800 seconds to "look back" one week STACK - STACK modifier is used, this line is stacked on top of the previous element which can be a LINE or an AREA TICK - Plot a tick mark (a vertical line) for each value of vname that is non-zero and not *UNKNOWN* VRULE - Draw a vertical line at time Consilidation Function- general function to apply to the data source 150

151 Chapter 12: Graphs Configurations AVERAGE average value of the data source MIN - the minium value in the time range specified of the data source MAX - - the maximum value in the time range specified of the data source CURRENT the last value that was pushed to the RRD database. In addition to the aggregate functions, there are a set of specialized functions that enable RRDtool to provide data smoothing (via the Holt-Winters forecasting algorithm), confidence bands, and the flagging aberrant behavior in the data source time series data source types HWPREDICT,SEASONAL,DEVPREDICT,DEVSEASONAL,FAILURES applied to this function. Additional information can be found on Centerity Support website CDEF / VDEF Function the mathematical function to apply to the data source: Gprint Exact Numbers print the exact numbers from the Database Load Average- compute load average ( usually non integer numbers) of the data source Insert New Line insert new line in the legend 6.7. HRULE / VRULE Value sets the HRULE / VRULE value to print in the graph Text Format the text format that will appear in the legend for example if your data source is called load1min. you can use this settting to set the Legend Called: Load Average 1 Min RRA Name this sets the Data source name when computing mathemitical funtions Opacity control the opacity of the AREA, LINE1, LINE2, LINE3 it is usefull if you want to make a data source semi transparent. Note: default RRA name are abc1, abc2, abcn for every data source available in the graph. 151

152 Chapter 12: Graphs Configurations 152 Note: if specified none value in the HRULE / Vrule Value and in the Text Format it will remove the current data source print from the legend it is usefull if you want to add additional lines surrounding specific area. Note: Cannot generate Graph error message means that the graph contains unavailable data sources. 152

153 Chapter 12: Graphs Configurations 153 Mathematical RPN Functions Centerity provides the powerful ability to perform all sorts of calculations on the data retrieved from its databases 1. Name: Describe the function 2. Function Type: Sets the function to use on the mathematical algorithm 2.1. CDEF -When retrieving data from an RRD, you are using a "DEF" to work with that data. Think of it as a variable that changes over time (where time is the x-axis). The value of this variable is what is found in the database at that particular time and you can't do any modifications on it. This is what CDEFs are for: they takes values from DEFs and perform calculations on them. For CDEF instructions, the stack is processed for each data point on the graph 2.2. VDEF - VDEF are just like CDEF but the instructions work on an entire data set in one run. Note, that currently VDEF instructions only support a limited list of functions 3. Function Name - if you use more than one CDEF / CDEF function on the same graph. Or using nested functions for example one function calls other multiplication. 4. Function -RPN calculator that uses a stack and push your data onto this stack. Whenever you execute an operation, it takes as many elements from the stack as needed. Pushing is done implicitly, so whenever you specify a number or a variable, it gets pushed onto the stack automatically. 153

154 Chapter 12: Graphs Configurations 154 ASSIGNING GRAPH TO SERVICE To assign new graph template to service follow these steps: 1. From the admin menu choose a Host and edit the service. 2. Enter the tab "Extended". 3. Select graph from the list of graphs. 4. Save the Service. The new graph can be displayed from this menu by pressing the graph Icon or by editing the service and pressing Preview Graph button. The preview button only applies to Services that already exist and have RRD files created and you only want to change the graph type. In order to preview the graph you need to save the service first and re edit. In order to apply the new settings to Service Template follow the steps above but apply them to Service template and when adding the service to new host it will inherit the graph settings from the template. Note: Changing graph to service does not require install policy and it is being applied immediately. 154

155 Chapter 12: Graphs Configurations 155 AVAILABILITY GRAPHS When enabling raw data archiving (see command line settings) Centerity Monitor produces statistical availability graph that show the graph availability and summary according to the raw data period. The raw data period is being set from the admin menu under settings and choosing the Other tab the last raw control the amount of time to save the information : Weekly, Monthly, Quarterly Half Yearly, and Yearly. Note: By default Centerity Saves the information for 7 days. This period of time can be adjusted in the setting tab. 155

156 Chapter 13 - Reports and Report Scheduler 156 Chapter 13 - Reports and Report Scheduler REPORTS OPTION Centerity Monitor provides wide range of professional built-in reports. Each report can be saved or to be generated in HTML format and most of the reports can be produced in PDF and / or excel formats. 1. Availability Report This report provides in-depth visibility into the availability of any service, host, host-group or even business service. The report will calculate the total availability of the selected object/s over the selected time frame. It can also calculate availability per service profile type, comparing between different hosts. The report wizard includes the following options: 156

157 Chapter 13 - Reports and Report Scheduler Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Service /Group: Host/Hosts availability Service/ Services availability Host group availability Service group availability (BSM) Profile Perspective: Allows availability by selected service profile: Service: Displays the service profile within hosts Service Group: Displays the service profile within service views Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above Report Time Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/service Calculate Service Uptime: The report will display current uptime for this host Assumed Initial Host State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the host/service. Default value is Current State Assume Service State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the host/service. Default value is Current State. 157

158 Chapter 13 - Reports and Report Scheduler State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications Assume States During Program Downtime: If Centerity Monitor is not running for some time during a report period this will assume states for hosts and services during the downtime. Example of last 7 days hosts report: 2. Event Level Report The event level report shows period averages and host events in calendric view Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Service /Group: Host/Hosts availability Service/ Services availability Host group availability Service group availability (BSM) Profile Perspective: Allows availability by selected service profile: Service: Displays the service profile within hosts Service Group: Displays the service profile within service views. 158

159 Chapter 13 - Reports and Report Scheduler Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above Report Time Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/service Calculate Service Uptime: The report will display current uptime for this host Assumed Initial Host State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the host/service. Default value is Current State Assume Service State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the host/service. Default value is Current State. 159

160 Chapter 13 - Reports and Report Scheduler History Report The history report presents detailed information about historical states of any element in the system with several of options. This report can be saved as PDF and to be sent automatically by Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Service /Group: Host/Hosts availability Service/ Services availability Host group availability Service group availability (BSM) Profile Perspective: Allows availability by selected service profile: Service: Displays the service profile within hosts Service Group: Displays the service profile within service views Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, 160

161 Chapter 13 - Reports and Report Scheduler 161 the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications Alerts: Host alert/service alerts Host Alert Types: The host alert types that will be displayed in the report Service Alert Types: The service alert types that will be displayed in the report Hide Process Messages: Hides all process messages. Example of history report: 161

162 Chapter 13 - Reports and Report Scheduler Inventory Report Inventory report shows all available inventory information on hosts such as OS information, hardware information, software details and more. This report depends on inventory scan, hosts that were not scanned properly will appear blank Report type - there are 2 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host/Hosts availability Host group availability 4.2. Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Categories: General Information: IP address, host type, group and alias Administrative Information: All general information, topology, OS information, monitoring information, hardware supplier information and any user defined information Services Information: All services on the host and their state Software Information: All programs installed on this host System Information: System, domain, hardware, OS and location details Hardware Information: Bios, processor, memory, disks and network details Process Information: Running processes on the host. 162

163 Chapter 13 - Reports and Report Scheduler Custom Report: Allows you to select specific information you want from the host such as: OS Name, Domain, Host ID, etc Search Report: Allows you to define a search for a specific detail such as software, serial number, etc. 163

164 Chapter 13 - Reports and Report Scheduler Inventory Summary Report Summary inventory report can display how much of a certain software is installed on the environment, operating system etc. This report depends on inventory scan, hosts that weren't scanned properly will appear blank Report type - there are 2 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host/Hosts availability Host group availability 5.2. Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Select various settings for your report Custom Report: Allows you to select specific information you want from the host such as: OS Name, Domain, Host ID, etc Search Report: Allows you to search for a specific detail within all hosts, such as software, serial number, etc. 164

165 Chapter 13 - Reports and Report Scheduler SNMP Traps Report SNMP Traps Report will display all SNMP trap history. It allows searching within the trap history and time period selection Search: Allows searching within the SNMP traps history, by this criteria: Search by hosts, services, MIB name, output and severity Search by status Ok/Warning/Critical/Unknown Search by keywords 6.2. Report Time Period: What Schedule Time Period the report is created for. Click "Search" to display the report. 7. Syslog Report 165

166 Chapter 13 - Reports and Report Scheduler 166 Syslog Report Displays all syslog history, and allows search and log filtering within the history Search: Allows searching within the syslog history, by this criteria: Search by hosts, services and output Search by status Ok/Warning/Critical/Unknown Search by keywords Search by syslog facility Search by severities critical/alert/debug etc Report Time Period: What Schedule Time Period the report is created for. Click "Search" to display the report. 8. Summary Report 166

167 Chapter 13 - Reports and Report Scheduler 167 Generic reports about host and service alert data, including alert totals, top alert producers, etc Report Types: Standard report - Uses all hosts Custom report Customize hosts Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected Top Alerters: Choose the report: Top alert producers Displays top 10 alert producers Less alert producers Displays bottom 10 alert producers Most recent alerts Displays most recent alerts Report Type: Display host alerts or service alerts Number of alerts: The limit of alerts to display. 167

168 Chapter 13 - Reports and Report Scheduler Charts Report Charts report can display graph history in a selected time period. 9.1 Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Service /Group: Host/Hosts availability Service/ Services availability Host group availability Service group availability (BSM) Profile Perspective: Allows availability by selected service profile: Service: Displays the service profile within hosts Service Group: Displays the service profile within service views Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected. 168

169 Chapter 13 - Reports and Report Scheduler

170 Chapter 13 - Reports and Report Scheduler Trends Report Trends report displays a top 10 list of service-alerts, and a graph that compares the same service profile on different hosts Select which service profile you wish to compare Select the hosts that monitor this service profile Select various settings for your report: Select Data Sources: This depends on the report analyzers for the service, if there isn't an analyzer that fits this service check, no data sources will appear and you will not be able to generate a report Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date: Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date: Specify End Date if CUSTOM REPORT PERIOD was selected above. 11. Uptime Report 170

171 Chapter 13 - Reports and Report Scheduler 171 Shows the uptime of host groups, service groups, hosts and services during a selected period of time Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Service /Group: Host/Hosts availability Service/ Services availability Host group availability Service group availability (BSM) Profile Perspective: Allows availability by selected service profile: Service: Displays the service profile within hosts Service Group: Displays the service profile within service views Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected Report Time Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/service Calculate Service Uptime: The report will display current uptime for this host Assumed Initial Host State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the host. Default value is UP. 171

172 Chapter 13 - Reports and Report Scheduler Assume Service State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the service. Default value is OK. 12. Usage Summary Report This report is recommended for service groups (BSMs), it displays all usage summary for each service group divided to Level, and it displays all level failures and their effect on the other levels in the service group Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 172

173 Chapter 13 - Reports and Report Scheduler Host / Service /Group: Service/ Services availability Service group availability (BSM) Profile Perspective: Allows availability by selected service profile: Service: Displays the service profile within hosts Service Group: Displays the service profile within service views Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Select the Service or Service Group for the report Select various settings for your report Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above Report Time Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/service Show Extended Information: Gives a more detailed report, with smaller time period statistics Show Stack Graph: Displays a stack for each part of the chosen service view (available only for service views) Use State Value as [Ok]: Choose thresholds to be stated ok in the report. The defaults are: Warning 50 (Treat soft warning events as Ok). Critical - 0 (treat all critical events as critical). Unknown 100 (Treat all unknown events as Ok) Assume Service State: If there is no information about the host or service in the current log file, Centerity Monitor can assume status of the host/service. Default value is Current State State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications. 173

174 Chapter 13 - Reports and Report Scheduler

175 Chapter 13 - Reports and Report Scheduler Utilization Report Shows top 10 highest/lowest alerts producers Select the service template for the report Select if highest or lowest values, and how many hosts to display 5, 10, 15, etc Select various settings for your report: Select Data Sources: This depends on the report analyzers for the service, if there isn't an analyzer that fits this service check, no data sources will appear, but you can still generate the report Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 175

176 Chapter 13 - Reports and Report Scheduler 176 CREATING A NEW REPORT TEMPLATE 1. Select from the main menu Monitor->Reports view, and select the desired report. 2. Fill the required parameters for the report. 3. Click the Save report Button at the bottom-right pan 4. A popup window will be opened at the center of the screen. Fill the required parameters: 4.1. Report-Name 4.2. Description 176

177 Chapter 13 - Reports and Report Scheduler 177 CREATING A NEW SCHEDULED REPORT 1. Select from the main menu Admin->Reports view, and select Scheduled Reports Note: This window enables you to manage scheduled reports, and will be described in details in the next section. 2. Click on Add label, placed in the top-right of the screen. 3. New schedule window will be displayed, containing 2 tabs: General & Schedule 3.1. In the General Tab fill the required parameters and select the desired Template to be scheduled In the Schedule Tab define the required schedule and timing for the report to be sent. Note: These parameters represents the period that the scheduled-reports will be execute and attendees. 4. Click the Save Button at the bottom-right 177

178 Chapter 13 - Reports and Report Scheduler 178 EDITING REPORT TEMPLATE 1. Select from the main menu Monitor->Reports->Saved Reports 2. Select the desired report-template to be edited by clicking on the report name. 3. A new window will open containing 2 tabs: General & Template tabs: 3.1. In General tab edit the Name and Description of the template 3.2. Also, you can edit the template permissions: - Admin members can view and edit the report. - View members can view the report only. 178

179 Chapter 13 - Reports and Report Scheduler In Template tab- Edit the reports parameters 4. After editing, click on Save button. REMOVE REPORT TEMPLATE 1. Select from the main menu Admin->Reports view, and select Saved Reports 2. Click on the checkbox attached to the selected report-templates 3. Select Delete option and click on the Apply button to complete process. 179

180 Chapter 13 - Reports and Report Scheduler 180 MANAGING REPORT TEMPLATES 1. Select from the main menu Admin->Reports->Saved Report. 2. Select the desired report-templates by clicking on the checkbox attached to them. 3. Choose the desired operation from the combo-box: Enable/Disable/Delete. 4. Click on Apply button to execute the operation. 5. A confirmation popup window will be displayed: EDIT SCHEDULED REPORTS 1. Select from the main menu Admin->Reports->Scheduled Reports and click on the selected scheduled report. 2. A new window will open containing two tabs: General & Schedule *Editing is the same functionality as New Schedule 3. After appending all changes click on Save button to complete update. MANAGE SCHEDULED REPORTS 1. Select from the main menu Admin->Reports->Scheduled Reports 2. Select the scheduled-reports by clicking on the checkbox attached to them. 3. Choose the desired operation from the combo-box: Enable/Disable/Delete. 4. Click on Apply button to execute the operation. 5. A confirmation popup window will be displayed. SETTING REPORT SCHEDULER MAIL SERVER Please refer to Mail Settings on page

Centerity Monitor Standard V3.8 USER GUIDE VERSION 7.14

Centerity Monitor Standard V3.8 USER GUIDE VERSION 7.14 Centerity Monitor Standard V3.8 USER GUIDE VERSION 7.14 2 Contents About This Guide... 4 End-User License Agreement (EULA)... 4 Before You Begin... 4 Audience... 4 Related Documentation... 4 Chapter 1:

More information

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 9.15

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 9.15 Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 9.15 2 Contents About This Guide... 4 End-User License Agreement (EULA)... 4 Before You Begin... 4 Audience... 4 Related Documentation... 4 Technical

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Konica Minolta s Optimised Print Services (OPS)

Konica Minolta s Optimised Print Services (OPS) Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server StarWind iscsi SAN Software: Using StarWind with VMware ESX Server www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this

More information

Introduction to Junos Space Network Director

Introduction to Junos Space Network Director Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

PrintSuperVision 4.0. Enterprise and Professional Editions. Installation, Configuration and Users Guide

PrintSuperVision 4.0. Enterprise and Professional Editions. Installation, Configuration and Users Guide PrintSuperVision 4.0 Enterprise and Professional Editions Installation, Configuration and Users Guide V. 1.0 1 January 2014 Contents Introduction... 6 What s New in Version 4.0... 7 Installing the Software...

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3

NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3 NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

Network Monitoring User Guide

Network Monitoring User Guide Network Monitoring User Guide 2007 Belkin Corporation. All rights reserved. F1DUXXX All trade names are registered trademarks of respective manufacturers listed. Table of Contents Pulse TM Overview 1 Pulse

More information

Quick Start - Virtual Server idataagent (VMware)

Quick Start - Virtual Server idataagent (VMware) Page 1 of 24 Quick Start - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data Minimal

More information

vcenter Operations Manager for Horizon Supplement

vcenter Operations Manager for Horizon Supplement vcenter Operations Manager for Horizon Supplement vcenter Operations Manager for Horizon 1.6 This document supports the version of each product listed and supports all subsequent versions until the document

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

WhatsUp Gold 2016 Getting Started Guide

WhatsUp Gold 2016 Getting Started Guide WhatsUp Gold 2016 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 5 STEP 1: Prepare

More information

VMware vcenter Operations Manager Administration Guide

VMware vcenter Operations Manager Administration Guide VMware vcenter Operations Manager Administration Guide Custom User Interface vcenter Operations Manager 5.6 This document supports the version of each product listed and supports all subsequent versions

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

PerleVIEW Device Management System User s Guide

PerleVIEW Device Management System User s Guide PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Windows Server 2012 Server Manager

Windows Server 2012 Server Manager Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities

More information

How To Get Started With Whatsup Gold

How To Get Started With Whatsup Gold WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 31 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices. About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes,

More information

SapphireIMS Business Service Monitoring Feature Specification

SapphireIMS Business Service Monitoring Feature Specification SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

IntraVUE Plug Scanner/Recorder Installation and Start-Up

IntraVUE Plug Scanner/Recorder Installation and Start-Up IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details

More information

vrealize Operations Manager Customization and Administration Guide

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until

More information

Using the Cisco OnPlus Scanner to Discover Your Network

Using the Cisco OnPlus Scanner to Discover Your Network Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Getting Started. Version 9.1

Getting Started. Version 9.1 Getting Started Version 9.1 Contents About this Guide 4 Other Resources 4 Product Documentation 4 Online Training Program 4 Daily Online Q & A sessions 4 Prepare Your Customer's Network 5 Create a Probe

More information

OnCommand Performance Manager 2.0

OnCommand Performance Manager 2.0 OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

BMC FootPrints Asset Core - Asset Discovery. Version 11.7

BMC FootPrints Asset Core - Asset Discovery. Version 11.7 BMC FootPrints Asset Core - Asset Discovery Version 11.7 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2013 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are

More information

Paragon Protect & Restore

Paragon Protect & Restore PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Email sales@paragon-software.com Product website : www.protect-restore.com

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

SapphireIMS 4.0 BSM Feature Specification

SapphireIMS 4.0 BSM Feature Specification SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

2XApplication Server XG v10.6

2XApplication Server XG v10.6 2XApplication Server XG v10.6 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

PREFACE http://www.okiprintingsolutions.com 07108001 iss.01 -

PREFACE http://www.okiprintingsolutions.com 07108001 iss.01 - Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information

More information

Getting Started with PRTG Network Monitor 2012 Paessler AG

Getting Started with PRTG Network Monitor 2012 Paessler AG Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Deployment and Configuration Guide

Deployment and Configuration Guide vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.6 (v11.6) Document Date: August 2015 www.goliathtechnologies.com

More information

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g

More information