Contents. Notification types - events that trigger notifications

Size: px
Start display at page:

Download "Contents. Notification types - events that trigger notifications"

Transcription

1 Data Protector allows you to send notifications from the Cell Manager when specific events occur. For example, when a backup, object copy, object consolidation, or object verification session is completed, you can send an with the status of the session. You can set up a notification so that it triggers a report. You can configure notifications using the Data Protector GUI or any Web browser with Java support. Input parameters let you customize notifications. Some input parameters allow multiple selections. All other input parameters depend on the type of the notification. Depending on the send method, the recipient can be any of the following: a system an address an SNMP trap a script a file a configured report group the Data Protector Event Log By default, notifications are configured with default values and are sent to the Data Protector Event Log. To send additional notification using some other sending method and/or other input parameters values, the configuration values must be changed. To access the Data Protector notification functionality. You either have to be added in the admin user group or granted the Reporting and notifications user rights. Contents 1 Notification types - events that trigger notifications 2 Notifications Send Methods 3 Configure notifications 4 Related task Notification types - events that trigger notifications There are two main types of notifications. Notifications that are triggered when an event occurs Notifications that are scheduled and started by the Data Protector checking and maintenance mechanism Notifications that are triggered when an event occurs Alarm Expired Certificates Check UNIX Media Agent Csa Start Session Failed Device Error End of Session IDB Corrupted File Library Disk Usage Mail Slots Full Mount Request Session Error

2 Start of Session Too Many Sessions Notifications that are scheduled and started by the Data Protector checking and maintenance mechanism Health Check Failed IDB Backup Needed IDB Limits IDB Reorganization Needed IDB Space Low License Warning License Will Expire Not Enough Free Media Unexpected Events User Check Failed Alarm What triggers the notification: Alarm Data Protector Internal critical conditions, such as Automated Media Copy upgrade, Upgrade Core Part End, Upgrade Detail Part End, Purge End, abort of session, Disk Agents upgrade during UCP, and so on. Warning Alarm: Alarm_message

3 Expired certificates What triggers the notification: ExpiredCertificates The certificate stored on Cell Manager certificate directory is expired or not yet valid. The Cell Manager certificate directory stores all client certificates for Secure Control Communication. Warning Certificate certificate_name expired or not yet valid.

4 Csa start session failed What triggers the notification: CsaStartSessionFailed The backup session that ends with the error message: Could not start a new backup session. Major CsaStartSession failed for datalist datalist_name.

5 Device error DeviceError What triggers the notification: An error on the device Device (default: <Any>). Critical Error on device Device occurred.

6 End of session What triggers the notification: Messages displayed: EndofSession A backup, copy, consolidation, or object verification session specified in the session specification Session Specification (default: <Any>) that ends with the message Session Status (default: Completed with errors). Warning Backup session session_id of session specification backup_specification, backup specification group group completed with overall status session_overall_status; session_type session session_id of session specification session_spec, completed with overall status session_status.

7 File library disk usage FileLibraryDiskUsage What triggers the notification: A lack of free disk space for the file library Name of the File Library (default: All). Warning The File Library Device is low in disk space in the File Library Path directory.

8 Health check failed What triggers the notification: HealthCheckFailed A non-zero value returned by the omnihealthcheck command. The command returns zero if the following is true: The Data Protector services (CRS, MMD, hpdp-idb, hpdp-idb-cp, hpdp-as, KMS, omnitrig, and omniinet) are active. The Data Protector Media Management Database (MMDB) is consistent. At least one backup of the IDB exists. By default, Data Protector starts the Health Check (which runs the omnihealthcheck command) once a day. Critical Health check message: healthcheck_command failed.

9 IDB backup needed IDBBackupNeeded What triggers the notification: Too many successive incremental IDB backups or insufficiently frequent full IDB backup. Warning There are n successive incremental IDB backups. The last backup of the Data Protector Internal Database was done on MM/DD/YY hh:mm:ss.

10 IDB corrupted IDBCorrupted What triggers the notification: Corruption of a part of the IDB. Critical Corruption in the IDB_part part of the Data Protector Internal Database has been detected (error_message). Values for error messages are: Verification of datafile(s) failed. KeyStore is corrupted. Media and Media in position tables are not consistent. Database is not in consistent state. Database schema is not consistent.

11 IDB limits IDBLimits What triggers the notification: Reaching the limit of any of the MMDB or CDB parts. Major The IDB_part part of the Data Protector Internal Database has reached its limit.

12 IDB reorganization needed IDBReorganizationNeeded What triggers the notification: One or more IDB entities need to be reorganized due to fragmentation or wasted space. Warning Bloat on table name_of_table detected. Fragmentation of table name_of_table on column uuid detected. Fragmentation of index name_of_index detected.

13 IDB space low What triggers the notification: IDBSpaceLow One of the following events: The maximum free disk size is below the IDB Disk Free Threshold [MB] (default: 300 MB) value. The difference between the maximum and current size of all DC directories falls below the DCBF Size Limit Threshold [MB] (default: 500 MB) value. The maximum free disk size is below the WAL Disk Free Threshold [MB] (default: 300 MB) value. By default, Data Protector checks the IDB Space Low condition once a day. Major Data Protector Internal Database is running out of space.

14 License warning LicenseWarning What triggers the notification: A need for purchased licenses. Warning n licenses need to be purchased for category name of the license. Run omnicc - check_licenses -detail for more info.

15 License will expire What triggers the notification: LicenseWillExpire The forthcoming expiration date of the Data Protector license. The license will expire in number of days specified in License expires in days (default: 10). Warning The first license will expire in License expires in days days.

16 Mail slots full MailSlotsFull What triggers the notification: Full mail slots of the device Device (default: <Any>). Warning All mail slots of library Device are full. Remove them immediately.

17 Mount request MountRequest What triggers the notification: A mount request for the device Device (default: <Any>). Warning Mount request on device Device.

18 Not enough free media What triggers the notification: NotEnoughFreeMedia A lack of free media in the Media Pool. Notice, that if a Media Pool is configured to use a Free Pool, the Number of Free Media from the Free Pool is also considered. Warning Media pool Media Pool contains only number_of_mediafree media.

19 Session error What triggers the notification: Messages displayed: SessionError A backup, copy, consolidation, or object verification session with a message of the level Single Message Level (default: Major) or higher, displayed in the Monitor window. Major Backup session session_id of session specification backup_specification, backup specification group group has errors: number_of_errors. session_type session session_id of session specification session_spec has errors: number_of_errors.

20 Start of session What triggers the notification: Messages displayed: StartofSession A start of a backup, copy, consolidation, or object verification session specified in the session specification Session Specification (default: <Any>). Normal Backup session session_id started for session specification backup_specification backup specification group group. session_type session session_id started for session specification session_spec.

21 Too many sessions TooManySessions What triggers the notification: Start of a session when 1000 sessions are already running concurrently. Warning Session cannot start because the maximum number of concurrently running sessions has been reached.

22 Unexpected events What triggers the notification: UnexpectedEvents An unusually high number of new events in the Data Protector Event Log since the last time the check was made. The number exceeds Number of events (default: 20). By default, Data Protector checks the condition once a day. Warning Data Protector Event Log increased for number_of events_in_last_day unexpected events in the last day.

23 Check UNIX media agent What triggers the notification: UnixMediaAgentWarning The mrgcfg -check_ma command triggers this notification when client devices are using rewind device files instead of no-rewind device files. Warning Media Agents, clients devices may have been configured using rewind device files instead of no-rewind device files. This may lead to problems in SAN environments.

24 User check failed What triggers the notification: UserCheckFailed A non-zero value returned by the user-created script/command with the name Command Path located in the default Data Protector administrative commands directory. By default, Data Protector starts the User Check (which runs the script) once a day (default: None). Major User check failed with exit code error_code:error_description.

25 Notifications Send Methods You can choose among various send methods when configuring a notification. By default, all notifications are configured to be sent to the Data Protector Event Log. To send a notification using another sending method, also, you must configure an additional notification. The available notification send methods are: Broadcast message send method send method (SMTP) send method External send method Log to file send method Data Protector Event Log send method SNMP send method Use report group send method Broadcast Message send method The broadcast message send method allows you to send a broadcast message with the output of the notification to specified systems after a specified event occurs. Broadcast messages can be sent to Windows systems only by specifying the target system. Broadcast messages are limited to 1000 characters, so a short format is preferred. send method You can send an with the output of a notification to specified recipients. Make sure you provide the full address of the recipient. Important Due to security features of Microsoft Outlook, using the send method may cause the CRS service to stop responding. Therefore, the recommended method for sending notifications is SMTP. On Windows systems To send an notification from a Windows system, you need to have a mail profile. You can either use an existing mail profile or create a new one, named OmniBack. To use an existing mail profile, add the following line to the Data Protectoromnirc file: OB2_MAPIPROFILE=existing_MAPI_profile_name On UNIX systems The subsystem has to be configured and running on a UNIX system. Due to the operating system limitations, international characters in localized notifications can be displayed incorrectly on UNIX systems, if they are passed between systems using a different locale. (SMTP) send method You can send an with the output of a notification to specified recipients. Make sure you provide the full address of the recipient. This is the recommended send method. By default, the address of the SMTP server used for sending the notifications is set to the Cell Manager IP address. To change the address, edit the SMTPServer global option. The SMTP server must be accessible from the Cell Manager system, but

26 does not need to be part of the Data Protector cell. External send method The external script send method allows you to process the output of the notification in your own script. The script receives the output as standard input (STDIN). The recommended format for script processing is the tab format. The script, which is located on the Cell Manager system, must reside in the default Data Protector administrative commands directory. Provide only the name of the script, no path. Note that only.bat,.exe, and.cmd are supported extensions for external scripts on Windows systems. To run a script with an unsupported extension (for example,.vbs), create a batch file that starts the script. Then configure Data Protector to run the batch file as an external script, which then starts the script with the unsupported extension. You can also use this delivery method to perform a scheduled eject of the specified media. Log to file send method The log to file send method lets you post a file with the output of the notification when a specified event occurs. The file is posted to the Cell Manager system. You have to specify the name of the file to which you want to post the notification. The file will be overwritten if it exists. Data Protector Event Log send method By default, all notifications are sent to the Data Protector Event Log. The Data Protector Event Log is accessible only for Data Protector users in the admin user group and to Data Protector users that are granted the Reporting and notifications user rights. You can view or delete all events in the Data Protector Event Log. SNMP send method SNMP send method allows you to send an SNMP trap with the output of the notification when a specified event occurs. The SNMP trap can be further processed by applications using SNMP traps. On Windows systems On a Windows Cell Manager, SNMP traps are sent to the systems configured in the Windows SNMP traps configuration. You need to configure Windows SNMP traps to use the SNMP send method on Windows systems. On UNIX systems On a UNIX Cell Manager, SNMP traps are sent to the systems configured in the notification. Use report group send method Use report group send method allows you to run a report group when a specified event occurs. Configure notifications To configure a notification you need to provide a name for the notification, a type of notification, message level, send method, and recipient. All other input parameters depend on the type of the notification. You either have to be added in the admin user group or granted the Reporting and notifications user rights. Complete the following steps: 1. In the Context List, select Reporting. 2. Right-click Notifications and click Add Notification to open the wizard.

27 3. The wizard options depend on the notification you selected. For example, all options available for the IDB Space Low notification are not available for the IDB Limits notification. Click Next as many times as needed to reach the last page of the wizard. 4. Click Finish to exit the wizard. The notification will be sent using the specified send method when the specified event occurs. Tip To trigger a report group by a notification, configure a report group and then configure the notification to use the Use Report Group send method. Related task Troubleshoot Reports and Notifications

HP Data Protector MoM Configuration and Troubleshooting Guide

HP Data Protector MoM Configuration and Troubleshooting Guide HP Data Protector MoM Configuration and Troubleshooting Guide Last updated, v3, November 2010 Data Protector Manager-of-Managers concept... 2 Using multiple Cell Managers... 2 Manager-of-Manager features...

More information

HPE Data Protector. Software Version: Administrator's Guide

HPE Data Protector. Software Version: Administrator's Guide HPE Data Protector Software Version: 10.01 Administrator's Guide Document Release Date: September 2017 Software Release Date: September 2017 Legal Notices Warranty The only warranties for Hewlett Packard

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Data Protector Internal Database purge best practices

Data Protector Internal Database purge best practices Data Protector Internal Database purge best practices Commands that purge obsolete data from HP Data Protector Software Internal Database, helping to maintain the Internal Database in good condition Technical

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

Exception Codes and Module Numbers Used in Cisco Unified MeetingPlace Express

Exception Codes and Module Numbers Used in Cisco Unified MeetingPlace Express CHAPTER 4 and Module Numbers Used in Cisco Unified MeetingPlace Express This chapter contains information about the exception codes used in the Cisco Unified MeetingPlace Express system. After reviewing

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

VMware vsphere. Administration VMware Inc. All rights reserved

VMware vsphere. Administration VMware Inc. All rights reserved VMware vsphere Administration 2010 VMware Inc. All rights reserved Permissions Privileges Hierarchical by category Roles Defined set of one or more privileges System and sample roles provided Privileges

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2.1 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

N4A Device Manager 4.6.0

N4A Device Manager 4.6.0 N4ACMSX-UG460 N4A Device Manager 4.6.0 User Guide Version 1.0 October 30, 2015 NOVATEL WIRELESS COPYRIGHT STATEMENT 2015 Novatel Wireless, Inc. All rights reserved. The information contained in this document

More information

HP Data Protector Integration with Autonomy IDOL Server

HP Data Protector Integration with Autonomy IDOL Server Technical white paper HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Table of contents Summary 2 Introduction 2 Integration concepts

More information

TSM Studio Server Alerting User Guide

TSM Studio Server Alerting User Guide TSM Studio Server Alerting User Guide Table of Contents Disclaimer... 3 TSM Studio Server Alerting... 4 Activity Log Monitor Alerting... 5 Activity Log Alert Filters... 6 Setting up Activity Log Notification...

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

User Guide. Version R94. English

User Guide. Version R94. English Cloud Backup User Guide Version R94 English March 30, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

Monitoring. 18 Nov TM and copyright Imagicle spa

Monitoring. 18 Nov TM and copyright Imagicle spa Monitoring 18 Nov 2018 TM and copyright 2010-2018 Imagicle spa Table of Contents Monitoring...1/3 Monitoring service configuration...1/3 Monitoring Monitoring service configuration The Application Suite

More information

Configuring Communication Services

Configuring Communication Services This chapter includes the following sections: Configuring HTTP, on page 1 Configuring SSH, on page 2 Configuring XML API, on page 3 Enabling Redfish, on page 3 Configuring IPMI, on page 4 Configuring SNMP,

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Central Administration Console Installation and User's Guide SC27-2808-04 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

Navigating Cisco Prime Health and Utilization Monitor Tasks in LMS 4.1

Navigating Cisco Prime Health and Utilization Monitor Tasks in LMS 4.1 CHAPTER 6 Navigating Cisco Prime Health and Utilization Monitor Tasks in LMS 4.1 Cisco Prime Health and Utilization Monitor (HUM) is a Simple Network Management Protocol (SNMP) based MIB polling application

More information

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe Overview This chapter includes the following sections: Cisco UCS E-Series Servers Overview, page 1 Server Software, page 2 CIMC Overview, page 3 CIMC GUI, page 3 Cisco UCS E-Series Servers Overview The

More information

Aventail README ASAP Platform version 8.0

Aventail README ASAP Platform version 8.0 Aventail README 1 Aventail README ASAP Platform version 8.0 Part No. 0850-000010-01 October 19, 2004 This README highlights new features and provides late-breaking information about the Aventail EX-1500

More information

HPE Data Protector Software Version: Troubleshooting Guide

HPE Data Protector Software Version: Troubleshooting Guide HPE Data Protector Software Version: 9.08 Troubleshooting Guide Document Release Date: October 2016 Software Release Date: October 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise

More information

HP Data Protector 9.0 Deduplication

HP Data Protector 9.0 Deduplication Technical white paper HP Data Protector 9.0 Deduplication Introducing Backup to Disk devices and deduplication Table of contents Summary 3 Overview 3 When to use deduplication 4 Advantages of B2D devices

More information

IBM DB2 Query Patroller. Administration Guide. Version 7 SC

IBM DB2 Query Patroller. Administration Guide. Version 7 SC IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure

More information

You can administer Policy and Distribution Services by using the following:

You can administer Policy and Distribution Services by using the following: IPolicy and Distribution Services Novell ZENworks 7 Server Management Policy and Distribution Services is a software, configuration, and behavioral management system for servers. Through Policy and Distribution

More information

BIG-IP Analytics: Implementations. Version 12.1

BIG-IP Analytics: Implementations. Version 12.1 BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting

More information

GIGABYTE Remote Management Console User s Guide. Version: 1.0

GIGABYTE Remote Management Console User s Guide. Version: 1.0 GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java

More information

BIG-IP Analytics: Implementations. Version 13.1

BIG-IP Analytics: Implementations. Version 13.1 BIG-IP Analytics: Implementations Version 13.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles... 5 Overview:

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Server Status Dashboard

Server Status Dashboard The Cisco Prime Network Registrar server status dashboard in the web user interface (web UI) presents a graphical view of the system status, using graphs, charts, and tables, to help in tracking and diagnosis.

More information

Monitoring Event Logs

Monitoring Event Logs 13 CHAPTER This chapter describes the Monitoring module of Cisco NAC Appliance. Topics include: Overview, page 13-1 Interpreting Event Logs, page 13-4 Configuring Syslog Logging, page 13-9 Cisco NAC Appliance

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

Cisco Unity Connection uses separate databases to store the system configuration and the information in voic s.

Cisco Unity Connection uses separate databases to store the system configuration and the information in voic s. , on page 1 Overview Cisco Unity Connection uses separate databases to store the system configuration and the information in voicemails. About Mailbox Stores Consider the following points to understand

More information

Installation and Release Bulletin Sybase SDK DB-Library Kerberos Authentication Option 15.7

Installation and Release Bulletin Sybase SDK DB-Library Kerberos Authentication Option 15.7 Installation and Release Bulletin Sybase SDK DB-Library Kerberos Authentication Option 15.7 Document ID: DC00534-01-1570-02 Last revised: April 19, 2012 Topic Page 1. Accessing current release bulletin

More information

Getting Started with Notifications

Getting Started with Notifications Getting Started with Notifications Getting Started with Notifications The Notifications application is used to monitor switch activity and configure trap management tasks, including: Monitoring switch

More information

Exam Name: IBM Tivoli Storage Manager V6.2

Exam Name: IBM Tivoli Storage Manager V6.2 Vendor: IBM Exam Code: 000-037 Exam Name: IBM Tivoli Storage Manager V6.2 Implementation Version: DEMO 1. A company is mandated to retain all archived data for seven years. Which two parameters must be

More information

With standard audit logging, configuration changes to the system get logged in separate log files for auditing.

With standard audit logging, configuration changes to the system get logged in separate log files for auditing. , on page 1 With audit logging, configuration changes to the system get logged in separate log files for auditing. Audit Logging (Standard) When audit logging is enabled, but the detailed audit logging

More information

CompleteView Admin Console User Manual. CompleteView Version 4.6

CompleteView Admin Console User Manual. CompleteView Version 4.6 CompleteView Admin Console User Manual CompleteView Version 4.6 Table of Contents Introduction... 1 End User License Agreement...1 Overview...2 Configuration... 3 Starting the Admin Console...3 Adding

More information

Viewing Log Files. Understanding GSS Logging Levels CHAPTER

Viewing Log Files. Understanding GSS Logging Levels CHAPTER CHAPTER 8 This chapter describes how to store and view logged information about your GSS devices. Each GSS device contains a number of log files that retain records of specified GSS-related activities

More information

Current Firmware Release Notes

Current Firmware Release Notes Current Firmware Release Notes CPI recommends that all econnect PDU customers upgrade to the current firmware version. Release Versions 1.23.126 & 2.23.126: Upgrade Procedure: Download the zip file from

More information

9936A LogWare III. User s Guide. Revision

9936A LogWare III. User s Guide. Revision 9936A LogWare III User s Guide Revision 850701 Table of Contents 1 Introduction...1 1.1 Symbols Used... 1 1.2 Conventions... 1 1.3 What is LogWare?... 1 1.4 License Agreement... 2 1.5 Requirements...

More information

Software Images. About Software Images. Dependent Factors. Send documentation comments to CHAPTER

Software Images. About Software Images. Dependent Factors. Send documentation comments to CHAPTER CHAPTER 10 This chapter describes how to install and upgrade software images, and introduces the file system. It includes the following sections: About, page 10-1 Essential Upgrade Prerequisites, page

More information

Employee Web Services. Installation Guide

Employee Web Services. Installation Guide Employee Web Services This is a publication of Abila, Inc. Version 2017.x 2016 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tab... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

Installation and Release Bulletin Sybase SDK DB-Library Kerberos Authentication Option 15.5

Installation and Release Bulletin Sybase SDK DB-Library Kerberos Authentication Option 15.5 Installation and Release Bulletin Sybase SDK DB-Library Kerberos Authentication Option 15.5 Document ID: DC00534-01-1550-01 Last revised: December 16, 2009 Topic Page 1. Accessing current bulletins 2 2.

More information

Xerox CentreWare for Tivoli NetView Users Guide Version 1.1.8

Xerox CentreWare for Tivoli NetView Users Guide Version 1.1.8 Xerox CentreWare for Tivoli NetView Users Guide Version 1.1.8 2009 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information

More information

NetIQ Advanced Authentication Framework- Web Service. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework- Web Service. Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework- Web Service Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Installing and Removing

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 ADMINISTRATOR GUIDE Software 1.8 December 2014 3725-66008-001 Rev C RealPresence Platform Director Polycom, Inc. 1 Copyright 2014, Polycom,

More information

Data Protection Guide

Data Protection Guide SnapCenter Software 4.0 Data Protection Guide For Microsoft Exchange Server March 2018 215-12936_C0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to read the SnapCenter Data Protection

More information

EMS MASTER CALENDAR Installation Guide

EMS MASTER CALENDAR Installation Guide EMS MASTER CALENDAR Installation Guide V44.1 Last Updated: May 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: Introduction

More information

HPE Insight Management Agents Installation Guide

HPE Insight Management Agents Installation Guide HPE Insight Management Agents 10.60 Installation Guide Abstract This guide provides information about the Hewlett-Packard Enterprice Insight Management Agents software Installation and Configuration procedures.

More information

Source OID Message Severity Cause Action

Source OID Message Severity Cause Action 13 CHAPTER This section describes the Prime Network system events. System events appear in the Prime Network Events System tab. They include a variety of events pertaining to the system activities, from

More information

Citrix Resource Manager System Monitoring and Analysis for MetaFrame XP for Windows, Feature Release 1 and Service Pack 1 Citrix Systems, Inc.

Citrix Resource Manager System Monitoring and Analysis for MetaFrame XP for Windows, Feature Release 1 and Service Pack 1 Citrix Systems, Inc. Administrator s Guide Citrix Resource Manager System Monitoring and Analysis for MetaFrame XP for Windows, Feature Release 1 and Service Pack 1 Citrix Systems, Inc. Information in this document is subject

More information

Dell DL4300 Appliance Release Notes

Dell DL4300 Appliance Release Notes Dell DL4300 Appliance Release Notes Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The

More information

A Configuration of Avaya Voic Pro Networked with Avaya INTUITY AUDIX through Avaya Interchange for Voice Message Exchange - Issue 1.

A Configuration of Avaya Voic Pro Networked with Avaya INTUITY AUDIX through Avaya Interchange for Voice Message Exchange - Issue 1. Avaya Solution & Interoperability Test Lab A Configuration of Avaya Voicemail Pro Networked with Avaya INTUITY AUDIX through Avaya Interchange for Voice Message Exchange - Issue 1.0 Abstract These Application

More information

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0 DC-228 ADSL2+ Modem/Router -Annex A- User Manual Version: 1.0 TABLE OF CONTENTS 1 PACKAGE CONTENTS...3 2 PRODUCT LAYOUT...4 3 NETWORK + SYSTEM REQUIREMENTS...6 4 DC-228 PLACEMENT...6 5 SETUP LAN, WAN...7

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

How to integrate HP StorageWorks tape libraries into a SAN based backup environment.

How to integrate HP StorageWorks tape libraries into a SAN based backup environment. HP World Chicago August 16 20 2004 How to integrate HP StorageWorks tape libraries into a SAN based backup environment. Presentation 1 (20 mins) : HP Extended Tape Library Architecture (ETLA) Overall Lab

More information

SQL Monitor 2.0. November Note: these pages apply to a version of this product that is not the current released version.

SQL Monitor 2.0. November Note: these pages apply to a version of this product that is not the current released version. SQL Monitor 2.0 November 2010 Note: these pages apply to a version of this product that is not the current released version. For the latest support documentation, please see http://documentation.red-gate.com

More information

Configuration Tasks. Configuring the System Using CLI Commands. Configuring the System Using the GUI

Configuration Tasks. Configuring the System Using CLI Commands. Configuring the System Using the GUI Last Update: June 28, 2007 This chapter lists the tasks for configuring and maintaining Cisco Unity Express and contains the following sections: Configuring the System Using CLI Commands, page 21 Configuring

More information

HP Data Protector 6.20 Granular Recovery Extension User Guide for VMware vsphere

HP Data Protector 6.20 Granular Recovery Extension User Guide for VMware vsphere HP Data Protector 6.20 Granular Recovery Extension User Guide for VMware vsphere HP Part Number: N/A Published: December 2011 Edition: Fourth Copyright 2011 Hewlett-Packard Development Company, L.P. Confidential

More information

ehealth Integration for HP OpenView User Guide

ehealth Integration for HP OpenView User Guide ehealth Integration for HP OpenView User Guide MN-NHHPOV-003 July 2005 Important Notice Concord Communications, Inc., ehealth, ehealth Suite, the Concord Logo, eroi, AdvantEDGE, SystemEDGE, Live Health,

More information

User Manual. Admin Report Kit for IIS (ARKIIS)

User Manual. Admin Report Kit for IIS (ARKIIS) User Manual Admin Report Kit for IIS (ARKIIS) Table of Contents 1 Admin Report Kit for Internet Information Server-(ARKIIS)... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements...

More information

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments Veeam ONE Version 8.0 User Guide for VMware vsphere Environments July, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Openview Product Management of Linux Systems. Emil Velez Technical Consultant HP Customer Education

Openview Product Management of Linux Systems. Emil Velez Technical Consultant HP Customer Education Openview Product Management of Linux Systems Emil Velez Technical Consultant HP Customer Education Outline - How Network Node Manager Discovers Linux Systems - How IT Operations can manage events of Linux

More information

Using WinTask to Extend ehealth Application Monitoring

Using WinTask to Extend ehealth Application Monitoring Using WinTask to Extend ehealth Application Monitoring WinTask is a task-automation tool that can record and play back user actions for any Windows-based application. It captures all the user activity

More information

Check Table Oracle Database Status Shell Script Monitor

Check Table Oracle Database Status Shell Script Monitor Check Table Oracle Database Status Shell Script Monitor oracle_dataguard_stats, Check various aspects of Data-Guard state All ORACLE related actions are directly done on the database hosts. The plugin

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

Cisco Prime Collaboration Deployment Configuration and Administration

Cisco Prime Collaboration Deployment Configuration and Administration Cisco Prime Collaboration Deployment Configuration and Administration Services, page 1 Limitations and Restrictions, page 5 Services After the installation of the Cisco Prime Collaboration Deployment platform,

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Getting Started with ehealth for Voice Cisco Unity & Unity Bridge

Getting Started with ehealth for Voice Cisco Unity & Unity Bridge Focus on Setup Getting Started with ehealth for Voice Cisco Unity & Unity Bridge What s Inside About ehealth for Voice Cisco Unity. An overview of the product components. Requirements. Prerequisites for

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

HP Data Protector A Concepts guide B

HP Data Protector A Concepts guide B HP Data Protector A.06.10 Concepts guide B6960-96035 Part number: B6960-96035 First edition: November 2008 Legal and notice information Copyright 1999, 2008 Hewlett-Packard Development Company, L.P. Confidential

More information

HPE Data Protector Deduplication

HPE Data Protector Deduplication Technical white paper HPE Data Protector Deduplication Introducing Backup to Disk devices and deduplication Table of contents Summary 3 Overview 3 When to use deduplication 4 Advantages of B2D devices

More information

HP Certified Professional

HP Certified Professional HP Certified Professional 5 Basics for UNIX HP0-608 Exam Preparation Guide Purpose of the exam prep guide Audience The intent of this guide is to set expectations about the content and the context of the

More information

ST0-12W Veritas Cluster Server 5 for Windows (STS)

ST0-12W Veritas Cluster Server 5 for Windows (STS) ST0-12W Veritas Cluster Server 5 for Windows (STS) Version 4.1 Topic 1, Volume A QUESTION NO: 1 Which Veritas Cluster Server component corresponds to hardware or software components of an application service?

More information

WhatsUpGold. Getting Started Guide

WhatsUpGold. Getting Started Guide WhatsUpGold Premium Edition v.11 Getting Started Guide Welcome to Ipswitch WhatsUp Gold v11 Welcome to WhatsUp Gold v11, the powerful network monitoring solution designed to help you protect your changing

More information

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9 Gateway Upgrade Guide for On-Premises Version 17 August 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Upgrading Primavera Gateway... 7 Prerequisites... 7 Upgrading Existing Gateway Database...

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

Oracle WebLogic Diagnostics and Troubleshooting

Oracle WebLogic Diagnostics and Troubleshooting Oracle WebLogic Diagnostics and Troubleshooting Duško Vukmanović Principal Sales Consultant, FMW What is the WebLogic Diagnostic Framework? A framework for diagnosing problems that

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Router Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of

More information

With standard audit logging, configuration changes to the system get logged in separate log files for auditing.

With standard audit logging, configuration changes to the system get logged in separate log files for auditing. , page 1 With audit logging, configuration changes to the system get logged in separate log files for auditing. Audit Logging (Standard) When audit logging is enabled, but the detailed audit logging option

More information

HP StorageWorks XP Performance Advisor Software User Guide

HP StorageWorks XP Performance Advisor Software User Guide HP StorageWorks XP Performance Advisor Software User Guide This guide describes how to use HP StorageWorks XP Performance Advisor Software product (XP Performance Advisor), and includes the user tasks

More information

Upgrading the Cisco ONS CL to Release 7.0

Upgrading the Cisco ONS CL to Release 7.0 This document explains how to upgrade Cisco ONS 15310-CL Cisco Transport Controller (CTC) software from Release 5.x or Release 6.x to Release 7.0.x, or from Release 7.0.x to a later maintenance release

More information

User Guide. Version R95. English

User Guide. Version R95. English Monitor User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Oracle VM. Getting Started Guide for Release 3.2

Oracle VM. Getting Started Guide for Release 3.2 Oracle VM Getting Started Guide for Release 3.2 E35331-04 March 2014 Oracle VM: Getting Started Guide for Release 3.2 Copyright 2011, 2014, Oracle and/or its affiliates. All rights reserved. Oracle and

More information

IBM. Bulk Load Utilities Guide. IBM Emptoris Contract Management SaaS

IBM. Bulk Load Utilities Guide. IBM Emptoris Contract Management SaaS IBM Emptoris Contract Management IBM Bulk Load Utilities Guide 10.1.2 SaaS IBM Emptoris Contract Management IBM Bulk Load Utilities Guide 10.1.2 SaaS ii IBM Emptoris Contract Management: Bulk Load Utilities

More information

vrealize Operations Manager Management Pack for vrealize Hyperic Release Notes

vrealize Operations Manager Management Pack for vrealize Hyperic Release Notes vrealize Operations Manager Management Pack for vrealize Hyperic Release Notes vrealize Operations Manager Management Pack for Hyperic 6.0 Last document update: 04 December 2014. Contents: New Features

More information

1111 West 35th Street Chicago, IL Customer Support: (773) UPS SNMPWEBCARD

1111 West 35th Street Chicago, IL Customer Support: (773) UPS SNMPWEBCARD 1111 West 35th Street Chicago, IL 60609 Customer Support: (773) 869-1234 www.tripplite.com UPS SNMPWEBCARD USER S GUIDE FCC Radio/TV Interference Notice The SNMPWEBCARD has been tested and found to comply

More information

Enterprise License Manager User Guide, Release 9.1(1)

Enterprise License Manager User Guide, Release 9.1(1) First Published: September 14, 2012 Last Modified: June 18, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Configuring Trace. Configuring Trace Parameters CHAPTER

Configuring Trace. Configuring Trace Parameters CHAPTER CHAPTER 7 Note Enabling trace decreases system performance; therefore, enable trace only for troubleshooting purposes. For assistance in using trace, contact your technical support team. This chapter contains

More information

Troubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER

Troubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER CHAPTER 5 This chapter describes how to troubleshoot the NAM and includes these sections: Netflow Data Export, page 5-1 Error Messages, page 5-9 Web Username and Password Guidelines, page 5-15 Supported

More information

MPDS Configuration Sheet MS Outlook 2000 Mail Client

MPDS Configuration Sheet MS Outlook 2000 Mail Client Connecting Microsoft Outlook to a POP3 server. Pre-requisites: That the MPDS terminal is already connected to the Internet as described in previous integration documents, Microsoft Outlook is Installed,

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information