IBM Tivoli Monitoring Installation and Setup Guide
IBM Tivoli Monitoring Installation and Setup Guide
Version 6.1.0
GC32-9407-00
Tivoli IBM Tivoli Monitoring
®
Version 6.1.0
GC32-9407-00
Note
Before using this information and the product it supports, read the information in Appendix I, “Notices,” on page 253.
Contents v
itmcmd support . . . . . . . . . . . 229 Removing an agent through the Tivoli
itmcmd server . . . . . . . . . . . . 231 Enterprise Portal . . . . . . . . . . . 247
SetPerm . . . . . . . . . . . . . . 232 Uninstalling the Warehouse Proxy . . . . . . 247
IBM Tivoli Enterprise Console commands . . . . 233 Removing the ODBC data source connection 247
sitconfig.sh . . . . . . . . . . . . . 234 Uninstalling the IBM Tivoli Enterprise Console
sitconfsvruser.sh . . . . . . . . . . . 236 event synchronization . . . . . . . . . . 248
upg_sentry_baroc.pl . . . . . . . . . . 237
upg_tec_baroc.pl . . . . . . . . . . . 238 Appendix H. Support information . . . 249
Searching knowledge bases . . . . . . . . . 249
Appendix F. Maintaining the EIB on Searching the information center . . . . . . 249
Linux or UNIX . . . . . . . . . . . 239 Searching the Internet . . . . . . . . . 249
Obtaining fixes . . . . . . . . . . . . . 249
Appendix G. Uninstalling IBM Tivoli Receiving weekly support updates . . . . . . 250
Contacting IBM Software Support . . . . . . 250
Monitoring . . . . . . . . . . . . 241 Determining the business impact . . . . . . 251
Uninstalling the entire IBM Tivoli Monitoring Describing problems and gathering information 252
environment . . . . . . . . . . . . . . 241 Submitting problems . . . . . . . . . . 252
Uninstalling the environment on Windows . . 241
Uninstalling the environment on Linux or UNIX 243
Uninstalling an individual IBM Tivoli Monitoring
Appendix I. Notices . . . . . . . . . 253
agent or component . . . . . . . . . . . 244 Trademarks . . . . . . . . . . . . . . 254
Uninstalling a component on Windows . . . . 244
Uninstalling a component on Linux or UNIX 245 Index . . . . . . . . . . . . . . . 255
Uninstalling OMEGAMON agents . . . . . 245
Publications
This section lists publications in the IBM Tivoli Monitoring library. It also describes
how to access Tivoli publications online and how to order Tivoli publications.
http://publib.boulder.ibm.com/tividd/glossary/tivoliglossarymst.htm
The IBM Terminology Web site consolidates the terminology from IBM product
libraries in one convenient location. You can access the Terminology Web site at the
following Web address:
http://www.ibm.com/ibm/terminology
http://www.ibm.com/software/tivoli/library/
Click the Tivoli product manuals link. In the Tivoli Technical Product Documents
Alphabetical Listing window, click M to access all of the IBM Tivoli Monitoring
product manuals.
Note: If you print PDF documents on other than letter-sized paper, set the option
in the File → Print window that allows Adobe Reader to print letter-sized
pages on your local paper.
The IBM Software Support Web site provides the latest information about known
product limitations and workarounds in the form of tech notes for your product.
You can view this information at the following Web site:
http://www.ibm.com/software/support
http://www.elink.ibmlink.ibm.com/public/applications/
publications/cgibin/pbi.cgi
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate most features of the graphical
user interface.
For additional information, see the Accessibility Appendix in the user’s guide for
this product.
http://www.ibm.com/software/tivoli/education/
Support information
Appendix H, “Support information,” on page 249 describes the following options
for obtaining support for IBM products:
v “Searching knowledge bases” on page 249
v “Obtaining fixes” on page 249
v “Contacting IBM Software Support” on page 250
Typeface conventions
This guide uses the following typeface conventions:
Bold
v Lowercase commands and mixed case commands that are otherwise
difficult to distinguish from surrounding text
v Interface controls (check boxes, push buttons, radio buttons, spin
buttons, fields, folders, icons, list boxes, items inside list boxes,
multicolumn lists, containers, menu choices, menu names, tabs, property
sheets), labels (such as Tip:, and Operating system considerations:)
In addition to the special characters, Tivoli command syntax uses the typeface
conventions described in “Typeface conventions” on page xiii. The following
example illustrates the typeface conventions used in Tivoli command syntax:
The start|stop and {pc|all} parameters are the only required parameters for the
itmcmd agent command. The brackets around the -l, -h, -o, -p, -c, and -s
parameters indicate that they are optional. The braces around {pc|all} indicate that
you must either specify a product code (pc) or choose to start or stop all
components.
You can use IBM Tivoli Monitoring to perform the following tasks:
v Visualize real-time monitoring data from your environment
v Monitor resources in your environment for certain conditions, such as high CPU
or an unavailable application
v Establish performance thresholds and raise alerts when thresholds are exceeded
or values are matched
v Trace the causes leading up to an alert
v Create and send commands to systems in your managed enterprise by means of
the Take Action feature
v Use integrating reporting to create comprehensive reports about system
conditions
v Monitor conditions of particular interest by defining custom queries using the
attributes from an installed agent or from an ODBC-compliant data source
Upgrading from Tivoli Distributed Monitoring: The new IBM Tivoli Monitoring
is not dependant on the Tivoli Management Framework. An upgrade toolkit is
provided to facilitate your move from a Tivoli Distributed Monitoring environment
to the new IBM Tivoli Monitoring.
For information, see IBM Tivoli Monitoring: Upgrading from Tivoli Distributed
Monitoring.
Upgrading from OMEGAMON V350 and V360: Migration tools are provided to
facilitate the upgrade process to IBM Tivoli Monitoring. You can upgrade custom
situations, policies, and queries, and the historical data in your data warehouse.
Many of the existing OMEGAMON V350 and V360 agents have equivalent IBM
Tivoli Monitoring agents. For any that do not yet have an IBM Tivoli Monitoring
counterpart, you can continue to monitor those agents in your new IBM Tivoli
Monitoring environment.
IBM Tivoli Monitoring 5.x interoperability: Using the IBM Tivoli Monitoring 5.x
Endpoint agent, you can view data from IBM Tivoli Monitoring 5.x resource
models in the Tivoli Enterprise Portal and warehouse granular data in the Tivoli
Data Warehouse. You can use this visualization to replace the Web Health Console
used in IBM Tivoli Monitoring V5.1. For information about using this visualization,
see the IBM Tivoli Monitoring: IBM Tivoli Monitoring 5.x Endpoint Agent User’s Guide.
You can also view events on the Tivoli Enterprise Console through your Tivoli
Enterprise Portal.
IBM Tivoli Monitoring also provides a customizable agent called the Universal
Agent. You can use the Universal Agent to monitor any data that you collect in
your environment. For example, you can use the Universal Agent to monitor the
status of your company Web site to ensure that it is available. For more
information about the Universal Agent, see the IBM Tivoli Monitoring Universal
Agent User's Guide.
The Tivoli Data Warehouse uses the Warehouse Proxy agent to move data from the
Tivoli Enterprise Portal Server to the data warehouse database. For information
about configuring the Warehouse Proxy, see Chapter 11, “Configuring the
Warehouse Proxy for the Tivoli Data Warehouse,” on page 145.
For information about the various configurations of monitoring servers and event
servers that you can have in your environment, see “Planning the deployment of
your IBM Tivoli Enterprise Console integration” on page 86.
The Tivoli Enterprise Console product significantly reduces the number of events
displayed, enabling you to focus on the most critical, relevant events and manage
even the largest, most complex environments. The Tivoli Enterprise Console
product gives you the extensive control and flexibility that you need to manage
and maintain availability across your enterprise. Managing situation events with
the Tivoli Enterprise Console product gives you the following advantages:
v Aggregation of event information from a variety of different sources including
those from other Tivoli software applications, Tivoli partner applications, custom
applications, network management platforms, and relational database systems
v Pre-configured rules that automatically provide best-practices event management
v Persistence and processing of a high volume of events in an IT environment by:
– Prioritizing events by their level of importance
– Filtering redundant or low priority events
– Correlating events with other events from different sources
– Root cause analysis and resolution
– Initiating automatic corrective actions, when appropriate, such as escalation
v Unified system and network management by automatically performing the
following event management tasks:
– Correlating the status of a system or application to the status of the network
that it uses
– Determining if the root cause of a system or application problem is an
underlying network failure
Understanding the following conditions accelerates your design efforts and ensures
that the solution performs as expected:
v A thorough and accurate picture of your networking environment.
v The business goals for system monitoring in your environment and how Tivoli
applications can achieve those goals.
The number of factors that need to be considered and their influence on the
architecture varies for each organization. Viewing these factors from both a
physical and organizational perspective offers a way to arrange factors into
manageable groups.
The factors below, ordered by priority, are not a comprehensive list. Additional
factors might be important in your environment.
Physical Perspective
The following sections provide information about the physical perspective for a
monitoring environment.
Organizational perspective
Prepare a list of organizational factors that might have an impact on the
deployment. Include details about the following considerations:
v Organizational objective, business processes, IT processes, business needs, and
future plans. This aspect has a great impact in the design process and needs to
be looked at carefully from a physical perspective.
v Amount of growth anticipated for the environment. The growth could be in
terms of an increase in the number of monitored systems within existing
infrastructure or due to setting up of new offices.
v Internationalization considerations.
v Primary risks to this project.
v Number and responsibilities of existing system administrators.
v Major impediments to the IT service your organization offers.
v Immediate problems you are trying to solve with the deployment of IBM Tivoli
Monitoring.
v Your immediate and long-term goals.
However, as the size of your environment grows, so does the load of data to be
processed, which can negatively impact performance. The following sections
provide information to help you plan your environment, based on the number of
agents and monitoring servers in your environment and the types of monitoring
that you want to do.
A basic guideline for determining when to add remote monitoring servers to your
environment is the number of agents that you want to support. Each remote
monitoring server can support up to 500 agents (depending on the type of agent
and the data load). So, if you have 1000 agents in your environment, deploy one
hub monitoring server and two remote monitoring servers, each with 500 agents
reporting to them.
Note: Remember that a single managed system can include several agents such as
an Operating System agent (Windows, UNIX, or Linux) and an application
agent like the DB2 agent. For this reason, be sure to count the actual agents
to be supported and not managed systems.
For environments with more than 5000 agents, use multiple remote hub monitoring
servers. Using the basic guideline of 5000 agents per hub monitoring server and
500 agents per remote monitoring server, an environment with 25 000 agents might
use 5 hub monitoring servers each with 10 remote monitoring servers.
In addition to the number of agents, you need to also consider the type of agents
that you are supporting and what you choose to monitor with those agents. While
each monitoring server can support 500 agents, this number decreases if the agents
that you are supporting are more complex (a non-OS agent generates more data
than an OS agent), if you are collecting historical data for most attribute groups, or
if you are using complex situations. If this is the case in your planned deployment,
consider using fewer than 500 agents per monitoring server (and fewer than 5000
per hub) to ensure fast response time.
You might also choose to deploy remote monitoring servers for each type of agent
that you are supporting. For example, if you are monitoring a number of DB2
instances across your environment, you can have all of those agents communicate
with a single remote monitoring server.
Note: Only a hub monitoring server can have a Tivoli Enterprise Portal Server
attached to it.
v Determine where you want to run the user interface to look at data and interact
with the system. This is where you install the portal server and portal client.
v Determine your need for continuous operation in your environment. If you need
continuous operation, consider using the Hot Standby feature to ensure the
availability of your monitoring servers.
Security considerations
Firewalls and NAT translation require additional configuration steps (see
Chapter 3, “Planning the installation of your environment,” on page 21). If an
agent is across a firewall from its monitoring server or from the Warehouse Proxy
agent, then extra configuration is needed so that they know how to address each
other. This configuration could be a lot of work; for example, if you have 500
agents across a firewall, you might consider giving them their own monitoring
server to avoid this.
If you are monitoring less than 200 managed systems (and less than 1000 events)
and you want to view only situation events (not the other types of events that IBM
Tivoli Enterprise Console can monitor), you can use the Situation Event Console in
the Tivoli Enterprise Portal. If your monitoring environment is larger than 200
managed systems, consider moving to IBM Tivoli Enterprise Console for your
event aggregation and use the Tivoli Enterprise Console view within the Tivoli
Enterprise Portal to display the event information. The response time for the Tivoli
Enterprise Console view is better than the Situation Event Console view when a
large number of events is displayed.
For additional information about the integration with Tivoli Enterprise Console, see
“Tivoli Enterprise Console event synchronization component” on page 6.
For additional information about Tivoli Enterprise Console, see the Tivoli
Enterprise Console information center. For additional information about using the
Situation Event Console in the Tivoli Enterprise Portal, see the IBM Tivoli
Monitoring User's Guide.
The remote deployment feature in IBM Tivoli Monitoring can be used in all
monitoring environments; however, the number of agents you want to deploy and
the deployment capabilities that you require affect whether the remote deployment
feature is the best choice for your environment. Consider using an enterprise
deployment tool, such as IBM Tivoli Configuration Manager, if you need any of
the following capabilities:
v Efficiently deploying a large number of agents in parallel, using caches that are
geographically close to the distribution points
v Limiting the amount of bandwidth used for deployment actions through the use
of network bandwidth throttling
v Restarting a failed deployment automatically
Tivoli Enterprise
Portal Client
Failover
100-200
monitoring agents
The small environment would be limited to 100-200 agents. It can perform some
minimal historical data collection and does not use the IBM Tivoli Enterprise
Console. Adding significant data collection or enterprise-wide event correlation
requires additional servers.
The advantages of a small environment are that it is simple, the most reliable
(there is only 1 possible point of failure), and the least expensive.
The disadvantages of a small environment are that you can only support a small
number of agents and adding historical data collection or a significant number of
situation events could overwhelm capacity.
If you are going to use a medium monitoring environment, use the recommended
system configurations (see “Required hardware” on page 26) for the multiple
monitoring servers and the portal server. Scale the Tivoli Data Warehouse server
according to how much historical data you plan to collect and retain (see
“Planning considerations for the Tivoli Data Warehouse” on page 30 for
information). A simple one-server Tivoli Enterprise Console deployment can
handle the event correlation. Keep the Tivoli Data Warehouse, Warehouse Proxy,
and Summarization and Pruning agent on the same computer for better
performance.
The large environment supports up to 5000 agents with each hub monitoring
server; multiple hubs can be deployed to extend across the whole enterprise. Tivoli
Enterprise Console is used to correlate events across all hub monitoring servers. A
single Tivoli Data Warehouse server collects and saves historical data for
debugging and reports.
The advantage of a large monitoring environment is that historical data and event
correlation is enterprise-wide. You can use complex database queries to access all
data.
If you are going to use a large monitoring environment, use the recommended
system configurations (see “Required hardware” on page 26) for the multiple
monitoring servers and portal servers. Scale the Tivoli Data Warehouse server
according to how much historical data you plan to collect and retain (see
“Planning considerations for the Tivoli Data Warehouse” on page 30 for
information). You might need to use a hub and spoke Tivoli Enterprise Console
deployment (described in “Multiple hub monitoring servers and multiple event
servers in a hub and spoke configuration” on page 87) to handle the additional
load of synchronizing events across hub monitoring servers. If possible, keep the
If you are upgrading from OMEGAMON Platform 350 or 360 and CandleNet
Portal® 195, see Chapter 4, “Upgrading from a previous installation,” on page 39
before installing any IBM Tivoli Monitoring components.
If you are upgrading from Tivoli Distributed Monitoring to IBM Tivoli Monitoring,
see the IBM Tivoli Monitoring: Upgrading from Tivoli Distributed Monitoring guide.
Note: IBM Tivoli products do not support third-party vendor shells such as
BASH and TCSH.
NFS also has some trade-offs in how you manage your environment. While you
can have your entire IBM Tivoli Monitoring in one place, there might be additional
configuration required to define the use of specific products or processes in your
installation directory. Will every product on every host system execute using the
same configuration; or will you tailor the configuration to the particular
environment?
For the monitoring server to function properly, set the maximum file descriptor
(MAX_FILES parameter of the configurable kernel parameter) to greater than 256.
Under POSIX shell, running ulimit -a displays nofiles (descriptors) that should be
greater than 256 or unlimited.
To determine the number of per process file descriptors (maxfiles), run one of the
following commands:
sysdef | grep maxfiles
ulimit -a
If the settings returned are less than 256, increase the maxfiles limit beyond 256.
Note: This section does not show agent-specific requirements (such as supported
application levels or any hardware requirements unique to a certain agent).
For this information, see the user’s guide for the agent that you are
installing.
Notes:
1. The Tivoli Enterprise Portal desktop client is supported on marked platforms. However, the browser client can
only be accessed from Windows computers running Internet Explorer 6.
2. The Monitoring agent column indicates the platforms on which an agent is supported. It does not indicate that
any agent runs on any platform. For example, to monitor a Linux computer, you must use a Linux monitoring
agent, not a Windows monitoring agent.
3. * For Windows 2003 Server: If you do not plan to deploy Service Pack 1 in your environment at this time, you
must download and install Microsoft Installer 3.1 (KB893803), which is available from the Microsoft Download
Web site (www.microsoft.com/downloads).
4. For information about installing the Tivoli Enterprise Monitoring Server on z/OS, see the Program Directory that
comes with that product. For information about configuring the monitoring server on z/OS, see the Configuring
IBM Tivoli Enterprise Monitoring Server on z/OS, SC32-9463.
Required hardware
The following table details the minimum required hardware to install the
components of IBM Tivoli Monitoring.
Additional requirements:
v If the portal server and a monitoring server are installed on a single server, their
hardware requirements are additive. For example, if the hub monitoring server
and portal server are installed on the same RISC server, it needs to be a
2-processor 1 GHz machine with 2 GB of memory.
v The best network connection possible is needed between the hub monitoring
server and portal server and also between the Tivoli Data Warehouse,
Warehouse Proxy agent, and Summarization and Pruning agent.
v The recommended machine requirement for the Tivoli Data Warehouse assumes
that the Warehouse Proxy agent and Warehouse Summarization and Pruning
Required software
The following table lists the software required for IBM Tivoli Monitoring.
Table 6. Required software for IBM Tivoli Monitoring
Component where the software is required
Notes:
1. The only supported database for a Linux portal server is DB2.
2. Each database requires a driver:
v JDBC-DB2 driver for DB2
v MS SQL JDBC driver for MS SQL
v Oracle JDBC driver for Oracle
3. If, in your environment, you are using products whose licenses require you to collect software use information
and report it to IBM using IBM Tivoli License Manager, you must ensure that use of this instance of the product
is not included in the report. To do this, create a Tivoli License Manager license, selecting a license type that
does not involve reporting to IBM, and associate this instance of the product with it.
4. IBM Tivoli Monitoring supports MS SQL Server 2000 only if the data is limited to codepoints inside the Basic
Multilingual Plane (range U+0000 to U+FFFF). This restriction does not apply to IBM DB2.
For all operating systems, see the GSKit documentation for the full set of
prerequisites related to that software, which is installed during the IBM Tivoli
Monitoring install. The GSKit documentation is available at http://www-
1.ibm.com/support/docview.wss?uid=pub1sc32136300.
Use the worksheet in Table 7 on page 34 to record the values from these
calculations. You can also use the planning spreadsheet available in the IBM Tivoli
Monitoring information center.
Step 1: Determine the number of detailed records per day for the
attribute group
Determine the number of detailed records per day for each attribute group that
you want to collect data for. Use the following equation:
(60 / collection interval) * (24) * (# instances at each interval)
where:
60 Represents the 60 minutes in an hour.
collection interval
The data collection interval, in minutes. This value can be 5, 15, 30, or 60
minutes.
24 Represents 24 hours in one day.
# instances at each interval
The number of instances recorded at each interval. See the agent user's
guide for this value.
where:
# detailed records
The number of detailed records for the attribute. This is the value you
calculated in “Step 1: Determine the number of detailed records per day
for the attribute group” on page 30.
attribute group detailed record size
The detailed record size for the attribute group. See the agent user's guide
for this value.
1024 Represents 1 KB and causes the equation to generate a kilobyte number
instead of a byte number.
where:
attribute group disk footprint
The disk footprint for the attribute group. This is the value you calculated
in “Step 2: Determine the hard disk drive footprint for the attribute
group.”
# of agents
The number of agents of the same agent type in your environment.
# days of detailed data
The number of days for which you want to keep detailed data in the
warehouse database.
1024 Represents 1 KB and causes the equation to generate a megabyte number.
First, calculate the number of aggregate records per agent. Use the following
equation:
(#hourly + #daily + #weekly + #monthly + #quarterly + #yearly)
* (# instances at each interval)
where:
#hourly
The number of hourly records for the attribute group. For example, if you
have hourly records for 60 days, the number of hourly records is 1440 (60
multiplied by 24 hours per day).
Next, use the following equation to calculate the amount of attribute data in the
warehouse for the attribute group:
(# aggregate records per agent) * (attribute group aggregate record size)
* (# agents) / 1048576
where:
# aggregate records per agent
The number of aggregate records per agent for the attribute group.
attribute group aggregate record size
The size of the attribute group aggregate group. See the agent user's guide
for this value.
# agents
The number of agents of the same agent type in your environment.
1048576
Represents 1 MB and causes the equation to generate a megabyte number.
Second, determine the total space required for all attribute groups for the agent.
Add the total space for each attribute group that you want to collect. Use the
following equation:
aggGroup1 + aggGroup2 + aggGroup3 ...
Third, determine the total space required for all agents. Add the total space for
each agent. Use the following equation:
agent1 + agent2 + agent3 ...
Use the following worksheet to estimate the size of your data warehouse database.
34
Total
Data from the User's Guide warehouse
Attribute Warehouse Warehouse space for
Record Record Detailed agent disk Days of space - space - attribute
Attribute Number size - size- Interval Collection records space detailed detailed Aggregate aggregated group
group of agents detailed aggregated instances interval per day* (KB)* data kept (MB)* records (MB)* (MB)
NT_System 1000 452 1308 1 15 96 42.38 30 1241.46 4582 5715.61 6957.07
The Absolute minimum disks column specifies the minimum number of disks for
an RDBMS. In this column, the index and temporary space is allocated onto one
disk. While not an ideal arrangement, this might work in practice because
databases tend to use indexes for transactions or temporary space for index
creation and sorting full table scan large queries, but not both at the same time.
This is not a recommended minimum disk subsystem for a database, but it does
have the lowest cost.
The Small RDBMS column represents a minimum disk subsystem, although there
might be limits in I/O rates because of the data being place on only one disk.
The Small and safe RDBMS column adds full disk protection and can withstand
any disk crash with zero database downtime.
The Large RDBMS column represents a typical size database for a database
subsystem. Disk protection is not included in these sizings but can be added to
increase the stability of the database.
If 512 GB of space per table is not enough for your environment, move to DB2
Enterprise Edition and using physical or logical partitioning.
The following steps outline the process for using database partitioning with DB2
Enterprise Edition:
1. Add a new database partition to the DB2 instance by running the db2ncrt
command.
2. Use the ALTER TABLE statement to add a partitioning key to the tables that
you want to partition. For example:
ALTER TABLE "CANDLE "."NT_System" ADD PARTITIONING KEY ("Server_Name")
USING HASHING
3. Use the ALTER DATABASE PARTITION GROUP statement to assign the new
partition to the database partition group. You can do this either from the
command line or from the DB2 Control Center.
4. Redistribute the data in the database partition group, using the Redistribute
Data Wizard in the DB2 Control Center.
For additional information about database partitioning, see the following DB2
sources:
v IBM DB2 Universal Database™ Administration Guide: Planning
v IBM DB2 Universal Database Administration Guide: Implementation
v DB2 Information Center at
http://publib.boulder.ibm.com/infocenter/db2help/index.jsp.
Note: You cannot upgrade directly to IBM Tivoli Monitoring from a version of
OMEGAMON Platform prior to 350 or 360. If you are using an older version
of OMEGAMON Platform, you must first upgrade to OMEGAMON 350 or
360 before upgrading to IBM Tivoli Monitoring.
If you are upgrading from Tivoli Distributed Monitoring, see the IBM Tivoli
Monitoring: Upgrading from Tivoli Distributed Monitoring guide.
Upgrading from Candle OMEGAMON 350 or 360 involves the following steps:
Table 9. Upgrading from OMEGAMON 350 or 360
Task Where to find information
Before installing IBM Tivoli Review the new terminology. Although “Terminology changes” on page 40
Monitoring the same components exist in IBM Tivoli
Monitoring, many have new names.
Review the upgrade planning information “Upgrade planning” on page 40
to identify what you can and cannot
upgrade.
Stop all components that you are “Starting and stopping components” on
upgrading and change their startup from page 108
Automatic to Manual.
If you are upgrading a hub monitoring
server and you have already configured it
to work with the Hot Standby feature,
stop all agents that connect to the
monitoring server.
Restart the computer on which you are
installing IBM Tivoli Monitoring.
Upgrading your monitoring Run the IBM Tivoli Monitoring Chapter 5, “Installing IBM Tivoli
environment installation program on all components Monitoring,” on page 47
that you want to upgrade. Use your
existing installation directory as your IBM
Tivoli Monitoring directory.
After installing IBM Tivoli Run the Warehouse Proxy migration tool “Migrating data from an existing
Monitoring to migrate your existing Warehouse Proxy Warehouse Proxy database” on page 42
database.
For any existing OMEGAMON monitoring “Using existing OMEGAMON agents
agents that you want to use with the IBM with IBM Tivoli Monitoring” on page 45
Tivoli Monitoring monitoring server,
change their configuration to point to the
new monitoring server.
Notes:
1. After you upgrade a UNIX monitoring server, you must run the itmcmd config
-S command to configure the upgraded monitoring server and the itmcmd
support command to update application support files.
Terminology changes
The following terms have changed with the move from Candle OMEGAMON to
IBM Tivoli Monitoring:
Table 10. OMEGAMON to IBM Tivoli Monitoring terminology
OMEGAMON term IBM Tivoli Monitoring term
®
Candle Management Server (CMS) Tivoli Enterprise Monitoring Server
CandleNet Portal (CNP) Tivoli Enterprise Portal
CandleNet Portal Server (CNPS) Tivoli Enterprise Portal Server
®
OMEGAMON Monitoring Agent (OMA) Tivoli Enterprise Monitoring Agent
(monitoring agent)
OMEGAMON Platform Tivoli Monitoring Services
Manage Candle Services Manage Tivoli Enterprise Monitoring
Services
Event Situation event
Seeding Adding application support
OMEGAMON Web Services Tivoli Monitoring Web Services
Candle Customer Support IBM Software Support
Upgrade planning
This section discusses some issues you need to consider before upgrading IBM
Tivoli products.
If you use the OMEGAMON XE for CICS® 3.1.0 product, you must continue to use
Candle Management Workstation to configure workloads for Service Level
Analysis. After you have configured the workloads, you can use the Tivoli
Enterprise Portal for all other tasks.
If you do not currently have Candle Management Workstation (for example, if you
are installing OMEGAMON XE for CICS 3.1.0 into an IBM Tivoli Monitoring
environment), you must install the Candle Management Workstation that is
shipped with the OMEGAMON XE for CICS 3.1.0 product. Install Candle
Management Workstation on a different computer than the Tivoli Enterprise Portal.
Otherwise, the Candle Management Workstation attempts to uninstall the Tivoli
Enterprise Portal.
Before you migrate to the new data warehouse, you need to create a new ODBC
data source for the 6.1.0 version of the Warehouse Proxy agent and connect that
data source to a new database. The migration tool moves your data from the
existing database to the new database. For information about creating a new data
source and database, see Chapter 11, “Configuring the Warehouse Proxy for the
Tivoli Data Warehouse,” on page 145.
The warehouse migration tool is installed when you install the Warehouse
Summarization and Pruning Agent. The following files are installed in the
itm_installdir/tmaitm6 directory:
v khdmig.jar
v KHDENV_MIG
v migratewarehouse.bat
The tool also uses several files installed by the Warehouse Summarization and
Pruning Agent.
The following sections provide information on using the warehouse migration tool.
For JDBC driver information, use the syntax appropriate to your driver vendor:
DB2 URL: jdbc:db2:<database>
Driver: COM.ibm.db2.jdbc.app.DB2Driver
MS SQL Server
URL:
jdbc:microsoft:sqlserver://<server>:<port>;DatabaseName=<database>
Driver: com.microsoft.jdbc.sqlserver.SQLServerDriver
Default port: 1433
Oracle URL: jdbc:oracle:thin:@<server>:<port>:<database>
Driver: oracle.jdbc.driver.OracleDriver
Default port: 1521
Status tables
Part of the migration of data to the new warehouse requires shortening the table
and column names if the target database is not a Microsoft SQL database. When a
name is shortened, an entry is created inside the WAREHOUSEID table in your
new database. You can view this table to check which table names or column
names have been modified.
For each package of rows committed, an entry is also made in the new
WAREHOUSEMIGLOG table.
To monitor the OMEGAMON agent, use Manage Candle Services to change the
monitoring server to which the agent sends data.
To enable the Tivoli Data Warehouse to collect data from these agents (through the
Warehouse Proxy), copy the product attribute file to the ATTRLIB directory on the
Warehouse Proxy agent.
For full interoperability between OMEGAMON agents and IBM Tivoli Monitoring,
you need to install the application support files for these agents on the monitoring
server, portal server, and portal desktop client. See the "OMEGAMON V350/360
agent interoperability" document in the IBM Tivoli Monitoring information center
for information about downloading and installing these support files.
The following sections contain both Windows and UNIX procedures for installing
the various components. Use the procedure that best applies to your environment
layout.
Note: If you are running Windows 2003 or Windows XP and have security set
to check the software publisher of applications, you might receive an
error stating that the setup.exe file is from an unknown publisher. Click
Run to disregard this error message.
2. Click Next on the welcome window.
3. Click Accept to accept the license agreement.
4. If you do not have a database (DB2 or MS SQL) installed on this computer, a
message regarding potentially missing software is displayed. You do not need
a database to use this computer as a monitoring server, so you can click Next
and ignore this message.
5. Choose the directory where you want to install the product. The default
directory is C:\IBM\ITM. Click Next.
6. Type a 32 character encryption key. You can use the default key.
Notes:
a. Do not use any of the following characters in your key:
v =
v ’
v |
b. Ensure that you document the value you use for the key. Use this key
during the installation of any components that communicate with this
monitoring server.
Click Next and then click OK to confirm the encryption key.
7. Select the components that you want to install: Tivoli Enterprise Monitoring
Server.
8. If you want to use the Summarization and Pruning agent to work with data in
your data warehouse, expand Tivoli Enterprise Monitoring Agent and select
Windows Summarization and Pruning Agent.
See the IBM Tivoli Monitoring Administrator’s Guide for information about
configuring and using this agent.
9. Click Next.
10. If you want to do remote deployment of agent software, select those agents
that you want to deploy. This step creates and populates the deployment
depot, from which you can deploy agents at a later time (as described in
Chapter 10, “Deploying monitoring across your environment,” on page 135).
Click Next.
Important: Do not select Security: Validate User. You can configure security
after installing the monitoring server, as described in “Configuring
user security” on page 109.
18. Click OK.
19. Complete the following fields for the communications protocol for the
monitoring server.
Table 14. Communications protocol settings
Field Description
IP.UDP Settings
Hostname or IP Address The host name or IP address for the hub
monitoring server.
Port # and/or Port Pools The listening port for the hub monitoring
server. The default port is 1918.
IP.PIPE Settings
Hostname or IP Address The host name or IP address for the hub
monitoring server.
Port Number The listening port for the monitoring server.
The default number is 1918.
IP.SPIPE Settings
Hostname or IP Address The host name or IP address for the hub
monitoring server.
20. If you are certain that you have typed the values for all of these fields with
exactly the correct casing (upper and lower cases), you can select Use case as
typed. However, because IBM Tivoli Monitoring is case-sensitive, consider
selecting Convert to upper case to reduce the chance of user error.
21. Click OK to continue.
22. If you selected TEC Event Integration Facility, provide the host name and
port number for the event server that you want to forward events to and click
OK. Otherwise, skip this step.
The next configuration step is to add application support to the monitoring
server, such as the situations for agents.
23. Specify the location of the monitoring server to which to add application
support. You have two choices:
v On this computer
v On a different computer
Click OK.
Note: Do not select Optional Secondary TEMS Connection. You can set up
the failover support for agents after install, as described in
“Configuring failover support” on page 110.
29. Click Finish to complete the installation.
The Manage Tivoli Enterprise Monitoring Services utility is opened. (This might
take a few minutes.) You can start, stop, and configure IBM Tivoli Monitoring
components with this utility.
Note: You can configure the partition file at a later time, as described in
“Firewall support” on page 117.
9. Press Enter when prompted for the path and name of the KDC_PARTITION.
10. If you want to use Configuration Auditing, press Enter. If you do not want to
use this feature, type n and press Enter.
11. Press Enter to accept the default setting for the Hot Standby feature (NO).
For best results, wait until after you have fully deployed your environment to
configure the Hot Standby feature for your monitoring server. See
“Configuring failover support” on page 110 for information about configuring
Hot Standby.
12. Press Enter to accept the default for the Optional Primary Network Name
(none).
13. Press Enter for the default Security: Validate User setting (no).
Important: Do not change this to set Security: Validate User. You can
configure security after configuring the monitoring server, as
described in “Configuring user security” on page 109.
14. If you will be using IBM Tivoli Enterprise Console to view situation events,
type y and press Enter to enable TEC Event Integration. Complete the
following additional steps:
a. Type the name of the IBM Tivoli Enterprise Console event server and press
Enter.
b. Type the port number for the event server and press Enter.
15. Type s to accept the default SOAP configuration and exit the configuration.
Note: You can configure any SOAP information at a later time. See
Chapter 12, “Configuring IBM Tivoli Monitoring Web Services (SOAP
Server) on Windows,” on page 159 for information.
Note: If you are installing a backup monitoring server, see “Adding application
support on the backup hub monitoring server” on page 110 for information
about adding application support.
1. Start the monitoring server by running the following command:
./itmcmd server start tems_name
2. Run the following command to add the application support:
./itmcmd support -t tems_name pc pc pc
where pc is the product code for each agent whose data you want to send to
the monitoring server. See Appendix D, “IBM Tivoli Product Codes,” on page
185 for a list of agent product codes.
3. Stop the monitoring server by running the following command:
./itmcmd server stop tems_name
4. Restart the monitoring server by running the following command:
./itmcmd server start tems_name
Note: If you are running Windows 2003 or Windows XP and have security set
to check the software publisher of applications, you might receive an
error stating that the setup.exe file is from an unknown publisher. Click
Run to disregard this error message.
2. Click Next on the welcome window.
3. Click Accept to accept the license agreement.
4. If you do not have a database (DB2 or MS SQL) installed on this computer, a
message regarding potentially missing software is displayed. You do not need
a database to use this computer as a monitoring server, so you can click Next
and ignore this message.
5. Choose the directory where you want to install the product. The default
directory is C:\IBM\ITM. Click Next.
6. Type a 32 character encryption key. You can use the default key.
19. If you are certain that you have typed the values for all of these fields with
exactly the correct casing (upper and lower cases), you can select Use case as
typed. However, because IBM Tivoli Monitoring is case-sensitive, consider
selecting Convert to upper case to reduce the chance of user error.
20. Click OK to continue.
21. Specify the location of the monitoring server to which to add application
support. You have two choices:
v This computer
v On a different computer
Click OK.
22. Because the monitoring server is not currently running, it is started
automatically before the process begins. Click OK on the message telling you
this.
23. Select the data that you want to add to the monitoring server. By default, all
available application support is selected. Click OK.
The process of adding application support files can take up to 20 minutes.
24. Click Next on the message that provides results for the process of adding
application support. A return code of 0 (RC=0) indicates that the process
succeeded.
The next configuration step configures the default communication between
any IBM Tivoli Monitoring component and the monitoring server.
25. Specify the default values for any IBM Tivoli Monitoring component to use
when they communicate with the monitoring server.
Note: Do not select Optional Secondary TEMS Connection. You can set up
the failover support for agents after install, as described in
“Configuring failover support” on page 110.
27. Click Finish to complete the installation.
Note: You can configure the partition file at a later time, as described in
“Firewall support” on page 117.
9. Press Enter when prompted for the path and name of the KDC_PARTITION.
10. If you want to use Configuration Auditing, press Enter. If you do not want to
use this feature, type n and press Enter.
11. Press Enter to accept the default setting for the Hot Standby feature (NO).
For best results, wait until after you have fully deployed your environment to
configure the Hot Standby feature for your monitoring server. See
“Configuring failover support” on page 110 for information about configuring
Hot Standby.
12. Press Enter to accept the default for the Optional Primary Network Name
(none).
13. Press Enter for the default Security: Validate User setting (no).
Important: Do not change this to set Security: Validate User. You can
configure security after configuring the monitoring server, as
described in “Configuring user security” on page 109.
14. If you will be using IBM Tivoli Enterprise Console to view situation events,
type y and press Enter to enable TEC Event Integration. Complete the
following additional steps:
a. Type the name of the IBM Tivoli Enterprise Console event server and press
Enter.
b. Type the port number for the event server and press Enter.
15. Type s to accept the default SOAP configuration and exit the configuration.
Note: You can configure any SOAP information at a later time. See
Chapter 12, “Configuring IBM Tivoli Monitoring Web Services (SOAP
Server) on Windows,” on page 159 for information.
Note: If your computer has all required software, you will not see this step.
5. Specify the directory where you want to install the portal software and
accompanying files. The default location is C:\IBM\ITM. Click Next.
6. Type an encryption key to use. This key should be the same as what was used
during the installation of the monitoring server to which this portal server
will connect. Click Next and then OK to confirm the encryption key.
7. Select Tivoli Enterprise Portal Server from the list of components to install.
8. If you want to view events on the IBM Tivoli Enterprise Console event server
through the Tivoli Enterprise Portal, expand Tivoli Enterprise Portal Server
and ensure that Tivoli Enterprise Console GUI Integration is selected.
9. If you plan to monitor the IBM Tivoli Composite Application Manager for
Response Time Tracking agent, select IBM Eclipse Help Server. This help
server runs the help system for that agent. Otherwise, you do not need to
install this component.
10. Click Next.
If you are installing the portal server on a computer that already has a
monitoring server installed, the next step is to populate the depot. If you do
not have a monitoring server on this computer, this step is skipped.
11. Type a name for the program folder. The default is IBM Tivoli Monitoring.
Click Next.
12. Click Next to start the installation.
After installation is complete, a configuration window is displayed.
13. Click Next to begin configuring the portal server and the connection to the
monitoring server and to open Manage Tivoli Enterprise Monitoring Services.
Note: These steps are based on a DB2 database. The steps might be different
if you are using a different database.
a. Select the database that you are using for the Warehouse Proxy and click
OK. You have the following choices:
v DB2
v SQL Server
v Oracle
v Other database type
b. Complete the following fields as appropriate:
Data Source Name
The name of the data source. The default is ″ITM Warehouse.″
Database Name
The name of the database. If you are defining a new data source
and want to specify a different database, type the name here.
Otherwise, leave the default value, "WAREHOUS."
Admin User ID
The user ID for the database administrator. The default for DB2 is
″db2admin.″
Admin Password
The password for the database administrator.
Database User ID
The name of the user that accesses the IBM Tivoli Monitoring data
warehouse. The default name is ″ITMUser.″
Database Password
Type a password for the database user. If your environment
requires complex passwords, include a numeric character in the
password.
Important: Run these installation and configuration procedures as either the root
user or as the DB2 administrator. After you have installed and
configured the portal server, you can use a different user to run the
portal server, as long as that user has access to the binaries used by the
portal server.
Table 20. Steps for installing a portal server on a Linux computer
Steps Where to find information
Install the portal server on the Linux “Installing the portal server”
computer.
Configure the portal server. “Configuring the portal server on Linux” on
page 62
Start the portal server. “Starting the portal server” on page 64
Note: DB2 is the only database supported for Tivoli Data Warehouse with a Linux
portal server.
8. Press Enter when you are asked if you want to configure the connection to a
secondary monitoring server. The default value is no.
9. Press Enter to accept the default for the Optional Primary Network Name
(none).
10. Press Enter to accept the default setting for SSL between the portal server and
clients (N). By default, SSL is disabled. To enable SSL, type y and press Enter.
11. Type the DB2 instance name. The default value is ″db2inst1.″ Press Enter.
12. Type the DB2 administrator ID. The default is "db2inst1." Press Enter.
13. Type the password for the DB2 administrator ID and press Enter.
14. Confirm the password for the DB2 administrator ID by typing it again. Press
Enter.
15. Type the name of the database for the portal server. The default is "TEPS."
Press Enter.
Note: If you are using a remote node and database, you must manually
configure (catalog) the remote node and the remote database from the
Linux DB2 command line. Run the following commands to do this:
db2 catalog tcpip node <node_name> remote <host_name> server <port>
db2 catalog db <db_name> as <dbalias> at node <node_name>
21. Type the name of the database user that the Tivoli Data Warehouse will use.
The default is "itmuser." Press Enter.
22. Type the password for the Warehouse user ID and press Enter.
23. Confirm the password for the Warehouse user by typing it again. Press Enter.
Configuration is complete.
Depending on the agent that you are installing, there might be additional
configuration steps required. See the agent documentation for more information.
If you are installing any of the following agents, launch the installation using the
setup.exe or install.sh files that are part of the base IBM Tivoli Monitoring
installation package:
v ITM 5.x Endpoint
v Linux OS
v UNIX Logs
v UNIX OS
v Universal Agent
v Warehouse Proxy
v Warehouse Summarization and Pruning
v Windows OS
If you are installing any other agents (for example, DB2 or Exchange), launch the
agent installation using the setup.exe or install.sh files that are part of the different
agent installation packages.
Note: This step applies only to those agents that you install from the IBM
Tivoli Monitoring installation image. Agents installed from the agent
installation image do not have this step. If you are installing an agent
from an agent installation image, skip to step 7.
6. Type a 32 character encryption key. This key should be the same as the key
that was used during the installation of the monitoring server to which this
monitoring agent connects.
Click Next and then click OK to confirm the encryption key.
7. Expand Tivoli Enterprise Monitoring Agents.
8. Select the name of the agent that you want to install and click Next.
If you are installing the agent on a computer that already has a monitoring
server installed, the next step is to populate the depot. If you do not have a
monitoring server on this computer, this step is skipped.
Note: The following step applies only to those agents that you install from the
IBM Tivoli Monitoring installation image. Agents installed from the
agent installation image do not have this step.
9. Type a program folder to use in your Start menu and click Next. The default
folder is ″IBM Tivoli Monitoring.
10. Review the installation summary details. This summary identifies what you
are installing and where you chose to install it. Click Next to begin the
installation of components.
After the components are installed and the configuration environment is
initialized (indicated by a pop-up window), a configuration window is
displayed.
11. Click Next to begin configuring the default values for your agent.
12. Specify the default values for any IBM Tivoli Monitoring agent to use when
they communicate with the monitoring server.
a. If the agent must cross a firewall to access the monitoring server, select
Connection must pass through firewall.
Note: Do not select Optional Secondary TEMS Connection. You can set up
the failover support for agents after install, as described in
“Configuring failover support” on page 110.
14. Click Finish to complete the installation.
15. Open the Manage Tivoli Enterprise Monitoring Services utility (if it does not
open automatically) to see if the monitoring agent has been configured and
started. If ″Yes″ is in the Configured column, the agent has been configured
and started during the installation process.
16. If the value in the Configured column is blank and ″Template″ is in the
Task/Subsystem column, right-click the ″Template″ agent and do the
following:
Note: This prompt might vary depending on the installation image from
which you are installing.
Type 1 to start the installation and press Enter.
5. Type the number that corresponds to the language in which you want to
display the software license agreement in and press Enter.
6. Press Enter to display the agreement.
Note: This step applies only to those agents that you install from the IBM
Tivoli Monitoring installation image. Agents installed from the agent
installation image do not need to provide the encryption key.
A numbered list of available operating systems is displayed.
9. Type the number for the operating system that you are installing on. The
default value is your current operating system. Press Enter.
10. Type y to confirm the operating system and press Enter.
A numbered list of available components is displayed.
11. Type the number that corresponds to the monitoring agent or agents that you
want to install. If you want to install more than one agent, use a comma (,) or
a space to separate the numbers for each agent. Press Enter.
A list of the components to install is displayed.
12. Type y to confirm the installation.
The installation begins.
13. After all of the components are installed, you are asked whether you want to
install components for a different operating system. Type n and press Enter.
where pc is the product code for your agent. For the UNIX agent, use the
product code ″ux″; for Linux, use ″lz″. See Appendix D, “IBM Tivoli Product
Codes,” on page 185 for a list of agent product codes.
2. Press Enter when you are asked if the agent connects to a monitoring server.
3. Type the host name for the monitoring server.
4. Type the protocol that you want to use to communicate with the monitoring
server. You have four choices: ip, sna, ip.spipe, or ip.pipe. Press Enter to accept
the default protocol (IP.PIPE).
5. If you want to set up a backup protocol, enter that protocol and press Enter. If
you do not want to use backup protocol, press Enter without specifying a
protocol.
6. Depending on the type of protocol you specified, provide the following
information when prompted:
Table 24. UNIX monitoring server protocols and values
Protocol Value Definition
IP.UDP IP Port Number The port number for the
monitoring server. The
default is 1918.
Running the following steps in the wrong directory can change the
permissions on every file in every file system on the computer.
4. Change to the directory returned by the previous step:
cd $CANDLEHOME
5. Run the following command to ensure that you are in the correct directory:
pwd
6. Run the following commands:
chgrp -R itmusers .
chmod -R o-rwx .
where pc is the product code for the agent that you want to start. See Appendix D,
“IBM Tivoli Product Codes,” on page 185 for a list of agent product codes.
When you installed the monitoring server, portal server, and portal desktop client
using the instructions in this chapter, the support for agents available on the IBM
Tivoli Monitoring installation CD was installed. Now you must return to each
component and install the application support for any other agents that you have
installed (the Database, Messaging and Collaboration, and other application
agents).
Note: If you are installing the support separately from the agent itself and
you have already installed an agent on this computer, you see the
following window:
Note: If you have other components installed on the same computer, such as
the desktop client, also select those components to install the
component-specific application support.
6. If you want to add the agent to the deployment depot, select the agent and
click Next.
7. Review the installation summary details. Click Next to start the installation.
After installation is complete, a configuration window is displayed. By
default, all the components you just installed are selected for configuration.
Clear any components that you have already installed on this computer, such
as the monitoring server.
8. Click Next on the configuration window.
9. Specify the default values for any IBM Tivoli Monitoring agent to use when
they communicate with the monitoring server and click OK.
10. Identify the default communications protocols for agents to use to connect to
the monitoring server. See “Installing monitoring agents” on page 64 for a list
of these fields. Click OK to continue.
The next configuration step is to add application support to the monitoring
server, such as the workspaces and situations for agents.
Note: If you have already installed another IBM Tivoli Monitoring component
on this computer or you are installing support for an agent from an
agent installation image, this step does not occur.
A numbered list of available operating systems and installation components is
displayed.
9. Type the number that corresponds to ″Tivoli Enterprise Monitoring Server
support″ and press Enter.
10. Type y to confirm and press Enter.
A list of the components to install is displayed.
11. Type the number that corresponds to ″all of the above″ and press Enter.
12. Type y to confirm the installation.
The installation begins.
where tems_name is the name of the monitoring server and pc is the product
code for the agent.
To view the product code for the application support you just installed, run
the following command:
./cinfo
Type 1 when prompted to display the product codes for the components
installed on this computer.
Add only the support for the agent you installed. For example, if you installed
the support for the DB2 agent, run the following command:
./itmcmd support -t hub_itmdev17 ud
Note: If you are installing the support separately from the agent itself and
you have already installed an agent on this computer, you see the
following window:
Note: If you have other components installed on the same computer, such as
the desktop client, also select those components to install the
component-specific application support.
8. Click Next. Do not select any agents.
9. Review the installation summary details. Click Next to start the installation.
After installation is complete, a configuration window is displayed. By
default, all the components you just installed are selected for configuration.
Clear any components that you have already installed and configured on this
computer.
10. Click Next on the configuration window.
11. Type the host name for the portal server and click Next.
12. Click Finish to complete the installation wizard.
13. Restart the portal server.
Note: If you have already installed another IBM Tivoli Monitoring component
on this computer or you are installing support for an agent from an
agent installation image, this step does not occur.
A numbered list of available operating systems and installation components is
displayed.
8. Type the number that corresponds to ″Tivoli Enterprise Portal Browser Client
support″ and press Enter.
9. Type y to confirm and press Enter.
A list of the components to install is displayed.
10. Type the number that corresponds to ″all of the above″ and press Enter.
11. Type y to confirm the installation.
The installation begins.
12. When you are asked whether you want to install components for a different
operating system, type y and press Enter.
13. Type the number that corresponds to "Tivoli Enterprise Portal Server support"
and press Enter.
14. Type y to confirm and press Enter.
A list of the components to install is displayed.
15. Type the number that corresponds to ″all of the above″ and press Enter.
16. Type y to confirm the installation.
The installation begins.
17. After all of the components are installed, you are asked whether you want to
install components for a different operating system. Type n and press Enter.
18. Stop the portal server by running the following command:
./itmcmd agent stop cq
19. Run the following command to configure the portal server with the new agent
information:
./itmcmd config -A cq
Note: If you are installing the support separately from the agent itself and
you have already installed an agent on this computer, you see the
following window:
Note: If you have already installed another IBM Tivoli Monitoring component
on this computer or you are installing support for an agent from an
agent installation image, this step does not occur.
A numbered list of available operating systems and installation components is
displayed.
8. Type the number that corresponds to ″Tivoli Enterprise Portal Desktop Client
support″ and press Enter.
9. Type y to confirm and press Enter.
A list of the components to install is displayed.
10. Type the number that corresponds to ″all of the above″ and press Enter.
11. Type y to confirm the installation.
The installation begins.
12. After all of the components are installed, you are asked whether you want to
install components for a different operating system. Type n and press Enter.
13. Run the following command to configure the portal client with the new agent
information:
./itmcmd config -A cj
Before you can install a language pack, you must install the component in English.
Your monitoring server and portal server must be running for the portal client to
start successfully.
On Windows:
1. Click Start → Programs → IBM Tivoli Monitoring → Tivoli Enterprise Portal.
2. Type the user name in the login field. The default user name is ″sysadmin.″
3. If your environment requires user validation, type the password.
4. Click OK.
On Linux, run the following command to start the portal desktop client:
./itmcmd agent start cj
After you start the browser client, change the memory settings for the Java Plug-in
used by the Tivoli Enterprise Portal:
1. Open the Windows Control Panel and double-click the Java Plug-in used by
Tivoli Enterprise Portal.
2. In the Advanced page, enter -Xms64m -Xmx256m in the Java Runtime Parameters
field and click Apply.
3. Log off the portal and then log in again.
If you want to forward situation events to and view updates from Tivoli Enterprise
Console in the Tivoli Enterprise Portal, you need to install the event
synchronization component on the event server. However, if you just want to view
Tivoli Enterprise Console events through the portal, you do not need to install the
event synchronization. In this case, select an Event Group and not dynamic filter
as the filter type.
To view events through the Tivoli Enterprise Console view in Tivoli Enterprise
Portal, see the online help or the IBM Tivoli Monitoring User’s Guide for information
about adding the event viewer to your workspace.
To filter the types of events that are displayed in the Tivoli Enterprise Console
view, see the IBM Tivoli Monitoring Administrator’s Guide.
The following table provides an overview of the steps required to install and
configure the event synchronization:
Table 28. Tivoli Enterprise Console event synchronization installation and configuration
steps
Step Where to find information
Plan the deployment of your integration. “Planning the deployment of your IBM
Tivoli Enterprise Console integration” on
page 86
Gather information required during the “Information to gather before you begin” on
installation and configuration processes. page 89
Install the event synchronization on your “Installing event synchronization on your
event server. event server” on page 89
Install monitoring agent .baroc files on the “Installing monitoring agent .baroc files on
event server. the event server” on page 101
Configure your monitoring server to “Configuring your monitoring server to
forward events to Tivoli Enterprise Console. forward events” on page 102
Start and stop event synchronization on the “Starting and stopping the Situation Update
event server. Forwarder process” on page 103
Modify the configuration of event “Changing the configuration of the event
synchronization as your monitoring needs synchronization on the event server” on
change. page 103
Define additional monitoring servers to the “Defining additional monitoring servers to
event server. the event server” on page 104
Change the default TCP/IP settings if it is “Changing the TCP/IP timeout setting on
taking a long time to forward events back to your event server” on page 104
the monitoring server.
Figure 10. One or more hub monitoring servers connecting to a single event server
For this configuration, you must install the Tivoli Enterprise Console event
synchronization component on each event server, and you must specify each
situation event and the event server to which the situation event is forwarded. You
cannot forward the same situation event to more than one event server. For
information about forwarding events, see the IBM Tivoli Monitoring Administrator's
Guide.
Figure 12. Multiple hub monitoring servers and multiple event servers in a hub and spoke configuration
For this configuration, you must install the Tivoli Enterprise Console event
synchronization component on the hub event server. You must also load the
omegamon.baroc and Sentry.baroc files on the spoke event servers, as described in
“Modifying an existing rule base” on page 100. In addition, you must load each
.baroc file for any monitoring agent generating situations that are forwarded to
spoke event servers, as described in “Installing monitoring agent .baroc files on the
event server” on page 101.
When you install the event synchronization on your event server, the following
changes are made:
v If you select to use an existing rule base, the event synchronization .baroc class
files (omegamon.baroc and Sentry.baroc [if not present]) and the omegamon.rls
rule set file are imported into your existing rule base.
where <operating_system> is the operating system you are installing on. For
example, run the following command on an AIX computer:
setupAix.bin
2. Click Next on the Welcome window.
3. Select I accept the terms in the license agreement and click Next.
4. Complete the following fields and click Next:
Table 29. IBM Tivoli Enterprise Console event synchronization configuration fields
Field Description
Name of configuration file The name of the file where event
synchronization configuration information is
stored. The default name is situpdate.conf.
5. Complete the following information about the files where events will be
written and click Next:
Table 30. IBM Tivoli Enterprise Console event synchronization configuration fields,
continued
Field Description
Maximum size of any single cache file, in The maximum permitted size, in bytes, for
bytes any one event cache file. The minimum (and
default) value is 50000. Do not use commas
when specifying this value (specify 50000
instead of 50,000).
Maximum number of caches files The maximum number of event caches files
at any given time. The minimum value is 2,
while the default value is 10. When this
value is reached, the oldest file is deleted to
make room for a new file.
Directory for cache files to reside The location where event cache files are
located. The default locations are as follows:
v On Windows:
C:\tmp\TME\TEC\OM_TEC\persistence.
v On UNIX:
/var/TME/TEC/OM_TEC/persistence
You must stop and restart the event server for these changes to take effect.
where <operating_system> is the operating system you are installing on. For
example, run the following command on an AIX computer:
setupAix.bin -console
The following prompt is displayed:
Press 1 for Next, 3 to Cancel or 4 to Redisplay [1]
2. Type 1 to start the installation and press Enter.
The following prompt is displayed:
Software Licensing Agreement:
Press Enter to display the license agreement on your screen. Please
read the agreement carefully before installing the Program. After
reading the agreement, you will be given the opportunity to accept it
or decline it. If you choose to decline the agreement, installation
will not be completed and you will not be able to use the Program.
3. Press Enter to display the software license agreement.
4. Type 1 and press Enter to accept the license.
The following prompt is displayed:
Press 1 for Next, 2 for Previous, 3 to Cancel, or 4 to Redisplay [1]
5. Type 1 and press Enter to continue.
The following prompt is displayed:
Name of configuration file [situpdate.conf]
6. Press Enter to use the default configuration file, situpdate.conf. If you want to
use a different configuration file, type the name and press Enter.
The following prompt is displayed:
Number of seconds to sleep when no new situation updates [1]
7. Type the number of seconds that you want to use for the polling interval. The
default value is 3, while the minimum value is 1. Press Enter.
The following prompt is displayed:
Number of bytes to use to save last event [50]
8. Type the number of bytes to use to save the last event and press Enter. The
default and minimum value is 50.
The following prompt is displayed:
URL of the CMS SOAP server [cms/soap]
9. Type the URL for the monitoring server SOAP server and press Enter. The
default value is cms/soap (which you can use if you set up your monitoring
server using the defaults for SOAP server configuration).
The following prompt is displayed:
Rate for sending SOAP requests to CMS from TEC via Web Services [10]
10. Type maximum number of event updates to send to the monitoring server at
one time and press Enter. The default and minimum value is 10.
The following prompt is displayed:
[x] 1 low
[ ] 2 med
[ ] 3 verbose
To select an item enter its number, or enter 0 when you are finished: [0]
11. Type the level of debugging that you want to use and press Enter. The default
is Low, indicated by an x next to Low.
12. Type 0 when you have finished and press Enter.
The following prompt is displayed:
Press 1 for Next, 2 for Previous, 3 to Cancel, or 4 to Redisplay [1]
13. Type 1 and press Enter to continue.
The following prompt is displayed:
Maximum size of any single cache file, in bytes [50000]
14. Type the maximum size, in bytes, for the cache file and press Enter. The
default is 50000. Do not use commas (,) when specifying this value.
The following prompt is displayed:
Maximum number of cache files [10]
15. Type the maximum number of cache files to have at one time and press Enter.
The default is 10, while the minimum is 2.
On Windows, the following prompt is displayed:
Directory for cache files to reside [C:/tmp/TME/TEC/OM_TEC/persistence]
On UNIX, the following prompt is displayed:
Directory for cache files to reside [/var/TME/TEC/OM_TEC/persistence]
16. Type the directory for the cache files and press Enter. The default directory on
Windows is C:\tmp\TME\TEC\OM_TEC\persistence; on UNIX,
/var/TME/TEC/OM_TEC/persistence.
The following prompt is displayed:
Press 1 for Next, 2 for Previous, 3 to Cancel, or 4 to Redisplay [1]
17. Type 1 and press Enter to continue.
18. The following prompt is displayed:
--- Tivoli Enterprise Monitoring Server 1 ---
Host name []
Type the fully qualified host name for the computer where the monitoring
server is running. This should match the information that will be in events
coming from this monitoring server. Press Enter.
The following prompt is displayed:
User ID []
19. Type the user ID to use to access the computer where the monitoring server is
running and press Enter.
The following prompt is displayed:
Password:
20. Type the password to access the computer and press Enter.
The following prompt is displayed:
Confirmation:
21. Type the password again to confirm it and press Enter.
The following prompt is displayed:
Host name []
22. Repeat steps 18 to 21 for each monitoring server for which you want to
receive events on this event server.
When you have provided information for all the monitoring servers and you
specified information for less than 10 monitoring servers, press Enter to move
through the remaining fields defining additional monitoring servers. Do not
specify any additional monitoring server information.
23. When you see the following prompt, type 1 and press Enter to continue:
Press 1 for Next, 2 for Previous, 3 to cancel or 4 to Redisplay [1]
The following prompt is displayed:
[x] 1 - Create a new rulebase (name and path required)
[ ] 2 - Use Existing Rulebase (path is optional)
To select an item, enter its number, or press 0 when you are finished: [0]
24. Type 1 to create a new rule base or 2 to use an existing rule base. Press Enter.
25. Type 0 when you are finished and press Enter.
26. If you are creating a new rule base, the following prompt is displayed:
Rulebase Name []
type the name for the rule base and press Enter.
The following prompt is displayed:
Rulebase Path []
27. If you are creating a new rule base, type the path for the new rule base and
press Enter.
28. If you are using an existing rule base, the following prompt is displayed:
Rulebase Name []
If you want to import an existing rule base into the new rule base, type the
name of the existing rule base and press Enter.
The following prompt is displayed:
Press 1 for Next, 2 for Previous, 3 to Cancel, or 4 to Redisplay [1]
30. Type 1 and press Enter to continue.
The event synchronization is installed.
The following prompt is displayed:
Installation and Configuration has completed. Please stop and restart the
Tivoli Enterprise Console Server.
You must stop and restart the event server for these changes to take effect.
where filename is the name of the configuration file to create, for example,
es_silentinstall.conf.
On UNIX:
setup<operating_system>.bin -options-template filename
where <operating_system> is the operating system you are installing on. For
example, run the following command on an AIX computer:
setupAix.bin -options-template filename
2. Edit the output file to specify the following values.
Notes:
a. Remove the pound signs (###) from the beginning of any value that you
want to specify.
b. Do not enclose any values in quotation marks (").
c. You must specify the following values:
v configInfoPanel2.fileLocn
v Information for at least one monitoring server (the
cmdSvrsPnlNotGuiMode.hostname1, cmdSvrsPnlNotGuiMode.userID1,
cmdSvrsPnlNotGuiMode.pswd1, and
cmdSvrsPnlNotGuiMode.retypePswd1 values)
v rulebasePanel.chooseNewOrExistingRB
v rulebasePanel.rbName
If you are creating a new rule base, rulebasePanel.rbPath is also required.
If you do not specify any of the other values, the default values are used.
d. For your monitoring servers, use the cmdSvrsPnlNotGuiMode.<value>
values.
e. If you specify values, ensure that the value you specify meets the minimum
required values. Otherwise, the installation stops and an error is written to
the log file.
Table 31. IBM Tivoli Enterprise Console event synchronization configuration values
Value Description
configInfoPanel.filename The name of the file where event
synchronization configuration information is
stored. The default file name is
situpdate.conf.
configInfoPanel.pollingInt The polling interval, in seconds. The
minimum value is 1, while the default value
is 3. If there are no situation events, the
process that forwards events to IBM Tivoli
Enterprise Console rests for 3 seconds.
configInfoPanel.crcByteCnt Number of bytes that the long running
process will use when it saves the location
of the last event it processes. This value
must be an integer. The minimum (and
default) is 50.
where <operating_system> is the operating system you are installing on. For
example, on AIX, run the following command:
setupAix.bin -options filename -silent
You must stop and restart the event server for these changes to take effect.
If you specified the monitoring servers in the silent installation configuration file,
you might consider deleting that file after installation, for security reasons.
If you want to define additional monitoring servers (in addition to the one
required monitoring server), run the following command to add them now:
sitconfsvruser.sh add serverid=server userid=user password=password
where:
serverid=server
The fully qualified host name of the monitoring server.
userid=user
The user ID to access the computer where the monitoring server is
running.
password=password
The password to access the computer.
If you specified your monitoring servers after the installation, you must stop and
restart the Situation Update Forwarder process manually. See “Starting and
stopping the Situation Update Forwarder process” on page 103 for information.
Before you can run any of the commands in the following sections, you must
source your Tivoli environment by running the following command:
See the IBM Tivoli Enterprise Console Command and Task Reference for more
information about the wrb, wstopesvr, and wstartesvr commands.
where <newrb_path> is the path to where you want to create the new rule base
and <newrb_name> is the name for the new rule base.
2. Import the event synchronization class and rule files into the new rule base.
These class and rule files are located in the new rule base that you created
when you installed the event synchronization. Run the following commands:
wrb -imprbclass <path_to Sentry_baroc_file> <newrb_name>
wstartesvr
where <newrb_path> is the path to where you want to create the new rule base
and <newrb_name> is the name for the new rule base.
2. Import the existing rule base into the new rule base by running the following
commands:
wrb -cprb -overwrite <existing_rbname> <newrb_name>
where <existing_rbname> is the name of the existing rule base that you want to
import.
3. If the existing rule base is an older rule base, you must upgrade the tec.baroc
file to include the TEC_Generic class. Run the following command:
perl $BINDIR/TME/TEC/OM_TEC/bin/upg_tec_baroc.pl <newrb_name>
4. If the rule base already contains a Sentry.baroc file, you must upgrade it with
the event synchronization event class attributes. Run the following command:
perl $BINDIR/TME/TEC/OM_TEC/bin/upg_sentry_baroc.pl
5. If the rule base does not contain a Sentry.baroc file, you must import it from
the rule base you created during event synchronization installation. Run the
following command:
wrb -imprbclass <path_to_Sentry_baroc_file> <newrb_name>
where <path_to_Sentry_baroc_file> is the path to the new rule base that you
created during event synchronization installation.
6. Import the omegamon.baroc and rules file into the rule base from the new rule
base that you created during event synchronization installation. Run the
following commands:
wrb -imprbclass <path_to_omegamon_baroc_file> <newrb_name>
wstartesvr
wstartesvr
After you have added application support for each agent to the monitoring server,
the monitoring agent .baroc files are located in the following directory:
v On Windows, in the <itm_installdir>\cms\TECLIB directory, where
<itm_installdir> is the directory where you installed IBM Tivoli Monitoring.
v On Linux and UNIX, in the <itm_installdir>/tables/<ms_name>/TECLIB
directory, where <itm_installdir> is the directory where you installed IBM Tivoli
Monitoring and <ms_name> is the name of the monitoring server.
Use the following steps to install the monitoring agent .baroc files on the event
server:
1. Copy the monitoring agent .baroc files from the computer where the
monitoring server is installed to a temporary directory on the event server
computer (for example, /tmp). The location of the agent .baroc files is
described above. Do not copy the om_tec.baroc file; this file contains classes
that are duplicates of classes in the omegamon.baroc file.
2. Set up the Tivoli Management Framework environment by running the
following command:
On Windows, run the following command:
C:\WINDOWS\system32\drivers\etc\Tivoli\setup_env.cmd
On Linux and UNIX, run the following command from a shell environment:
. /etc/Tivoli/setup_env.sh
3. For each monitoring agent .baroc file to load into the rule base, run the
following command from the same command prompt:
wrb -imprbclass /tmp/<agent_baroc_file> <rb_name>
where:
Chapter 6. Installing the IBM Tivoli Enterprise Console event synchronization 101
/tmp/<agent_baroc_file>
Specifies the location and name of the monitoring agent .baroc file. The
example above uses the /tmp directory as the location.
rb_name
The name of the rule base that you are using for event synchronization.
4. Compile and load the rule base by running the following commands
wrb -comprules <rb_name>
wstartesvr
When you have loaded each of the agent .baroc files into the rule base and
restarted the event server, the event server is ready to receive and correctly parse
any events it receives from the monitoring server from one of the installed
monitoring agents.
See the IBM Tivoli Enterprise Console Command and Task Reference for more
information about the wrb, wstopesvr, and wstartesvr commands.
For UNIX monitoring servers: You configured the TEC Server and TEC Port
information for the UNIX monitoring server during installation, if you installed the
monitoring server using the configuration instructions in this installation guide.
On Windows:
startSUF.cmd
On UNIX:
startSUF.sh
On Windows:
stopSUF.cmd
On UNIX:
stopSUF.sh
On Windows, you can also start and stop the Tivoli Situation Update Forwarder
service to start or stop the forwarding of event updates. You can start and stop this
service either from the Windows Service Manager utility or with the following
commands:
net start situpdate
net stop situpdate
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process. See “Starting
and stopping the Situation Update Forwarder process” for information.
Chapter 6. Installing the IBM Tivoli Enterprise Console event synchronization 103
Defining additional monitoring servers to the event server
Run the following command to add additional monitoring servers to the list from
which you want to receive events:
sitconfsvruser.sh add serverid=server userid=user password=password
where:
serverid=server
The fully qualified host name of the monitoring server.
userid=user
The user ID to access the computer where the monitoring server is
running.
password=password
The password to access the computer.
You can also delete monitoring servers. See “sitconfsvruser.sh” on page 236 for the
full syntax of this command.
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process. See “Starting
and stopping the Situation Update Forwarder process” on page 103 for
information.
Use the following steps to change the TCP/IP timeout for your computer.
Note: You can also perform many of these configuration and start and stop
procedures from the command line. Where this is possible, the command is
included. See Appendix E, “Command reference,” on page 187 for a
complete description, including parameters, of the commands that you can
use in the installation and configuration of IBM Tivoli Monitoring.
You can perform the following tasks with the Manage Tivoli Enterprise Monitoring
Services tool:
Table 32. Configuration tasks available through Manage Tivoli Enterprise Monitoring
Services
Task Where to find information
Start Manage Tivoli Enterprise Monitoring “Starting Manage Tivoli Enterprise
Services Monitoring Services”
Change the configuration of the monitoring “Changing the configuration of the Tivoli
server Enterprise Monitoring Server” on page 106
Configure agents and other monitoring “Configuring or changing the monitoring
components server connection for agents” on page 107
Start and stop components “Starting and stopping components” on
page 108
Configure security “Configuring user security” on page 109
Configure failover support for monitoring “Configuring failover support” on page 110
servers
Add application support to the monitoring “Adding application support to the
server monitoring server” on page 112
Monitor the status of remote monitoring “Configuring the heartbeat interval” on page
servers and agents by configuring heartbeat 114
monitoring.
where:
Table 33. Parameters for the itmcmd manage command
-h (optional) An option used to specify the
installation directory.
install_dir The installation directory for IBM Tivoli
Monitoring.
-s (optional) Option to specify safe mode
operation.
Note: Note that the Platform column for agents lists the platform that the binary
code was built on, not the platform that you are running on.
On Linux and UNIX, you can also use the itmcmd config -S command to change
the configuration of a monitoring server.
On Linux and UNIX, you can also use the itmcmd config -A command to change
the configuration of a monitoring agent.
Note: Note that the Platform column for agents lists the platform that the binary
code was built on, not the platform that you are running on.
You can also use the following commands to start and stop components:
itmcmd server
Starts and stops a UNIX monitoring server.
itmcmd agent
Starts and stops a UNIX monitoring agent
108 IBM Tivoli Monitoring: Installation and Setup Guide
tacmd startAgent
Starts both Windows and UNIX monitoring agents.
tacmd stopAgent
Stops both Windows and UNIX monitoring agents.
See Appendix E, “Command reference,” on page 187 for the syntax of these
commands.
There are three steps to enabling user security in your monitoring environment:
1. “Enabling security on the hub monitoring server”
2. “Creating a user on the Tivoli Enterprise Portal”
3. Define a matching user ID with password to the network domain user accounts
or to the operating system where the hub monitoring server resides:
v User Accounts on Windows
v Password file on UNIX
v RACF® or ACF/2 host security system on OS/390® or z/OS
See your operating system documentation for information on creating users.
There is no automatic switch that returns control to the hub monitoring server
when it is available. If you want to switch back to the hub monitoring server, you
must manually stop the backup monitoring server.
However, if you have previously installed your hub monitoring server and are
now setting up failover support, the two monitoring servers might not be in synch
if you add the default application support to the backup monitoring server during
install. Any changes that you made to situations on the hub monitoring server are
not replicated on the backup monitoring server. To address this issue, use the
following steps to add applications support to your backup monitoring server.
For a Windows backup monitoring server, install the monitoring server using the
installation program. When you come to the step to add application support, click
Cancel instead of OK. When your installation is complete, start the backup
monitoring server. The backup monitoring server connects to the hub monitoring
server and automatically synchronizes with it.
The -m parameter copies the support files to the monitoring server without adding
it. When you are finished, start the backup monitoring server. The backup
monitoring server connects to the hub monitoring server and automatically
synchronizes with it.
After the initial configuration of your backup monitoring server, if you add an
application to the hub monitoring server, you can add application support to both
monitoring servers at the same time.
Note: The hub and backup monitoring servers should be configured as mirrors of
each other.
1. In Manage Tivoli Enterprise Monitoring Services, right-click the name of the
hub monitoring server and click Reconfigure (or Configure on UNIX).
2. Do the following on Windows:
a. Select Configure Standby TEMS.
b. Enter the name of this monitoring server and specify the protocols used by
the standby server. These protocols should be the same for both monitoring
servers (the hub and the standby).
c. Click OK.
d. Type the host name or IP address for the hub monitoring server and click
OK on the window that displays the communication settings for this server.
e. Type the host name or IP address for the standby monitoring server in the
Hostname or IP Address field and click OK.
3. Do the following on UNIX:
a. Click the Advanced Settings tab.
b. Select Specify Hot Standby.
c. Type the host name for the backup monitoring server in the Standby TEMS
Site field.
d. Select the type of protocol to use for hot standby. This should be the same
protocol on both the hub monitoring server and the monitoring server you
are going to use for failover support.
e. If you specified any backup protocols for the hub monitoring server,
identify identical protocols for the backup monitoring server.
f. Click Save.
4. Stop and restart the monitoring server. (On Windows, the monitoring server
stops automatically.)
5. Repeat these steps for the backup monitoring server and any remote
monitoring servers.
Note: If the application support is for an agent that reports to a remote monitoring
server, complete this process for both the hub and the remote monitoring
server. A hub monitoring server should be running before proceeding to
install the application support on a remote monitoring server.
Note: To view the Node ID, right-click the monitoring server and click Browse
Settings.
5. Select the products for which you want to add application support. Click Select
All to choose all available products. Click OK.
6. When the process is complete, a message is displayed containing information
about the procedure. Click Close.
7. If the monitoring server is not already stopped, stop it.
8. Restart the monitoring server.
where:
Table 36. Parameters for the itmcmd support command
-h (optional) Parameter to specify the
installation directory if it is not the one in
which this script is located. Usually not
necessary. Also use this option to take action
on an installation directory other than this
one.
install_dir The home directory that you created for IBM
Tivoli Monitoring.
-s (optional) Option to specify safe mode
operation.
The hub monitoring server maintains status for all monitoring agents. Remote
monitoring servers offload processing from the hub monitoring server by receiving
and processing heartbeat requests from monitoring agents, and communicating
only status changes to the hub monitoring server.
v At the highest level, the hub monitoring server receives heartbeat requests from
remote monitoring servers and from any monitoring agents that are configured
to access the hub monitoring server directly (rather than through a remote
monitoring server). The default heartbeat interval used by remote monitoring
servers to communicate their status to the hub monitoring server is 3 minutes.
v At the next level, remote monitoring servers receive heartbeat requests from
monitoring agents that are configured to access them. The default heartbeat
interval used by monitoring agents to communicate their status to the
monitoring server is 10 minutes.
You can specify the heartbeat interval for a node by setting the
CTIRA_HEARTBEAT environment variable. For example, specifying
CTIRA_HEARTBEAT=5 sets the heartbeat interval to 5 minutes.
v For remote monitoring agents, you can set this variable by adding an entry to
the KBBENV file. You can access this file from Manage Tivoli Enterprise
Monitoring Services by right-clicking Tivoli Enterprise Monitoring Server and
clicking Advanced → Edit ENV File. You must stop and restart the monitoring
server for changes to the KBBENV file to take effect.
v For Windows OS agents, you can set this variable by adding the entry to the
KNTENV file. You can access this file from Manage Tivoli Enterprise Monitoring
Services by right-clicking Windows OS Monitoring Agent and clicking
When a monitoring agent becomes active and sends an initial heartbeat request to
the monitoring server, it communicates the desired heartbeat interval for the agent
in the request. The monitoring server stores the time the heartbeat request was
received and sets the expected time for the next heartbeat request based on the
agent heartbeat interval. If no heartbeat interval was set at the agent, the default
value is used.
Changes to offline status typically require two missed heartbeat requests for the
status to change. Offline status is indicated by the node being ″grayed out″ in the
portal client Navigator View. If the heartbeat interval is set to 10 minutes, an
offline status change would be expected to take between 10 and 20 minutes before
it is reflected on the portal client Navigator View.
Firewall support
IBM Tivoli Monitoring supports firewalls using the IP.PIPE communications
protocol, which supports network address translation (NAT). Agents connecting to
the monitoring server must use the IP.PIPE communications protocol.
If your site is using address translation, you must create a partition file, a text file
containing the name of a partition and its constituent interface address. You must
create or modify this file before implementing firewall support with the CMS and
agents.
A partition file is a standard text file (like this one) and is defined to the system
using the KDC_PARTITIONFILE environment variable. Within this file, each line
describes a partition name with its constituent IP addresses using space delimited
tokens. The format is as follows:
PARTITION-ID IP.PIPE:nn.nn.nn.nn IP.PIPE:nn.nn.nn.nn
When you install IBM Tivoli Monitoring, the Global Sign-On Toolkit (GSKit) and
iKeyman utilities are installed by default on all components. These utilities are
used to create and manage the encryption of data between components through
the use of digital certificates.
Digital certificates are the vehicle that SSL uses for public-key cryptography.
Public-key cryptography uses two different cryptographic keys: a private key and a
public key. Public-key cryptography is also known as asymmetric cryptography,
because you can encrypt information with one key and decrypt it with the
complement key from a given public-private key pair.
Public-private key pairs are simply long strings of data that act as keys to a user's
encryption scheme. The user keeps the private key in a secure place (for example,
encrypted on a computer’s hard drive) and provides the public key to anyone with
whom the user wants to communicate. The private key is used to digitally sign all
secure communications sent from the user; the public key is used by the recipient
to verify the sender’s signature.
Public-private key pairs are validated by a trusted third party, called a Certificate
Authority (CA). An example of a CA is Verisign. If you are setting up your own
key pairs, you submit them to the CA for validation.
For additional information about using public-private key pairs, see the iKeyman
documentation available at http://www-
1.ibm.com/support/docview.wss?uid=pub1sc32136300.
If you want to use Secure Socket Layer communication between the portal server
and the portal client, use the following steps to enable it:
On a Windows system:
1. In the Manage Tivoli Enterprise Monitoring Services window, right-click Tivoli
Enterprise Portal Server.
2. Click Advanced → Configure TEPS Interfaces.
3. Highlight cnps and click Edit in the TEPS Interface Definitions window.
4. Select Enable SSL for TEP Clients.
5. Click OK to save your changes and close the window.
6. Recycle the service by stopping and starting it.
On a Linux system:
1. Change to the install_dir/bin directory
2. Run the following command:
./itmcmd manage
3. In the Manage Tivoli Enterprise Monitoring Services window, right-click Tivoli
Enterprise Portal Server.
4. Click Configure
5. In the first tab, select Enable SSL for TEP Clients to enable SSL in the Tivoli
Enterprise Portal Server window.
6. Click OK to save your changes and close the window.
7. Recycle the service by stopping and starting it.
Important: If you do not use the recommended names for the key database, stash
file, and certificate label as described below, you must change the
following environment variables in the KFWSERVICES file on the
portal server:
v KDEBE_KEYRING_FILE=C:\IBM\ITM\keyfiles\keyfile.kdb
v KDEBE_KEYRING_STASH=C:\IBM\ITM\keyfiles\keyfile.sth
v KDEBE_KEY_LABEL=IBM_Tivoli_Monitoring_Certificate
Send the file to a CA to request a new digital certificate, or cut and paste the
request into the request forms on the CA's Web site.
When you receive the CA-signed certificate, you need to delete the self-signed
certificate.
For information on all of these steps, see the iKeyman documentation available at
http://www-1.ibm.com/support/docview.wss?uid=pub1sc32136300.
Use the following steps to receive the digital certificate from the CA into key
database on each computer.
1. Start iKeyman.
2. Click Key Database File → Open.
3. Select the keyfile.kdb database and click Open.
4. Type the password for the database and click OK.
5. Select Personal Certificates from the pull-down list.
6. Click Receive.
7. Click Data type and select the data type of the new digital certificate, such as
Base64-encoded ASCII data.
8. Type keyfile.sth for the Certificate file name and
<itm_installdir>/keyfiles as the Location for the new digital certificate.
9. Click OK.
10. Type IBM_Tivoli_Monitoring_Certificate for the new digital certificate and
click OK.
Disabling SSL
If you do not want to use Secure Socket Layer communication between IBM Tivoli
Monitoring components and the Tivoli Enterprise Portal Server, use the following
steps to disable it:
1. In Manage Tivoli Enterprise Monitoring Services, right-click Tivoli Enterprise
Portal Server.
2. Click Advanced → Edit ENV file.
3. Find the following line:
kfw_interface_cnps_ssl=Y
4. Change the Y to N.
5. Save the file and exit.
6. Click Yes when you are asked if you want to recycle the service.
If the site does not start automatically, right-click it and click Start.
Browser client
During installation, the IBM Tivoli integral Web server is installed as a component
of the Tivoli Enterprise Portal Server. You can also use an external Web server on
your Tivoli Enterprise Portal Server computer, as shown in “Firewall scenarios for
Tivoli Enterprise Portal” on page 128.
Currently, IBM supports an external Web server for browser client access only
when installed on the same computer as the Tivoli Enterprise Portal Server.
Desktop client
Although the desktop client does not need a Web server to start Tivoli Enterprise
Portal, it does use it for common files stored on the Tivoli Enterprise Portal Server,
such as the graphic view icons and style sheets. If your Tivoli Enterprise Portal
Server setup disables the integral Web server and uses only an external Web server,
you need to specify the Interoperable Object Reference (IOR) for every desktop
client.
Note: The line is very long and has various options on it, including several
other –D options to define other properties. It is very important to add
the option in the correct place.
If the last line of your bin/cnp.sh originally looked like this:
To set the browser location to /opt/foo/bin/launcher, change the line to look like the
following:
${JAVA_HOME}/bin/java -showversion -noverify -classpath ${CLASSPATH}
-Dkjr.browser.default=/opt/foo/bin/launcher
-Dkjr.trace.mode=LOCAL -Dkjr.trace.file=/opt/IBM/ITM/logs/kcjras1.log
-Dkjr.trace.params=ERROR -DORBtcpNoDelay=true -Dcnp.http.url.host=
-Dvbroker.agent.enableLocator=false
-Dhttp.proxyHost=
-Dhttp.proxyPort=candle.fw.pres.CMWApplet 2>& 1 >> ${LOGFILENAME}.log
Note: The Linux portal server does not support the use of multiple interfaces.
Figure 14 on page 129 shows a configuration that has or does the following:
v Has an intranet firewall
v Has no NAT
v Uses the integral Web server
The default Tivoli Enterprise Portal Server interface ″cnps″ is used. No additional
interface definitions are needed. Browser mode users, whether going through the
firewall or not, start Tivoli Enterprise Portal at
http://10.10.10.10:1920///cnp/client or substitute the host name for the IP
address.
For configurations using the integrated Web server and these port numbers, use
the default cnps interface definition.
In this scenario, the monitoring server and agents can be installed on the Tivoli
Enterprise Portal Server computer.
Figure 15 on page 130 shows a configuration that has or does the following:
v Has an intranet firewall
v Has no NAT
v Uses an external Web server (such as Apache or IIS)
Browser mode users, whether going through the firewall or not, start Tivoli
Enterprise Portal Server with http://10.10.10.10 or http://10.10.10.10/mydirectory
(where mydirectory is the alias), or substitute the host name for the IP address.
For intranet configurations using an external Web server, with no NAT, you do not
need to add a new interface definition. Web server port 80 is used automatically
when non is specified in the URL.
In this scenario, the monitoring server and agents can be installed on the Tivoli
Enterprise Portal Server computer.
Intranet users can enter the URL for either the integral Web server or the external
Web server: http//10.10.10.10:1920///cnp/client or http://10.10.10.10.
The Internet configuration requires a new Tivoli Enterprise Portal Server interface
definition: proxy host address 198.210.32.34 and port number 15002. The intranet
firewall uses the ″cnps″ definition.
In this scenario, the monitoring server and agents cannot be installed on the Tivoli
Enterprise Portal Server computer.
The intranet firewall configuration requires a new Tivoli Enterprise Portal Server
interface definition: proxy host 192.168.1.100 and port 15003.
The Internet DMZ configuration requires a new Tivoli Enterprise Portal Server
interface definition.
The Internet configuration uses the same Tivoli Enterprise Portal Server ″internet″
interface definition as the previous scenario: proxy host 198.210.32.34 and port
15002.
In this scenario, the monitoring server and agents cannot be installed on the Tivoli
Enterprise Portal Server computer.
The intranet firewall configuration uses the same Tivoli Enterprise Portal Server
interface definition (named ″intranet″) as in the previous scenario:
http://10.10.10.10; proxy host 192.168.1.100; and port 15003.
The intranet DMZ configuration uses the default Tivoli Enterprise Portal Server
interface definition. Tivoli Enterprise Portal Server interface definition: host
192.168.33.33; proxy host 198.210.32.34; port 15002; and proxy port 444.
In this scenario, the monitoring server and agents cannot be installed on the Tivoli
Enterprise Portal Server computer.
The following table describes the steps required to set up and manage remote
agent deployment:
Table 38. Remote agent deployment tasks
Goal Where to find information
Create and populate the agent deploy depot “Populating your agent depot”
with installable agent images.
View and change the contents of the agent “Managing your agent depot” on page 139
depot.
Use one agent depot for all the monitoring “Sharing an agent depot across your
servers in your monitoring environment. environment” on page 139
Deploy an OS agent. “Deploying OS agents” on page 140
Deploy a non-OS agent. “Deploying non-OS agents” on page 142
You can also use the remote agent deployment function to configure deployed
agents and install maintenance on your agents. For information, see the IBM Tivoli
Monitoring Administrator's Guide. You can also see the Appendix E, “Command
reference,” on page 187 for the commands that you can use to perform these tasks.
When you add a bundle to the agent depot, you need to add the bundle that
supports the operating system to which you want to deploy the bundle. Because
the different IBM Tivoli Monitoring components provide different CDs for each
platform type (for example, Windows, AIX and Solaris, HP-UX, Linux), you need
to add the bundle from the specific platform CD for the component. For example,
if you want to deploy a DB2 agent bundle to a computer running HP-UX, add the
HP-UX-specific agent bundle to the depot. If your depot directory is on Windows
and you want to deploy the DB2 agent to HP-UX, load the HP-UX bundle from
the DB2 agent CD for HP-UX.
You can have an agent depot on each monitoring server in your environment or
share an agent depot, as described in “Sharing an agent depot across your
environment” on page 139. If you choose to have an agent depot for each
monitoring server, you can customize the agent depot based on the types of
You can use the installation image to populate the agent depot only when you are
populating the depot with bundles for the same operating system as your
monitoring server. For example, you can use the installation image to add a bundle
for a Windows agent to a Windows monitoring server, but you cannot use the
Linux installation image to add a Linux bundle to a Windows monitoring server. If
you need to add bundles for operating systems other than that used by your
monitoring server, use the tacmd addBundles command, as described in
“Populating the agent depot with the tacmd addBundles command” on page 138.
Base IBM Tivoli Monitoring installation image: Use the following steps to
populate the agent depot from the IBM Tivoli Monitoring installation image:
1. Launch the installation wizard by double-clicking the setup.exe file in the
\Windows subdirectory of the installation image.
2. Select Modify on the Welcome window and click Next.
3. Click OK the warning message regarding existing components on this
computer.
4. Click OK on the Add or Remove Features window without making any
changes. (Do not clear any selected items because this removes them from the
computer.)
5. On the Agent Deployment window, select the agents that you want to add to
the depot and click Next.
6. Review the installation summary and click Next to begin the installation.
After the agents are added to the agent depot, a configuration window (called
the Setup Type window) is displayed.
7. Clear all selected components. You have already configured all components on
this computer and do not need to reconfigure any now. Click Next.
8. Click Finish to complete the installation.
9. Click Finish on the Maintenance Complete window.
For the full syntax, including parameter descriptions, see “tacmd addBundles” on
page 188.
Examples:
v The following example copies every agent bundle, including its prerequisites
into the agent depot on a UNIX from the installation media (cd image) located
at /mnt/cdrom/:
tacmd addbundles -i /mnt/cdrom/unix
v The following example copies all agent bundles for the Oracle agent into the
agent depot on a UNIX computer from the installation media (cd image) located
at /mnt/cdrom/:
tacmd addbundles -i /mnt/cdrom/unix -t or
v The following example copies all agent bundles for the Oracle agent into the
agent depot on a Windows computer from the installation media (cd image)
located at D:\WINDOWS\Deploy:
tacmd addbundles -i D:\WINDOWS\Deploy -t or
v The following example copies the agent bundle for the Oracle agent that runs on
the AIX version 5.1.3 operating system into the agent depot on a UNIX
computer from the installation media (cd image) located at /mnt/cdrom/:
tacmd addbundles -i /mnt/cdrom/unix -t or -p aix513
By default, the tacmd addBundles command puts the agent bundle in the location
defined in the monitoring server configuration file for DEPOTHOME. If you want
to change this location, do the following before you run the tacmd addBundles
command:
1. Open the KBBENV monitoring server configuration file located in the
<itm_installdir>\CMS directory on Windows and the
<itm_installdir>/tables/<tems_name> directory on Linux and UNIX.
2. Locate the DEPOTHOME variable. By default, the agent depot is located in the
<itm_installdir>/CMS/depot directory on Windows and
<itm_installdir>/tables/<tems_name>/depot directory on UNIX.
3. Type the path to the directory that you want to use for the agent depot.
4. Save and close the file.
See the Appendix E, “Command reference,” on page 187 for the full syntax of these
commands.
After populating your agent depot with either of the methods described in
“Populating your agent depot” on page 135, use the following steps to share the
agent depot:
1. Open the KBBENV monitoring server configuration file located in the
<itm_installdir>\CMS directory on Windows and the
<itm_installdir>/tables/<tems_name> directory on Linux and UNIX.
2. Locate the DEPOTHOME variable. By default, the agent depot is located in the
<itm_installdir>/CMS/depot directory on Windows and
<itm_installdir>/tables/<tems_name>/depot directory on UNIX.
3. Type the path to the shared agent depot for the DEPOTHOME variable.
4. Save and close the file.
Deploying OS agents
Before you can deploy any non-OS agent, you must first install an OS agent on the
computer where you want the non-OS agent to be deployed. In addition to
monitoring base OS performance, the OS agent also installs the required
infrastructure for remote deployment and maintenance.
Note: Ensure that you have populated your agent depot, as described in
“Populating your agent depot” on page 135, before attempting to deploy
any agents.
You can install the OS agent locally, as described in “Installing monitoring agents”
on page 64 or remotely using the tacmd createNode command.
The tacmd createNode command creates a directory on the target computer called
the node. This is the directory into which not only the OS agent is installed, but
where any non-OS agents are deployed.
The tacmd createNode command uses one of the following protocols to connect to
the computers on which you want to install the OS agent:
v Server Message Block (SMB), used primarily for Windows servers
v Secure Shell (SSH), used primarily by UNIX servers, but also available on
Windows
v Remote Execution (REXEC), used primarily by UNIX servers, but not very
secure
v Remote Shell (RSH), used primarily by UNIX servers, but not very secure
You can specify a protocol to use; if you do not, the tacmd createNode command
selects the appropriate protocol dynamically.
Note: If you are using private key authentication in your environment, you do
not need to set SSH to permit password authentication.
For the full syntax, include parameter descriptions, see “tacmd createNode” on
page 196.
For example, the following command deploys the UNIX OS monitoring agent on
the server1.ibm.com computer in the /opt/IBM/ITM directory. The installation is
done as the root user.
Important: Unless you specifically indicate otherwise, the agent that you deploy
using this command assumes that the monitoring server to which it
connects is the monitoring server from which you run the command.
The agent also uses the default settings for the communications
protocol (IP.PIPE for protocol type and 1918 for the port). To change
these defaults (especially if you are not using the IP.PIPE protocol), use
the following property (specified with the -p parameter) when running
the command: SERVER=[PROTOCOL://][HOST|IP][:PORT]. For
example, SERVER=IP.PIPE://server1.ibm.com:1918.
See “tacmd addSystem” on page 190 for the full syntax of this command, including
parameter descriptions. See Appendix D, “IBM Tivoli Product Codes,” on page 185
for a list of product codes for agents. You can also run the cinfo command to list
the product codes for agents installed on the current computer.
Each agent bundle has its own unique configuration parameters that you need to
provide in this command. If you have an installed agent of the same type that you
want to deploy, you can view the configuration parameters by running the
following command:
tacmd describeSystemType -t pc -p platform
You can also get more information about agent-specific parameters in the agent
user's guide for the agent that you want to deploy.
The Tivoli Data Warehouse uses the Warehouse Proxy agent to move data from
monitoring agents or the monitoring server to the data warehouse database. The
Warehouse Proxy is an ODBC export server for warehousing historical data. It is a
special agent that uses an ODBC connection to transfer historical data collected
from agents to a database. You can then analyze this data using the workspaces in
the Tivoli Enterprise Portal or any third-party software.
Note: The Warehouse Proxy agent is supported only for Windows computers,
although your Tivoli Data Warehouse can use a database on a Linux or
UNIX computer.
If you do not intend to use historical reporting or save historical data to a database
for reference, then you do not need to install or configure the Warehouse Proxy.
The following table outlines the steps to configure the Warehouse Proxy:
Table 40. Warehouse Proxy configuration steps
Step Where to find information
Review the planning information regarding “Planning considerations for the Tivoli Data
estimating the size of database you need for Warehouse” on page 30
the amount of historical data you plan to
store in the Tivoli Data Warehouse.
Create the Warehouse Proxy user. “Creating a user for the Warehouse Proxy”
on page 147
Create the Tivoli Data Warehouse database. “Create the Tivoli Data Warehouse database”
on page 147
Create the ODBC connection to the database. “Setting up the ODBC connection” on page
148
If you are using a Microsoft SQL or Oracle database, you need to create a database
user. You must create this user manually before configuring the Warehouse Proxy,
as the configuration process does not create this user. See the documentation for
your database for information on how to create a database user.
If you are configuring multiple Warehouse Proxy agents to connect to the same
database, ensure that you use the same user ID and password for each Warehouse
Proxy. This enables the Tivoli Data Warehouse to store all received data in one set
of tables, as opposed to one table for each Warehouse Proxy.
Chapter 11. Configuring the Warehouse Proxy for the Tivoli Data Warehouse 147
If you are using Oracle V9.2, you must use upgrade the ODBC Driver to the 9.2.0.4
version or higher. You can download this driver from the Oracle company Web
site.
Also, if you are using an Oracle database, you must create the database with UTF8
encoding.
Before you create the Tivoli Data Warehouse database, review the database scaling
information in “Planning considerations for the Tivoli Data Warehouse” on page 30
to determine what size of database you need for your history collection. The
following procedure creates a very basic database; however, because your Tivoli
Data Warehouse will most likely need to be a large, high performance database,
have a database administrator create the database for you, following the
recommendations in “Planning considerations for the Tivoli Data Warehouse” on
page 30. Creating your database should include placing the database data files and
logs on multiple disks, possibly on SAN disks.
Use the following steps to create a basic database for the Warehouse Proxy.
Note: These steps are for IBM DB2. If you are using a different database, see that
database’s documentation for information.
1. Click Start → IBM DB2 → Command Line Tools → Command Window.
2. Run the following command:
db2 create database Warehous using codeset utf-8 territory US
You can use any database name - for this and the following configuration
procedure, we used the default of ″Warehous.″
3. Close the command window after the command runs.
After you set either of these environment variables, you must restart the Windows
computer.
You have two choices when defining your warehouse database and connection
information:
v Use the native Windows ODBC Data Source configuration (described in this
section)
v Reconfigure the Warehouse Proxy agent through Manage Tivoli Enterprise
Monitoring Services (as described in the next section)
If you are configuring multiple Warehouse Proxy agents to connect to the same
database, ensure that you use the same user ID and password in the ODBC
connection for each Warehouse Proxy. This enables the Tivoli Data Warehouse to
store all received data in one set of tables, as opposed to one table for each
Warehouse Proxy.
Use one of the following procedures to set up your ODBC connection through the
Windows ODBC Data Source configuration utility:
v “Setting up a connection to a local database”
v “Setting up a connection to a remote database” on page 150
Chapter 11. Configuring the Warehouse Proxy for the Tivoli Data Warehouse 149
Setting up a connection to a Microsoft SQL database
Use the following steps to set up a connection to a local Microsoft SQL database:
1. Open the Control Panel.
2. Click Administrative Tools → Data Sources (ODBC)
3. Click Add in the System DSN tab in the ODBC Data Source Administrator
window.
4. Select SQL Server and click Finish.
5. Enter ITM Warehouse in the Name field.
6. Select the Microsoft SQL server that you want to connect to from the
drop-down list and click Next.
7. Select With SQL Server authentication using a login ID and password
entered by the user.
8. Enter ITMUser for the Login ID.
9. Type the Password for the ITMUser ID. The default password is "itmpswd1."
10. Click Next.
11. Click Next again.
12. Click Finish.
13. Click Test Data Source to test the connection to the database.
14. Click OK.
Before you can connect to a remote database, you must install the database client
software for the database to which you want to connect on the computer where the
Warehouse Proxy is installed.
Note: These steps create the ODBC driver for IBM DB2 as an example of how this
is done. If you are using a different database, these steps might vary. See
that database’s documentation for information.
1. On the Windows computer where you are installing the Warehouse Proxy,
open the Control Panel.
Field Description
Database name Type the name of the database that you
want to create the ODBC connection to.
Database alias Type the alias for the database.
Host name Type the host name for the computer where
the database is installed.
Port number Type the port number used to communicate
with the computer where the database is
installed.
Chapter 11. Configuring the Warehouse Proxy for the Tivoli Data Warehouse 151
7. If you have not configured the ODBC data source connection or if you have
configured the data source and you did not use the default values, click Yes
and complete the following steps:
Note: These steps are based on a DB2 database. The steps might be different if
you are using a different database.
a. Select the database that you are using for the Warehouse Proxy and click
OK. You have the following choices:
v DB2
v SQL Server
v Oracle
v Other database type
b. Complete the following fields as appropriate:
Data Source Name
The name of the data source. The default is ″ITM Warehouse.″ If
you want to define a new data source, type a new name here.
Otherwise, leave the default value.
Database Name
The name of the database. If you used the steps in “Create the
Tivoli Data Warehouse database” on page 147 to create the database,
the name is "warehous." If you are defining a new data source and
want to specify a different database, type the name here. Otherwise,
leave the default value.
Admin User ID
The user ID for the database administrator. The default for DB2 is
″db2admin.″ This user ID is used to create the DB2 database for
Tivoli Data Warehouse.
Admin Password
The password for the database administrator. This password is used
to create the DB2 database for Tivoli Data Warehouse.
Database User ID
The name of the user that is used to connect to the Tivoli Data
Warehouse database. The default name is ″ITMUser.″
Database Password
Type a password for the database user. The default password is
"itmpswd1." If your environment requires complex passwords,
include a numeric character in the password.
Reenter Password
Confirm the password by typing it again.
c. If this information is different than what you used when you configured the
Tivoli Enterprise Portal Server, select Synchronize TEPS Warehouse
Information. This updates the portal server configuration with the same
values.
Note: This only applies when your portal server and warehouse proxy are
on the same computer.
d. Click OK.
Database initialization
When the Warehouse Proxy starts, the following tests are done:
v Checks that the Warehouse Proxy can connect to the database.
v If the database is Oracle or Microsoft SQL, checks that the encoding is set to
UTF8.
v If the database is DB2, checks that a bufferpool of page size 8KB is created. If it
is not, one is created, along with three new tablespaces that use the 8KB
bufferpool. The bufferpool is called "ITMBUF8K" and the tablespaces are named
"ITMREG8K," "ITMSYS8K," and "ITMBUF8K."
v Creates a database cache that contains a list of all the tables and columns that
exist in the database.
If any of these tests fail, a message is written to the log file and messages are
displayed in the Event Viewer.
You can change this default start up behavior by changing the following
environment variables:
KHD_CNX_WAIT_ENABLE
Enables the Warehouse Proxy to wait in between attempts to connect to the
database. By default, this variable is set to Y. If you do not want the
Warehouse Proxy to wait, change the variable to N. However, this can
generate a large log file if the connection to the database fails with each
attempt.
KHD_CNX_WAIT
Defines the amount of time, in minutes, that the Warehouse Proxy waits
between attempts to connect to the database. The default value is 10
minutes.
Work queue
The work queue consists of a single STL (Standard Template Library in C++)
queue instance and a configurable number of work threads that run work places
on it. There are two primary configuration parameters that you can set. You can set
these parameters in the KHDENV file before starting the Warehouse Proxy.
KHD_QUEUE_LENGTH
The length of the KHD work queue. This is an integer that identifies the
maximum number of export work requests that can be placed on the work
Chapter 11. Configuring the Warehouse Proxy for the Tivoli Data Warehouse 153
queue before the work queue begins rejecting requests. The default value is
1000. Setting this value to 0 means that the work queue has no limit.
KHD_EXPORT_THREADS
The number of worker threads exporting data to the database. The default
value is 10.
Queue performance statistics are enabled by setting the (UNIT:khd error) trace
parameter. If set, a performance summary for each worker thread and the work
queue is written to the KHD RAS log after the queue is stopped and has finished
all work (this occurs when the Warehouse Proxy is shut down). The following
statistics are reported:
v Thread statistics:
– Total suspensions: The number of times the thread was suspended. A thread
becomes suspended when the controlling application suspends the work
queue.
– Empty queue occurrences: The number of times the thread checked the queue
and found it empty.
– Null work occurrences: An error condition that indicates that the pointer to a
unit of work (in this case an export object reference) places on the queue was
NULL.
– Total waits: The total number of times the thread blocked, waiting for new
work.
– Max wait time: The maximum time, in seconds, that a thread waited for new
work.
– Min wait time: The minimum time, in seconds, that a thread waited for new
work.
– Total executions: The total number of times the thread completed a unit of
work successfully.
– Total execution time: The total time, in seconds, that all executions required.
– Max execution time: The maximum time, in seconds, that a single execution
required.
– Min execution time: The minimum time, in seconds, that a single execution
required.
v Queue statistics:
– Queue start time: The time that the worker threads for the queue started
processing work.
– Total work queue: The total number of units of work placed on the work
queue.
– Total work un-queued: The total number of units of work removed from the
work queue.
– Total rejected requests: The total number of work requests rejected by the
work queue. This occurs when the work queue is full.
– Total illegal queues: An "illegal" queue occurs when a unit of work is placed
on the queue and the current queue length is greater than the length defined
in the KHD_QUEUE_LENGTH variable. This is not an error condition.
During a data export, an export request is opened with the Warehouse Proxy.
At that time, the queue length is checked to see if the data export con
proceed. If the queue length does not exceed the KHD_QUEUE_LENGTH
variable, the export request is created and the data is sent from the client to
the Warehouse Proxy. After all data is received, the export request is placed
on the work queue, even if the queue length is greater than the
Connection pool
The Warehouse Proxy uses several pre-initialized ODBC connections to access the
target database. The use of these ODBC connection objects is synchronized through
a single connection pool. The connection pool is initialized when the Warehouse
Proxy starts.
You can configure the number of connections in the pool by defining the following
environment variable in the KHDENV file:
v KHD_CNS_POOL_SIZE: The total number of pre-initialized ODBC connection
objects available to the work queue export threads. The default value is 10.
All export work threads request connections from the connection pool and must
obtain a connection before the work of exporting data can continue.
You will only see the connections established when a request will be active. It is
important to set the number of worker threads to greater or equal to the number of
ODBC connections. To do this, set KHD_KHD_EXPORT_THREADS >=
KHD_CNX_POOL_SIZE.
Timeout
You can set two environment variables to control the timeout. One variable is set
on the application agent, the other on the Warehouse Proxy.
v KHD_STATUSTIMEOUT: The time, in seconds, to wait for a status from the
Warehouse Proxy before sending an export request again. The default value is
900 seconds, or 15 minutes.
v KHD_SRV_STATUSTIMEOUT: The timeout value, in seconds, for the work
queue to perform work. The default value is 600 seconds, or 10 minutes.
Export requests are rejected by the Warehouse Proxy are the following four
reasons:
v The time between when an export request is sent to the work queue and when it
is extracted from the queue exceeds the timeout. If you have tracing for the
Warehouse Proxy set to ERROR, an error similar to the following is logged in
the Warehouse Proxy log file:
Chapter 11. Configuring the Warehouse Proxy for the Tivoli Data Warehouse 155
REJECTED: The export for the originnode <OriginNodeName>, the application
<applicationName> and the table <tableName> has been rejcted for timeout
reason in stage END_QUEUE.
v The time between when an export request is sent to the work queue and when
the work queue starts to do existence checking in the database exceeds the
timeout. If you have tracing for the Warehouse Proxy set to ERROR, an error
similar to the following is logged in the Warehouse Proxy log file and the
WAREHOUSELOG table:
Sample data rejected for timeout reason at stage START EXPORT
v The time between when an export request is sent to the work queue and when
the work queue fetches all the rows in the sample exceeds the timeout. If you
have tracing for the Warehouse Proxy set to ERROR, a message similar to the
following is logged in the Warehouse Proxy log file and the WAREHOUSELOG
table:
Sample data rejected for timeout reason at stage START SAMPLE
v The time between when an export request is sent to the work queue and when
the work queue commits the rows in the database exceeds the timeout. If you
have tracing for the Warehouse Proxy set to ERROR, a message similar to the
following is logged in the Warehouse Proxy log file and the WAREHOUSELOG
table:
Sample data rejected for timeout reason at stage COMMIT
WAREHOUSELOG table
The WAREHOUSELOG table lets you know how many exports succeed and how
many failed because of an ODBC error or a TIMEOUT issue.
Chapter 11. Configuring the Warehouse Proxy for the Tivoli Data Warehouse 157
158 IBM Tivoli Monitoring: Installation and Setup Guide
Chapter 12. Configuring IBM Tivoli Monitoring Web Services
(SOAP Server) on Windows
By default, all monitoring servers are enabled for Web Services. Use the following
sections to configure IBM Tivoli Monitoring Web Services (SOAP Server) on
Windows XP Professional Edition or Windows 2000 computers.
Note: You cannot make SOAP requests from IBM Tivoli Monitoring to earlier
SOAP servers (such as those in OMEGAMON V350).
The instructions in this chapter assume that you have a basic understanding of
SOAP, XML and XML Namespaces, and the Web Services Description Language
(WSDL).
For complete information about customizing the SOAP interface for your site, refer
to the IBM Tivoli Monitoring Administrator’s Guide.
Defining hubs
In this step you use the Manage Tivoli Enterprise Monitoring Services to activate
the SOAP server and define hubs with which the SOAP server communicates.
Adding users
In this step you define users on each hub and specify the access rights for each
user (query or update).
Note: If you do not supply a user ID, all users are given permission to update
data.
3. Click the type of user access: Query or Update.
4. Click Add User. The server tree is updated, showing the user and type of
access.
5. To delete a user: Select the user name from the tree and click Delete Item.
6. To delete a hub: Click anywhere within the hub’s tree and click Clear Tree.
SOAPREQ.txt is the name of the file that contains the SOAP request and
URLS.txt is the name of the file that contains the URLs.
The kshsoap utility processes the SOAPREQ.txt file and displays the output of the
SOAP request in the DOS window. The SOAP request is sent to each URL listed in
URLS.txt, and the SOAP response from each URL displays in the DOS window.
For complete information about using the SOAP interface, refer to the IBM Tivoli
Monitoring Administrator’s Guide.
Chapter 12. Configuring IBM Tivoli Monitoring Web Services (SOAP Server) on Windows 161
162 IBM Tivoli Monitoring: Installation and Setup Guide
Appendix A. Installation worksheets
Use the following worksheets to gather information you need during the
installation of the IBM Tivoli Monitoring components:
v “Windows hub monitoring server worksheet” on page 164
v “Linux or UNIX hub monitoring server installation worksheet” on page 165
v “Windows remote monitoring server worksheet” on page 166
v “Linux or UNIX remote monitoring server installation worksheet” on page 167
v “Windows portal server worksheet” on page 168
v “Linux portal server worksheet” on page 169
v “Generic Windows monitoring agent worksheet” on page 170
v “Generic Linux or UNIX monitoring agent worksheet” on page 171
v “Windows portal desktop client worksheet” on page 172
v “Linux portal desktop client worksheet” on page 173
v “Monitoring server communications protocol details worksheet” on page 174
You might run through the installation wizard one time to determine the values
that you need to set for your monitoring needs and then use silent installation to
install the rest of your environment. For more information about installing through
the installation wizard, see Chapter 5, “Installing IBM Tivoli Monitoring,” on page
47.
The following table outlines the steps for performing a silent installation of IBM
Tivoli Monitoring.
Table 55. Installation and configuration steps
Step Where to find detailed information
Assess your monitoring needs to determine Chapter 3, “Planning the installation of your
the best deployment of IBM Tivoli environment,” on page 21
Monitoring components.
Ensure you have the required hardware and “Hardware and software requirements” on
software. page 24
Gather any information required for “Specific information to have ready” on
successful installation (such as DB2 user page 21
information and security specifications).
Run the silent installation. “Creating and using a Windows response
file”
Note: If you want to use the TCP/IP protocol, make sure to specify ″IP.UDP.″ If
you specify ″TCP/IP,″ IP.PIPE is used by default.
Attention: Do not modify any other files that come with the installation (for
example, the SETUP.ISS file).
4. Save the file and close the editor.
5. Run the silent installation using one of the following methods:
v “Running the silent install from the command line with parameters”
v “Using SMS”
Note: If the installation fails for any reason, a log file, ″Abort IBM Tivoli
Monitoring <date> <time>.log,″ is created to document the problem. If the
installation fails before reading in the installation location, the log file is
written to Windows BOOT drive, normally the C:\ drive. If the installation
fails after reading the installation location, the log file is written to an
\install subdirectory in the installation directory. For example, if you use the
default installation directory, the log file is written to C:\ibm\itm\install.
Using SMS
Use the following steps:
1. Copy the all the installation files to a LAN-based disk that SMS will mount on
the desired computers. (Copy all files in the directory with setup.exe and
setup.ins.)
2. Replace the original SILENT.TXT file on the LAN disk with your modified
version.
Before editing any of the response files, note the following syntax rules:
v Comment lines begin with a pound sign (#).
v Blank lines are ignored.
v Parameter lines are PARAMETER=value. Do not use a space before the
parameter; you can use a space before or after an equal sign (=).
v Do not use any of the following characters in any parameter value:
– Dollar sign ($)
– Equal sign (=)
– Pipe sign (|)
where:
install_dir
Identifies the installation location for the IBM Tivoli Monitoring
component. The default installation location is /opt/IBM/ITM.
response_file
Identifies the response file that you edited to specify installation
parameters. Specify the absolute path to this file.
The following sample configuration response files are provided with IBM Tivoli
Monitoring:
v ms_silent_config.txt: Used to configure the monitoring server
v cq_silent_config.txt: Used to configure the portal server
v cj_silent_config.txt: Used to configure the portal desktop client
v silent_config.txt: A generic configuration file used to configure agents that do not
require unique configuration parameters
v pc_silent_config.txt: A unique configuration file delivered with any agents that
require unique configuration parameters, for example, the database agents.
Use the following steps to configure a component using the silent method:
1. Edit the configuration file for the component that you want to configure.
2. Complete the parameters identified in the file. Each file contains comments that
define the available parameters and the values to specify.
3. Save the file and exit.
4. Run one of the following commands.
To configure the monitoring server:
./itmcmd config -S -p <response_file> -t <ms_name>
To configure the portal server, desktop client, or an agent:
./itmcdm config -A -p <response_file> pc
where:
<response_file>
The name of the configuration response file. Use an absolute path to
this file.
<ms_name>
The name of the monitoring server that you want to configure.
pc The product code for the component or agent that you want to
configure. See Appendix D, “IBM Tivoli Product Codes,” on page 185
for the list of product codes.
Basic implementation
IBM Tivoli Monitoring supports most common firewall configurations, including
those that use address translation (application proxy firewall is a notable
exception). To enable this support, IBM Tivoli Monitoring uses the IP.PIPE socket
address family, a TCP-based protocol that opens a single port on the firewall for
communication by IBM Tivoli Monitoring components. If your target environment
includes a firewall between any IBM Tivoli Monitoring components, you must
specify IP.PIPE as your communication protocol during configuration. No other
special configuration is needed unless your firewall also uses address translation.
In IBM Tivoli Monitoring, the component that typically must be reached for
connection is the monitoring server; however, the Warehouse Proxy, which runs on
Windows as a server-type application, must also be accessible to clients and also
requires an external and internal address. A component on either side of the
firewall only knows about the address that is valid for its side (its “partition”).
Sample scenarios
In the sample scenarios, your site has one firewall that contains two partitions,
which are named OUTSIDE and INSIDE.
As part of the configuration of each agent, specify the name of the partition that
each resides in OUTSIDE.
When an agent starts, parthub.txt is searched for an entry that matches the
partition name OUTSIDE and sees the monitoring server address that is valid for
the agents (the external address).
As part of the configuration of the hub monitoring server, specify the name of the
partition that it resides in INSIDE. No partition file is needed because the only
component that reports to it (the remote monitoring server) is also inside the
firewall.
As part of the configuration of the remote monitoring server, specify the name of
the partition that it resides in INSIDE. A partition file, partremote.txt, must also be
created at the remote monitoring server. It contains the following entries:
OUTSIDE ip.pipe: remote’s_external_address
When configuring the agents (all of which are outside the firewall, reporting to the
remote monitoring server), specify the name of the partition that they reside in
OUTSIDE. When the agents start, partremote.txt is searched for an entry that
matches the partition name OUTSIDE and sees the remote monitoring server
address that is valid for them (the external address).
As part of the configuration of both the agents and the remote monitoring server,
specify the name of the partition they reside in OUTSIDE.
If the hub monitoring server needs to communicate with the remote monitoring
server (for example, to issue a report request from an agent that is connected to the
remote monitoring server), partremote.txt is searched for an entry that matches the
partition name INSIDE and sees the remote monitoring server address that is valid
for it (the internal address).
If you do not already have an agent depot, the bundles are added to the location
defined by the DEPOTHOME environment variable in the KBBENV environment
file.
CLI syntax
tacmd addBundles {-i|--imagePath} IMAGEPATH [{-t|--product|--products}
PRODUCT ...] [{-p|--platform|--platforms} PLATFORM ...] [{-v|--version|--
versions} VERSION ...] [{-n|--noPrereq|--noPrerequisites }] [{-f|--force }]
where:
-i|--imagePath
The directory that contains the deployment bundles to be added to the
depot.
-t|--product|--products
The product code or codes of the agents to add. This value corresponds to
the value that is displayed in the Product Code field that is displayed by the
viewDepot or listBundles command.
-p|--platform|--platforms
The platform code or codes of the agents to add. This value corresponds to
the value that is displayed in the Host Type field that is displayed by the
viewDepot or listBundles command.
-v|--version|--versions
The version or versions of the agents to add. This value corresponds to the
value that is displayed in the Version field that is displayed by the
viewDepot command.
-n|--noPrereq|--noPrerequisites
Indicates that prerequisite bundles are not automatically added.
-f|--force
Installs any matching deployment bundles to the depot without prompting
for confirmation first.
CLI example
The following example copies every agent bundle, including its prerequisites into
the agent depot on a UNIX from the installation media (cd image) located at
/mnt/cdrom/:
tacmd addbundles -i /mnt/cdrom/unix
The following example copies all agent bundles for the Oracle agent into the agent
depot on a UNIX computer from the installation media (cd image) located at
/mnt/cdrom/:
tacmd addbundles -i /mnt/cdrom/unix -t or
The following example copies the agent bundle for the Oracle agent that runs on
the AIX version 5.1.3 operating system into the agent depot on a UNIX computer
from the installation media (cd image) located at /mnt/cdrom/:
tacmd addbundles -i /mnt/cdrom/unix -t or -p aix513
Return values
See Table 58 on page 218.
Related commands
“tacmd listBundles” on page 203
Any computer to which you want to deploy an agent must already have an OS
agent installed. You can either install the OS agent using the installation wizard or
with the “tacmd createNode” on page 196 command.
Note: You cannot use this command to add a non-default Universal Agent
instance that you created manually. You must use the itmcmd config
command with the -o parameter to create additional Universal Agent
instances.
CLI syntax
tacmd addSystem {-t|--type} pc {-n|--node} MANAGED-OS {-p|--property}
NAME=VALUE ...
where:
-t|--type
Specifies the type of agent to add to the monitoring system. See
Appendix D, “IBM Tivoli Product Codes,” on page 185 for a listing of
agent product codes.
-n|--node
Identifies the node, the directory on monitoring system where the OS agent
is installed, to which you want to add the agent. The name of a node
includes the computer where the OS agent is installed and the product
code for the OS agent. For example, stone.ibm.com:LZ is the name of the
node on computer stone.ibm.com, which has a Linux OS agent installed.
-p|--property
Specifies SECTION.NAME=VALUE pairs that identify agent configuration
properties and their values, where SECTION specifies the name of the
section containing the key value pair, KEY specifies the name of the
configuration property, and VALUE specifies the property value.
See the agent user's guide for the agent that you are configuring for a list
of available configuration properties.
In addition to the agent-specific configuration properties, you can also
configure the Run-as settings, specifying the user ID under which an agent
runs. Use the following parameters:
_UNIX_STARTUP_.Username=<user>
On UNIX, the user name under which to run the agent. Note that
you can only use this option if the OS agent running on the UNIX
computer is started as the root user (or another user with
privileges to su). You cannot change the run-as setting if your OS
agent runs as a non-root user.
If you have already configured the run as user (for example,
through the Manage Tivoli Enterprise Monitoring Services utility),
this value defaults to what you have already set. If you have not
CLI example
tacmd addsystem -t um -n stone.ibm.com:LZ -p UA.CONFIG="file_unix.mdl"
This command deploys universal agent (type UA) to the monitoring system named
stone with the file_unix.mdl MDL file.
Return values
See Table 58 on page 218.
Related commands
“tacmd createNode” on page 196
“cinfo” on page 219 (to return the list of product codes installed on the computer)
CLI syntax
tacmd configurePortalServer {-s|--dataSource} datasource {-p|--property|--
properties} name=value ... [{-d|--directory} install_dir] [{-f|--force}]
where:
-s|--dataSource
The name of a new or existing data source.
-r|--remove
Removes the named data source.
-v|--view
Displays the configuration parameters for an existing data source. Run the
command against an existing data source to identify configuration
parameters that you can edit or to determine the configuration parameters
for a new data source of the same type.
Passwords displayed by this parameter are encrypted.
-p|--property|--properties
A list of property names and values required to configure the data source.
The list can be different for each data source type but usually includes at
least user ID (key name UID) and password (key name PWD). Property
values are encrypted before being stored to the configuration file or the
Windows Registry.
-d|--directory
The directory where the portal server is installed.
-f|--force
Performs actions without asking confirmation.
CLI example
The following example modifies the TEPS2 data source with user ID db2user and
password db2password. The TEPS2 data source is created if it does not already exist.
tacmd configureportalserver -s TEPS2 -p UID=db2user PWD=db2password
The following example displays the configuration settings for the TEPS2 data
source:
tacmd configureportalserver -s TEPS2 -v
Return values
See Table 58 on page 218.
You must specify at least one configuration parameter when you configure the
agent. If the agent requires no configuration parameters, use the -p parameter to
set the Run-as setting for the agent.
Note: You cannot use this command to configure a non-default Universal Agent
instance that you created manually. Use the itmcmd config command with
the -o parameter instead to configure a non-default Universal Agent
instance.
CLI syntax
tacmd configureSystem {-m|--system} SYSTEM {-p|--property} NAME=VALUE ...
where:
-m|--system
Identifies the agent (managed system) that you want to configure.
-p|--property
Specifies one or more SECTION.NAME=VALUE pairs that identify
configuration properties to update, where SECTION specifies the name of
the section containing the key value pair, KEY specifies the name of the
configuration property, and VALUE specifies the property value.
You must specify at least one property when you configure an agent. If you
don't have any agent-specific configuration properties, set the run as user,
as described below.
See the agent user's guide for the agent that you are configuring for a list
of available configuration properties.
In addition to the agent-specific configuration properties, you can also
configure the Run-as settings, specifying the user ID under which an agent
runs. Use the following parameters:
_UNIX_STARTUP_.Username=<user>
On UNIX, the user name under which to run the agent. Note that
you can only use this option if the OS agent running on the UNIX
computer is started as the root user (or another user with
privileges to su). You cannot change the run-as setting if your OS
agent runs as a non-root user.
If you have already configured the run as user (for example,
through the Manage Tivoli Enterprise Monitoring Services utility),
this value defaults to what you have already set. If you have not
configured the run as user previously, the default user is the user
that is running the OS agent on the computer.
_WIN32_STARTUP_.Username=<user>
On Windows, the user name under which to run the agent.
CLI example
tacmd configureSystem -m stone:UA -p UA.CONFIG="file_unix.mdl"
This command reconfigures the universal agent on stone with the file_unix.mdl
MDL file.
Return values
See Table 58 on page 218.
Related commands
“tacmd addSystem” on page 190
CLI syntax
tacmd createNode [{-h|--host} [{smb|ssh|rexec|rsh}://]HOST[:PORT]]
[{-u|--username} USERNAME [{-w|--password} PASSWORD]]
[{-o|--option|--options} NAME=VALUE ...] [{-d|--dir|--directory} NODEDIR]
[{-i|--imagePath} IMAGEPATH] [{-p|--property|--properties} NAME=VALUE ...]
[{-f|--force}]
where:
-h|--host
Identifies the computer on which to create a node. Optionally, a specific
connection protocol and a port can be specified. By default, all supported
protocols are attempted until a connection is successfully established on
one of them.
u|--username
A valid user ID on the specified computer.
-w|--password
The password for the specified user ID. You can specify a file that contains
multiple passwords, one per line. Each password is tried, in the order
specified, until a connection is successfully established.
-o|--option|--options
One or more configuration parameters that can be used to customize the
operation of this command. You can use the following options:
KEYFILE
The full path to an SSH private key file that, when specified, is
used to authenticate with the specified remote computer (which
must already have been configured to accept the private key). Use
KEYFILE when the SSH protocol is, or might be, in use, and you
want to use non-login based authentication.
PASSPHRASE
Use this option in conjunction with the KEYFILE option to enable
the specification of the passphrase (if any) that was used to encrypt
the private key file.
If you use the actual passphrase in this command, that passphrase
is visible in the process table for the current computer, where
anyone on can access it. If access to the computer is restricted to
only trusted personnel, this is not an issue.
Note: The specified port number must match the port number
being used by the monitoring server.
SERVER=tems_name
Enables you to specify a specific monitoring server. The default
value is the monitoring server from which you are running
createNode. This property accepts an option URL-style format,
which enables you to specify the primary communication protocol
and port number:
[{IP.UDP|IP.PIPE|IP.SPIPE|SNA}://][HOSTNAME][:PORT]
SNA_NETNAME=net_name
The Systems Network Architecture primary network name.
SNA_LOGMODE=logmode_name
The Systems Network Architecture one to eight character log mode
name.
SNA_LUNAME=lu_name
The Systems Network Architecture primary logical unit name.
SNA_TPNAME=tp_name
The Systems Network Architecture transaction program
specification. Accepted values are SNASOCKETS (default),
KDCLLBD, KDTMSNAP.QAUTOMON.
BACKUP={NO|YES}
A Boolean flag used to indicate whether or not to use a secondary
(back up) monitoring server for this node. By default, no backup is
specified. Accepted values are NO and YES.
BSERVER =backup_msname
Specifies a backup monitoring server.
Note: The specified port number must match the port number
being used by the monitoring server.
BSNA_NETNAME=net_name
The Systems Network Architecture primary network name for the
secondary monitoring server.
BSNA_LOGMODE=logmode_name
The Systems Network Architecture one to eight character log mode
name for the secondary monitoring server.
BSNA_LUNAME=lu_name
The Systems Network Architecture primary logical unit name for
the secondary monitoring server.
BSNA_TPNAME=tp_name
The Systems Network Architecture transaction program
specification for the secondary monitoring server. Accepted values
are SNASOCKETS (default), KDCLLBD,
KDTMSNAP.QAUTOMON.
Return values
See Table 58 on page 218.
Related commands
“tacmd addSystem” on page 190
This command can only be run from a Tivoli Enterprise Monitoring Server
containing a depot.
CLI syntax
tacmd describeSystemType {-t|--type} pc {-p|--platform} platform [{-v|--version}
VERSION]
where :
-t|--type
The product code for the agent that you want to describe.
-p|--platform
The operating system type of the managed system to describe.
-v|--version
The version of the agent to describe.
CLI example
tacmd describeSystemType –t UM –h WINNT -v 060100000
This command displays the configuration options that are available to use with the
configureSystem or addSystem commands for the Universal Agent (type UM) for
the Windows NT® platform WINNT, version 060100000.
tacmd describeSystemType –t UM –h WINNT
This command displays the configuration options that are available to use with the
configureSystem or addSystem commands for the latest version of the Universal
Agent (type UM) for the Windows NT platform WINNT.
Return values
See Table 58 on page 218.
Related commands
“tacmd configureSystem” on page 194
CLI syntax
tacmd help or tacmd ?
CLI example
tacmd help addSystem
or
tacmd ? addSystem
Return values
See Table 58 on page 218.
CLI syntax
tacmd listBundles {-i|--imagePath} IMAGEPATH [{-t|--product|--products}
PRODUCT ...] [{-p|--platform|--platforms} PLATFORM ...] [{-v|--version|--
versions} VERSION ...]
where:
-i|--imagePath
The directory that contains the deployment bundles to be listed.
-t|--product|--products
The product code or codes of the agents to list bundles for. This value
corresponds to the value that is displayed in the Product Code field that is
displayed by the viewDepot or listBundles command.
-p|--platform|--platforms
The platform code or codes of the products to list bundles for. This value
corresponds to the value that is displayed in the Host Type field that is
displayed by the viewDepot or listBundles command.
-v|--version|--versions
The version or versions of the products to list bundles for. This value
corresponds to the value that is displayed in the Version field that is
displayed by the viewDepot command
CLI example
tacmd listBundles –i D:\cdimage\bundles
This command displays details for all the deployment bundles in the
D:\cdimage\bundles directory.
tacmd listBundles –i /mnt/bundles –t ux –p aix513 –v 060100000
This command displays details for all the deployment bundles in the /mnt/bundles
directory where the bundle product type is ux, the bundle platform is aix513, and
the bundle version is 060100000.
Return values
See Table 58 on page 218.
Related commands
“tacmd addBundles” on page 188
CLI syntax
tacmd listSystems [{-n|--node} MANAGED-OS] [{-t|--type} pc ...]
where:
-n|--node
Identifies the node, the directory on monitoring system where the OS agent
is installed, for which you want to list the agents. The name of a node
includes the computer where the OS agent is installed and the product
code for the OS agent. For example, stone.ibm.com:LZ is the name of the
node on computer stone.ibm.com, which has a Linux OS agent installed.
-t|--type
Identifies one or more product type codes for which to filter. TYPE is scoped
to NODE level.
CLI example
tacmd listSystems
This command lists all of the systems in your enterprise with the product code UM
(universal agent systems).
tacmd listSystems –t NT
This command lists all of the systems in your enterprise with the product code NT
(NT nodes, or operating system agents). This command is effective for listing all of
the NT nodes in your enterprise.
tacmd listSystems –t NT UX LZ
This command lists all of the systems in your enterprise with product codes NT,
LZ, or UX (NT operating system agents). This command is effective for listing all
of the nodes in your enterprise.
tacmd listSystems –n Primary:STONE:NT –t UM
This command lists all of the systems on node Primary:STONE:NT with the
product code UM (universal agent).
Return values
See Table 58 on page 218.
CLI syntax
tacmd login {-s|--server} {[PROTOCOL://]HOST[:PORT]} [{-u|--username}
USERNAME] [{-p|--password} PASSWORD] [{-t|--timeout} TIMEOUT]
where:
-s|--server
Specifies the host name of the Tivoli Enterprise Monitoring Server to log
into.
-u|--username
Specifies the user to authenticate.
-p|--password
Specifies the password of the user to authenticate.
-t|--timeout
Specifies the maximum number of minutes that can elapse between
invocations of tacmd before the user is denied access. The default timeout
is 15 minutes. The maximum timeout is 1440 minutes (24 hours).
If a user name and password are not specified, you are prompted for them.
CLI example
tacmd login –s pebble.ibm.com –u administrator –p mypassword –t 1440
This command logs into the Tivoli Enterprise Monitoring Server on pebble.ibm.com
with the user ID, administrator, the password, mypassword, and a login expiration
time of 1440 minutes.
Return values
See Table 58 on page 218.
Related commands
“tacmd logout” on page 206
CLI syntax
tacmd Logout
CLI example
tacmd logout
Return values
See Table 58 on page 218.
Related commands
“tacmd login” on page 205
CLI syntax
tacmd removeBundles {-i|--imagePath} IMAGEPATH [{-t|--product|--products}
PRODUCT ...] [{-p|--platform|--platforms} PLATFORM ...] [{-v|--version|--
versions} VERSION ...] [{-f|--force }]
where:
-i|--imagePath
The directory to the depot that contains the deployment bundles to be
removed.
-t|--product|--products
The product code or codes of the agents to remove. This value corresponds
to the value that is displayed in the Product Code field that is displayed by
the viewDepot or listBundles command.
-p|--platform|--platforms
The platform code or codes of the agents to remove. This value
corresponds to the value that is displayed in the Host Type field that is
displayed by the viewDepot or listBundles command.
-v|--version|--versions
The version or versions of the agents to remove. This value corresponds to
the value that is displayed in the Version field that is displayed by the
viewDepot command.
-f|--force
Removes any matching deployment bundles from the depot without
prompting for confirmation first.
CLI example
tacmd removeBundles –i D:\cdimage\bundles
This command removes all of the deployment bundles in the /mnt/bundles directory
from the local deployment depot where the bundle product type is ux, the bundle
platform is aix513, and the bundle version is 060100000.
Return values
See Table 58 on page 218.
Related commands
“tacmd addBundles” on page 188
If you have the authority to restart agents and you specify only the agent type,
you do not need to log in to restart an agent on a local computer.
When you specify only an agent type, all agents of that type are restarted on the
local computer.
You can only use the tacmd restartAgent command to restart OS agents locally.
Note: You cannot use this command to restart a non-default Universal Agent
instance that you created manually. Use the itmcmd agent command with
the -p parameter instead to restart a non-default Universal Agent instance.
CLI syntax
tacmd restartAgent {-m|--system} SYSTEM ... [{-f|--force}]
where::
-m|--system
Specifies a managed system on which to restart the agents.
-f|--force
Restarts the specified agents without confirmation.
-t|--type
Specifies one or more agents or agent instances to restart. TYPE is scoped
to NODE level.
-n|--node
Identifies the node on the computer where you want to restart an agent.
The node is the installation directory for all agents. The name of a node
includes the computer where the OS agent is installed and the product
code for the OS agent. For example, stone.ibm.com:LZ is the name of the
node on computer stone.ibm.com, which has a Linux OS agent installed.
CLI example
tacmd restartagent -m stone:UA
This command stops the Universal Agent agent with name stone:UA.
tacmd restartAgent –n Primary:STONE:NT –t UM
Return values
See Table 58 on page 218.
If you have the authority to start agents and you specify only the agent type, you
do not need to log in to start an agent on a local computer.
When you specify only an agent type, all agents of that type are started on the
local computer.
CLI syntax
tacmd startAgent {-m|--system} SYSTEM ... [{-f|--force}]
where:
-m|--system SYSTEM
Identifies a managed system to perform the action on.
-f|--force
Performs actions without asking confirmation.
-t|--type
The identifiers of one or more agents or agent instances to start. TYPE is
scoped to NODE level.
-n|--node
Identifies the node on the computer where you want to start an agent. The
node is the installation directory for all agents. The name of a node
includes the computer where the OS agent is installed and the product
code for the OS agent. For example, stone.ibm.com:LZ is the name of the
node on computer stone.ibm.com, which has a Linux OS agent installed.
CLI example
This command starts the Universal Agent agent with the name stone:UA.
tacmd startAgent –m stone:UA
Return values
See Table 58 on page 218.
Related commands
“tacmd stopAgent” on page 212
If you have the authority to start agents and you specify only the agent type, you
do not need to log in to stop an agent on a local computer.
When you specify only an agent type, all agents of that type are stopped on the
local computer.
Note: You cannot use this command to stop a non-default Universal Agent
instance that you created manually. Use the itmcmd agent command with
the -p parameter instead to stop a non-default Universal Agent instance.
CLI syntax
tacmd stopAgent {-m|--system} SYSTEM ...] [{-f|--force}]
where:
-m|--system SYSTEM
Identifies a managed system to perform the action on.
-f|--force
Performs actions without asking for confirmation.
-t|--type
The identifiers of one or more agents or agent instances to stop. TYPE is
scoped to NODE level.
-n|--node
Identifies the node on the computer where you want the agent to be
stopped. The node is the installation directory for all agents. The name of a
node includes the computer where the OS agent is installed and the
product code for the OS agent. For example, stone.ibm.com:LZ is the name
of the node on computer stone.ibm.com, which has a Linux OS agent
installed.
CLI example
The following command stops the Universal Agent agent with the name stone:UA:
tacmd stopAgent –m stone:UA
Return values
See Table 58 on page 218.
CLI syntax
tacmd updateAgent {-t|--type} TYPE {-n|--node} MANAGED-OS [{-v|--version}
VERSION] [{-f|--force}]
where:
-t|--type
The type of agent to update.
-n|--node
Identifies the node on the computer that has the agent that you want to
update. The node is the installation directory for all agents. The name of a
node includes the computer where the OS agent is installed and the
product code for the OS agent. For example, stone.ibm.com:LZ is the name
of the node on computer stone.ibm.com, which has a Linux OS agent
installed.
-v|--version
Specifies the version of the agent to switch to. You cannot use this
command to revert an agent to a previous version of that agent.
-f|--force
Performs actions without asking confirmation.
CLI example
The following command updates a UNIX agent (type UX) on vision84:
tacmd updateagent -t UX -n vision84.tivlab.austin.ibm.com:K -v 6111
Return values
See Table 58 on page 218.
CLI syntax
tacmd viewAgent [{-m|--system} SYSTEM ...]
CLI example
The following command displays the details for the UM agent with the name
stone:UA:
tacmd viewAgent –m stone:UA
The following command displays the details for all UM agents on the node
Primary:STONE:NT:
tacmd stopAgent –n Primary:STONE:NT –t UM
Return values
See Table 58 on page 218.
CLI syntax
tacmd viewDepot [{{-j|--depot} DEPOT}]
-j|--depot
Specifies the name of the remote server that hosts the depot when you are
logged into the hub monitoring server.
CLI example
The following command displays the contents of the deployment depot on the
Tivoli Enterprise Monitoring Server you logged into using the tacmd login
command:
tacmd viewDepot
The following command displays the contents of the deployment depot on the
remote monitoring server, REMOTE_ROCK, which connects to the hub monitoring
server. You must log into the hub monitoring server before running this command:
tacmd viewdepot -j REMOTE_ROCK
Return values
See Table 58 on page 218.
Related commands
“tacmd listBundles” on page 203
You do not need to log in to view a local node if you have permission to view the
node.
CLI syntax
tacmd viewNode [{{-n|--node} MANAGED-OS} {{-d|--directory} install_dir}]
where:
-n|--node
Specifies the node to display. The node is the installation directory for all
agents. The name of a node includes the computer where the OS agent is
installed and the product code for the OS agent. For example,
stone.ibm.com:LZ is the name of the node on computer stone.ibm.com,
which has a Linux OS agent installed.
-d|--directory
Specifies the base installation directory for IBM Tivoli Monitoring for the
node to display. The directory can be a either a relative path or a fully
qualified path.
CLI example
The following command displays the components installed on the managed system
named icarus.austin.ibm.com.
tacmd viewnode -n icarus.austin.ibm.com
Return values
See Table 58 on page 218.
itmcmd commands
The following commands are available only on UNIX monitoring servers.
The command can also be run without a menu, so the four numbered options
above can be invoked as:
cinfo -i
cinfo -r
cinfo -c <pc>
cinfo -v
CLI syntax
cinfo [-h install_dir [-c pc] [-i] [-r] [-s pc | all] [-R]
where:
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on an IBM Tivoli Monitoring installation
directory other than the one in the current system.
-c [pc] (Optional) Lists configuration prompts and values for all components (by
default) or for a specific component (identified by product code). If you
use the product code, you can only enter one code.
CLI example
The following example shows all installed products:
./cinfo -i
The following example shows the configuration settings for the Universal Agent:
./cinfo -c um
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
You must run the itmcmd agent command on the architecture for which the agent
is installed.
To start or stop agents for distributed database agent, see “itmcmd dbagent” on
page 226. However, the itmcmd agent command can start and stop agents for
distributed databases, it just cannot select monitors for individual database servers
or activate debugging options.
CLI syntax
itmcmd agent [-l] [ -h install_dir ] [ -o instance ] [ -p option ] [-c] [-s] start|stop
{pc|all}
where:
-l Deletes the log file associated with the monitoring agent that is being
stopped. By default, the log file is saved when the monitoring agent is
stopped.
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on an IBM Tivoli Monitoring installation
directory other than the one in the current system.
-o instance
Identifies a database instance to start or stop. You must use this option if
you are starting or stopping a DB2 agent.
-p option
Identifies a Universal Agent instance to start or stop. Use this option when
you are starting or stopping a non-default instance of the Universal Agent.
-c (Optional) Indicates that the configuration file used on agent startup
should not be updated. By default, this file is updated each time the agent
is started.
-s (optional) Option to specify safe mode operation.
Safe mode invokes the JRE with the -nojit option (no just-in-time
compiler). If you encounter a Java failure error, try running the command
as before, but also specifying the -s option.
start | stop {pc|all}
Indicates to start or stop the monitoring agent. You can start or stop one or
more agents by using the product codes (for example, specifying lz um
starts the Linux monitoring agent and the Universal Agent). To start or
stop all agents on the computer, use the all option.
See “cinfo” on page 219 to identify the product code for an agent or
component.
The following example stops a non-default instance (inst1) of the Universal Agent:
./itmcmd agent -p INST1 stop um
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
Note: The log file for the agent session is always saved, regardless of whether the
agent was stopped using the itmcmd agent command or any other means,
unless you use the -l parameter when you run the itmcmd agent command.
Additionally, when the agent is stopped using the itmcmd agent command,
the log file for that session ends with the following message:
"** Process terminated by user **"
Related commands
“itmcmd server” on page 231
“cinfo” on page 219 (to determine the product codes for agents and components)
You can only configure one product at a time. If you reconfigure a monitoring
server, you must stop and restart that monitoring server before the changes take
effect.
The itmcmd config command prompts for input for the required parameters.
Scripts are located in the install_dir/bin directory where install_dir is the directory
into which you installed IBM Tivoli Monitoring.
CLI syntax
Use the following syntax to configure a monitoring server:
where:
-S Indicates that you are configuring a monitoring server.
-A pc Indicates that you are configuring a monitoring agent. pc is the product
code for the agent that you want to configure.
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on an IBM Tivoli Monitoring installation
directory other than the one in the current system.
-s (optional) Option to specify safe mode operation.
CLI example
The following example configures the monitoring server ms1:
itmcmd config -S -t hub_ms1
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
CLI syntax
./itmcmd dbagent [-d trace_option] [-h install_dir] [-s server,...] start | stop [pc]
where:
-d trace_option
Enables diagnostic reporting for one or all monitored database tables.
Enables debug tracing for the following items:
Table Turns on KBB_RAS1 tracing for table (korxxxx, kraxxxx). Table
names are case-insensitive. You can use ksh wildcards (but not
regexp).
debug Turns on collector and agent internal tracing through -dddd.
d Fine tunes internal tracing level: -d, -dd, -ddd, -dddd, -ddddd
(debug or ddd’s also change col.out to wrap after 100000 lines, and
keep col.ou[1-9])
all *,debug
ALL ddddd + all possible agent KBB_RAS1: (UNIT:K ALL)
Note: This is not the same as the Safe Mode -s parameter available on
some commands.
start | stop
Starts or stops the specified agent.
pc Specifies the agent you want to take action on. If you have installed agents
for more than one kind of database, Oracle and Sybase for example, you
can specify the product code for the database type whose agent you want
action taken upon. The default is that itmcmd dbagent applies to all.
You can specify multiple arguments separated by commas.
CLI example
The following example starts all database monitoring agents on the computer:
./itmcmd dbagent start
Related commands
“itmcmd agent” on page 222
CLI syntax
./itmcmd manage [-h install_dir]
where:
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on a an IBM Tivoli Monitoring
installation directory other than the one in the current system.
CLI example
The following example starts Manage Tivoli Enterprise Monitoring Services:
./itmcmd manage
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
You need to run this command once during the initial installation of the
monitoring server to add data for the components installed from the same
installation CD. Whenever you add a new monitoring agent type to your
monitoring environment, run the itmcmd support command again on the
monitoring server to add the new agent information to the monitoring server.
Notes:
1. Before you can run the itmcmd support command, you must start the
monitoring server. See “itmcmd server” on page 231 for details.
2. Add application support only for agent components, not for other installed
components such as the portal desktop client.
3. After you add the application support to the monitoring server, stop it and
restart it.
4. If you are installing a backup monitoring server, see “Adding application
support on the backup hub monitoring server” on page 110 for information
about adding application support.
CLI syntax
./itmcmd support [-h install_dir] [-m] -t tems_name pc pc pc
where:
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on an IBM Tivoli Monitoring installation
directory other than the one in the current system.
-m Copies application support files to a backup monitoring server without
adding them. Use this option only when you are configuring a backup
monitoring server.
-t tems_name
Identifies the monitoring server. This parameter is required.
pc pc pc
The product codes for the components for which you want to add
application support. To display the product codes for agents installed on
this computer, run the cinfo command. See “cinfo” on page 219 for more
information.
CLI example
The following example adds application support to the hub_ms1 monitoring server
for the agents installed from the IBM Tivoli Monitoring installation CD:
./itmcmd support -t hub_ms1 a4 lz nt sy tm ul um ux
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
“cinfo” on page 219 (to determine the product codes for agents)
CLI syntax
./itmcmd server [-h install_dir] [-l] [-s] start | stop tems_name
where:
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on an IBM Tivoli Monitoring installation
directory other than the one in the current system.
-l Deletes the log file associated with the monitoring server that is being
stopped. By default, the log files is saved when the monitoring server
stops.
-s (optional) Option to specify safe mode operation.
Safe mode invokes the JRE with the -nojit option (no just-in-time
compiler). If you encounter a Java failure error, try running the command
as before, but also specifying the -s option.
start tems_name
Starts the specified monitoring server.
stop tems_name
Stops the specified monitoring server.
CLI example
The following command stops the hub_ms1 monitoring server:
./itmcmd server stop hub_ms1
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
The monitoring server stop message might be displayed before the processes have
completely stopped. It might take a minute for the processes to completely
disappear, based on the system load.
Note: When the monitoring server stops normally, the log file for that session is
saved. Use the -l parameter to delete the log files.
Related commands
“itmcmd agent” on page 222
When you run the SetPerm command, a product selection list is displayed. This
list is sorted and contains the run architectures within each product description.
From the list of installed products, enter a valid number or numbers separated by
commas or spaces.
CLI syntax
./SetPerm [-h install_dir] -s
where:
-h install_dir
(Optional) Identifies the installation directory if it is not the one in which
the script is located.
Also use this option to take action on an IBM Tivoli Monitoring installation
directory other than the one in the current system.
-s Used to set security validation on selected monitoring servers.
CLI example
The following example starts the SetPerm utility:
./SetPerm -s
Return values
An exit status of 0 indicates that the command ran successfully. An exit status
greater than 0 indicates that there was a failure in the process.
When running these commands, if you are specifying fully qualified paths, use a
forward slash (/) for all operating systems, including Windows.
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process. See “Starting
and stopping the Situation Update Forwarder process” on page 103 for
information.
CLI syntax
sitconfig.sh add fileName=<config_filename>
fileSize=<size>
fileNumber=<number>
fileLocation=<path>
pollingInterval=<seconds>
crcBytecount=<count>
cmsSoapUrl=<url>
bufferFlushRate=<rate>
logLevel=<level>
where:
add Create the configuration file. The default name is situpdate.conf.
update
Updates the existing specified configuration file.
fileName=<config_filename>
The name of the configuration file for event synchronization. situpdate.conf
is the default file name.
fileSize=<size>
Specify this parameter to set and change the maximum size, in bytes, for
any one event cache file. The minimum (and default) value is 50000. Do
not use commas when specifying this value (50,000 instead of 50000).
fileNumber=<number>
Specify this parameter to set and change the maximum number of event
caches files permitted at any given time. The minimum value is 2, while
the default value is 10. When this value is reached, the oldest file is deleted
to make room for a new file.
fileLocation=<path>
Specify this parameter if you want to set and change the location on the
event server where event cache files are located. The default locations are
as follows:
CLI example
The following example changes the trace level for the event synchronization to
medium:
sitconfig.sh update fileName=situpdate.conf logLevel=med
After you change the configuration of the event synchronization, you must
manually stop and restart the Situation Update Forwarder process. See “Starting
and stopping the Situation Update Forwarder process” on page 103 for
information.
CLI syntax
sitconfsvruser.sh add serverid=<server> userid=<user> password=<password>
where:
add Adds a new monitoring server to the list of monitoring servers that
forward events to IBM Tivoli Enterprise Console.
update
Modifies the user ID or password for an existing monitoring server.
delete Removes a monitoring server from the list of monitoring servers that
forward events to IBM Tivoli Enterprise Console.
serverid=server
The fully qualified host name of the monitoring server.
userid=user
The user ID to access the computer where the monitoring server is
running.
password=password
The password to access the computer.
CLI example
The following example adds the itm17 monitoring server:
sitconfsvruser.sh add serverid=itm17.ibm.com userid=admin password=acc3ssing
If you specify a rule base that does not contain the Sentry2_0_Base class, no
changes are made.
Use this script only when you are manually upgrading your rule base after
installing the event synchronization.
CLI syntax
upg_sentry_baroc.pl [<rb_name> [<rb_path>]]
where:
rb_name
Specifies the rule base that you want to update. If you do not specify a
rule base, all existing rule bases are updated.
rb_path
The path to the rule base specified with the rb_name parameter. This path
is optional.
CLI example
The following example updates the Sentry2_0_Base class in the Sentry.baroc file of
the itmsynch_rb rule base:
upg_sentry_baroc.pl itmsynch_rb
If the rule base already contains the TEC_Generic class in the tec.baroc file, no
changes are made.
Use this script only when you are manually upgrading a rule base after installing
the event synchronization.
CLI syntax
upg_tec_baroc.pl rb_name
where rb_name is the name of the rule base to upgrade. This name is required.
CLI example
The following example adds the TEC_Generic class to the tec.baroc file of the
itmsynch_rb rule base:
upg_tec_baroc.pl itmsynch_rb
If you want to remove just one component such as an agent, see “Uninstalling an
individual IBM Tivoli Monitoring agent or component” on page 244.
Note: If you plan to reinstall IBM Tivoli Monitoring into a different directory than
the one used for this installation, you must stop and restart this computer
before reinstalling IBM Tivoli Monitoring.
5. Click OK.
The following progress window is displayed.
After Tivoli Enterprise services have stopped, you are asked if you want to
remove the Tivoli Enterprise Portal database.
6. Click Yes.
The following window is displayed, requesting information required to remove
the database:
7. Type the password for the database administrator in the Admin Password field
and click OK.
8. Click Finish.
where install_dir is the path for the home directory for IBM Tivoli Monitoring.
2. Run the following command:
./uninstall.sh
You can also run the following command to remove all installed components from
the command line:
./uninstall.sh REMOVE EVERYTHING
After the command completes, you can manually remove the IBM Tivoli
Monitoring installation directory.
Note: If for any reason, the UNIX uninstallation is not successful, run the
following command to remove all IBM Tivoli Monitoring directories:
rm -r install_dir
This uninstallation program does not delete the database created for Tivoli
Enterprise Portal on a Linux portal server. If you want to delete that database, you
must remove it manually. See the documentation for your database software for
information about deleting a database.
Note: If you plan to reinstall a IBM Tivoli Monitoring component into a different
directory than the one used for this installation, you must stop and restart
this computer before reinstalling the IBM Tivoli Monitoring component.
where install_dir is the path for the home directory for IBM Tivoli Monitoring.
2. Run the following command:
./uninstall.sh
Note: You can also use this procedure to remove IBM Tivoli Monitoring agents if
you use the TMAITM6 directory instead of the CMA directory in step 6 on
page 245. All of the other steps do not change.
Table 60. Candle OMEGAMON Release 04R1
Internal
Identifier Release Description
®
K3Z 400 Windows Server Active Directories Monitoring Agent
KA2 120 Alert Adapter for AF/Remote
KA4 300 Monitoring Agent for OS/400
KBL 320 CASP Directory Server Monitoring Agent
KBR 320 CASP Exchange Connector Monitoring Agent
KEZ 251 eBA® Solutions Monitoring Agent
KIC 100 WebSphere InterChange Server Monitoring Agent
KIE 100 WebSphere InterChange Server Data Source
KMA 201 Alert Adapter for Remedy ARS
KMC 360 WebSphere MQ Configuration Agent
KMQ 360 WebSphere MQ Monitoring Agent
KNW 300 NetWare Monitoring Agent
KOQ 301 Microsoft SQL Server Monitoring Agent
KOR 301 Oracle Monitoring Agent
KOY 300 Sybase Monitoring Agent
KPT 201 Alert Adapter for Peregrine Service Center
KQI 120 WebSphere Integration Brokers Monitoring Agent
KSA 301 R/3 Monitoring Agent
KTX 300 Tuxedo Monitoring Agent
KUD 400 DB2 Universal Database Monitoring Agent
KWE 130 WebSphere Application Server Monitoring Agent
KWL 100 BEA WebLogic Server Monitoring Agent
KWN 100 Windows Management Web Service
Note: You cannot use the Tivoli Enterprise Portal to remove or uninstall OS
agents.
Note: If the Manage Tivoli Enterprise Monitoring Services utility is running when
you uninstall the agent, it is shut down automatically by the uninstallation
process.
For example, to remove the DB2 data source from the DB2 command line, run the
following command: DB2
UNCATALOG SYSTEM ODBC DATA SOURCE <datasource_name>
You can also run this uninstallation program in silent mode (by running the
program from the command line with the -silent parameter) or in console mode
(by using the -console parameter).
You must stop and restart the event server for these changes to take effect.
If your event server is running on an HP-UX computer, ensure that the _uninst
and _jvm directories are successfully removed by the uninstallation program. If
they are not, manually delete these directories.
To search multiple Internet resources for your product, use the Web search topic in
your information center. In the navigation frame, click Troubleshooting and
support Searching knowledge bases and select Web search. From this topic, you
can search a variety of resources, including the following:
v IBM technotes
v IBM downloads
v IBM Redbooks™
v IBM developerWorks®
v Forums and newsgroups
v Google
Obtaining fixes
A product fix might be available to resolve your problem. To determine what fixes
are available for your IBM software product, follow these steps:
1. Go to the IBM Software Support Web site at
http://www.ibm.com/software/support.
2. Click Downloads and drivers in the Support topics section.
3. Select the Software category.
4. Select a product in the Sub-category list.
5. In the Find downloads and drivers by product section, select one software
category from the Category list.
For more information about the types of fixes that are available, see the IBM
Software Support Handbook at
http://techsupport.services.ibm.com/guides/handbook.html.
If you experience problems with the My support feature, you can obtain help in
one of the following ways:
Online
Send an e-mail message to [email protected], describing your problem.
By phone
Call 1-800-IBM-4You (1-800-426-4968).
If you are not sure what type of software maintenance contract you need, call
1-800-IBMSERV (1-800-426-7378) in the United States. From other countries, go to
the contacts page of the IBM Software Support Handbook on the Web at
http://techsupport.services.ibm.com/guides/contacts.html and click the name of
your geographic region for phone numbers of people who provide support for
your location.
Submitting problems
You can submit your problem to IBM Software Support in one of two ways:
Online
Click Submit and track problems on the IBM Software Support site
athttp://www.ibm.com/software/support/probsub.html. Type your
information into the appropriate problem submission form.
By phone
For the phone number to call in your country, go to the contacts page of
the IBM Software Support Handbook at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
If the problem you submit is for a software defect or for missing or inaccurate
documentation, IBM Software Support creates an Authorized Program Analysis
Report (APAR). The APAR describes the problem in detail. Whenever possible,
IBM Software Support provides a workaround that you can implement until the
APAR is resolved and a fix is delivered. IBM publishes resolved APARs on the
Software Support Web site daily, so that other users who experience the same
problem can benefit from the same resolution.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
Trademarks
IBM, the IBM logo, AIX, Candle, Candle Management Server, CICS, DB2, DB2
Universal Database, developerWorks, eBA, eServer, i5/OS, IBMLink, iSeries, Lotus,
OMEGAMON, OMEGAMON Monitoring Agent, OS/390, OS/400, Passport
Advantage, RACF, Rational, Redbooks, Tivoli, the Tivoli logo, Tivoli Enterprise,
Tivoli Enterprise Console, TME 10, WebSphere, z/OS, and zSeries are trademarks
or registered trademarks of International Business Machines Corporation in the
United States, other countries, or both.
Intel and Pentium® are trademarks of Intel Corporation in the United States, other
countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Index 257
monitoring server (continued) OMEGAMON V350 and V360 (continued) portal server (continued)
configuring on Linux 52, 57 planning 40 adding application support on
configuring on UNIX 52, 57 terminology 40 Linux 78
definition 4 unsupported functions 41 adding application support on
DEPOTHOME environment upgrading 39 Windows 77
variable 138 using existing agents 45 configuring 119
determining the number needed 12 when to run the upgrade 40 configuring on Linux 62
EIB tables 239 OMEGAMON XE for CICS 41 configuring SSL 119
enabling user security 109 online publications creating a user 109
failover support 110 accessing xii enabling SSL 120
file descriptor limit on UNIX 24 operating systems, supported 24 external Web server 123
forwarding events to Tivoli Enterprise Optional Primary Network Name 23 firewall scenarios 128
Console 102 Oracle database IBM HTTP Server on Linux 125
heartbeat interval, configuring 114 local connection 150 installing 59
hot standby 110 ordering publications xi, xiii installing on Linux 61
hub definition 5 organizational planning perspective 11 installing on Windows 59
installing on Linux 51, 57 overview 1 interface, defining 127
installing on UNIX 51, 57 Internet Information Server V5.0,
installing on Windows 48, 54 configuring 123
naming 22
remote definition 5
P Internet Information Server V6.0,
configuring 124
partition file
starting 54, 108 planning worksheet, Linux 169
editing 118
stopping 54, 108 planning worksheet, Windows 168
sample 118
TEC Event Integration Facility 102 reconfiguring on Linux 62
password, saving to stash file 123
user security, configuring 109 Secure Socket Layer (SSL) 119
physical planning perspective 10
multiple network interface cards 127 SSL, configuring 119
managed systems factors 11
portal server interface, defining 127 starting 108
network factors 11
starting on Linux 64
planning 9, 12
stopping 108
hardware requirements 26
N installation 21
user security, configuring 109
user, creating 109
naming the monitoring server 22 Linux considerations 22
portal server interface 127
NAT 117, 127 managed system factors 11
problem determination
network address translation (NAT) 117, monitoring servers, number 12
describing problems 252
127 network diagram 11
determining business impact 251
portal server interface, defining 127 operating systems, supported 24
submitting problems 252
network diagram 11 remote deployment 14
product codes 185
network factors 11 requirements 24
product overview 1
Network Interface Cards 23 sample deployments 14
public-private key pair 119
new in this release 1 security considerations 13
creating 121
NFS environment, installing into 23 server placement 12
publications
NIC 127 software requirements 28
accessing online xii
portal server interface, defining 127 Tivoli Data Warehouse 30
feedback on xi
non-NIS Solaris monitoring server, Tivoli Enterprise Console 13
online xi
configuring permissions for 117 UNIX considerations 22
ordering xi, xiii
where to put your servers 12
Windows consideration 22
O worksheets 163
portal browser client R
ODBC connection 148
starting 82 reconfiguring Linux portal server 62
local database connection 149
portal client 5 remote deploy
local DB2 database connection 149
connecting to an external Web Universal Agent 143
local Microsoft SQL database
server 126 remote deployment 135
connection 150
external Web server, connecting deploying OS agents 140
local Oracle database connection 150
to 126 determining when to use 14
remote database connection 150
portal desktop client managing agent depot 139
OMEGAMON
adding application support on OS agents, deploying 140
uninstalling agents 245
Linux 80 populating agent depot 135
OMEGAMON V350 and V360 3
adding application support on sharing an agent depot 139
agents, configuration settings 41
Windows 80 tacmd createNode command 140
Candle Management Workstation
configuring on Linux 73 remote monitoring server 5
coexistence 41
installing 70 configuring on Linux 57
CandleNet Portal database 42
installing on Linux 61, 72 configuring on UNIX 57
installation directory 40
installing on Windows 70 installing 54
Java level, required 42
planning worksheet, Linux 173 installing on Linux 57
migrated information 42
planning worksheet, Windows 172 installing on UNIX 57
migrating Warehouse Proxy data 42
starting 82 installing on Windows 54
OMEGAMON XE for CICS 41
portal server 5
Index 259
Tivoli technical training xiii UNIX monitoring server (continued) Windows (continued)
training, Tivoli technical xiii network address translation hub monitoring server 48
type 185 (NAT) 117 monitoring agents 65
typeface conventions xiii non-NIS Solaris monitoring portal desktop client 70
server 117 portal server 59
upgrade remote monitoring server 54
U OMEGAMON V350 and V360 3
order 22
required authority for installation 22
response file 175
uninstallation 241
Tivoli Distributed Monitoring 3 silent installation 175
agent 247
upgrading 39 worksheets 163
component 244
agents, configuration settings 41 communications protocol 174
Linux 245
Candle Management Workstation desktop client on Linux 173
UNIX 245
coexistence 41 desktop client on Windows 172
Warehouse Proxy 247
CandleNet Portal database 42 Linux or UNIX hub monitoring
Windows 244
installation directory 40 server 165
from the portal 247
Java level, required 42 Linux or UNIX remote monitoring
monitoring component 244
migrated information 42 server 167
Linux 245
order 22 Linux portal server 169
UNIX 245
planning 40 monitoring agent on Linux or
Warehouse Proxy 247
terminology 40 UNIX 171
Windows 244
unsupported OMEGAMON monitoring agent on Windows 170
monitoring environment 241
functions 41 monitoring server communications
Linux 243
Warehouse Proxy database 42 protocol 174
UNIX 243
when to run 40 portal desktop client on Linux 173
Windows 241
upgrading to IBM Tivoli Monitoring 3 portal desktop client on
Warehouse Proxy 247
user authority when installing on Linux Windows 172
uninstalling
or UNIX 22 Windows hub monitoring server 164
event synchronization 248
user security 109 Windows portal server 168
OMEGAMON agents 245
creating a portal user 109 Windows remote monitoring
Universal Agent 6
enabling on hub monitoring server 166
Universal Agent, deploying 143
server 109
UNIX
/etc/hosts file 23
adding application support on
monitoring server 54 W
configuring 179 warehouse migration tool 42
configuring monitoring agents 68 configuring 43
EIB tables 239 planning 42
file descriptors limit 24 running 44
file permissions for configuring status tables 44
monitoring agents 69 Warehouse Proxy 6, 145
fully qualified path names 23 configuration steps 145
host names, setting 23 configuring 151, 153
hub monitoring server 51, 52 creating a Windows user 147
installation considerations 22 creating the database 147
installation user account 22 database, creating 147
installing as root 22 DB2 database configuration 148
installing monitoring agents 67 default user ID 147
maxfiles 24 deploying 146
monitoring agents 67 environment variables 153
Network Interface Cards 23 local database, connecting to 149
NFS environment 23 local ODBC connection 149
planning 22 Microsoft SQL database
remote monitoring server 57 configuration 148
response file configuration 179 migrating OMEGAMON database 42
response file installation 177 ODBC connection, setting up 148
silent configuration 179 planning 146
silent installation 177 registering 151
starting monitoring agents 70 remote database, connecting to 150
TCP/IP network services 23 remote ODBC connection 150
UNIX monitoring server removing 247
advanced configuration 117 supported databases 146
configuring permissions for non-NIS uninstalling 247
Solaris 117 Windows user, creating 147
firewall support 117 Warehouse Summarization and Pruning
KDC_PARTITION 117 agent 6, 145
NAT 117 Windows
desktop client 70
Printed in USA
GC32-9407-00