Managing System Data
|
|
- Mariah Ryan
- 5 years ago
- Views:
Transcription
1 CHAPTER 16 SMEs: New chapter to club all the system data collection, retention and cleanup topics in one place. Eventually will include how to setup and use Distributed Data Collectors, when that feature makes it into the product. One of the roles of an administrator is to manage Prime Infrastructure s network data collection and retention so that it: Scales to fit the real needsa of the system s users. Minimizes the burden on monitoried devices, applications, and network bandwidth. Survivies hardware failures. The following sections explain how to achieve these goals. Scaling the System SMEs: New planning section explaining the options administrator has in how data collection is done, controlling the size of the database, how much additional traffic the system generates, the size of log files, etc. SMEs: Questions for you: Is there any way the customer can check on how big his critical data stores are getting? The information under Administration > Appliance > Disk Space just gives Disk Space usage. How does he connect to that to, say, how long he is retaining Alarm and Event data, or Do we have any stats on how big these get given sizes of networks, OVAs? How do they track the size of these databases and log files? What are the tradeoffs in terms of amount of database and log file and audit data detail you can retain? For example how do the retention periods for Trend, Device Health, Performance, Network Audit and System Health data affect the growth of the database? Recommendations on where you should cut first, depending on what your emphasese are. For example, if performance data is critical, leave performance alone, cut trend data. List built-in controls, like Alarm/Event cleanup, and link to all the procedures associated with this. Controlling Background Data Collection Tasks, page 16-2 Checking on System Disk Usage, page
2 Scaling the System Chapter 16 Controlling Report Storage and Cleanup, page 16-3 Controlling Alarm, Event, and Syslog Retention, page 16-4 Controlling Health Data Retention, page 16-4 Controlling Trend Data Retention, page 16-5 Controlling Performance Data Retention, page 16-5 Controlling Audit Data Retention, page 16-6 Controlling Background Data Collection Tasks Table 16-1 Background Data Collection Tasks This task AP Image Pre-Download Status Autonomous AP CPU and Memory Utilization Autonomous AP Inventory Autonomous AP Radio Performance Autonomous AP Tx Power and Channel Utilization CCX Client Statistics CleanAir Air Quality Client Statistics Interferers Media Stream Clients Mesh link Performance Mesh Link Status Mobility Service Performance Radio Performance Rogue AP Switch Inventory Traffic Stream Metrics Unmanaged APs Wireless Controller Inventory Wireless Controller Performance Collection of data on The image pre-download status of the access points associated with wireless controllers, For this data to be available for collection, you must enable the Pre-download software to APs option when configuring software downloads to controllers. This data is used in the AP Image Pre-Download Status report. Wireless controller device inventory. This data is used in inventory and PCI DSS Detaile reports. Controls collection of wireless controller performance statistics. 16-2
3 Chapter 16 Scaling the System Table 16-1 Background Data Collection Tasks This task Running Data Collection Enabling Data Collection Tasks Disabling Data Collection Tasks Collection of data on Checking on System Disk Usage To check on the current disk usage: Choose Administration > Appliance > Appliance Status. Under Disk Usage, Prime Infrastructure displays the current storage allocation and percantage of use for each of the Prime Infrastructure subsystem:s in Table 16-2Appliance Status Data Sources, page Table 16-2 Appliance Status Data Sources Disk Source /dev/mapper/smosvg-rootvol /dev/mapper/smosvg-tmpvol /dev/sda3 /dev/mapper/smosvg-recvol /dev/mapper/smosvg-home /dev/mapper/smosvg-optvol /dev/mapper/smosvg-usrvol /dev/mapper/smosvg-varvol /dev/mapper/smosvg-storeddatavol /dev/mapper/smosvg-altrootvol /dev/mapper/smosvg-localdiskvol /dev/sda1 tmpfs Description SMEs: Need description for this and following data sources. What does this source contain? Why is it so importnat you give users a way to check on it? How is it affected by data retention policies or data collection? Controlling Report Storage and Cleanup All scheduled reports are stored in the Scheduled Reports Repository. You will want to ensure that scheduled reports are retained in the report repository for reasonable lengths of time only, and deleted on a regular basis. The default retention scheme is to retain generated reports for no more than 31 days. You can customize this retention period following the steps below. 16-3
4 Scaling the System Chapter 16 Select Report In Repository Path, change specify the repository path as needed. ) Under File Retain Period, change the schedule report retention period as needed Step 5 Controlling Alarm, Event, and Syslog Retention, page 16-1 Controlling Alarm, Event, and Syslog Retention As part of managing your system data, you will want to ensure that raw alarm, event and syslog data are retained for reasonable lengths of time only, and deleted on a regular basis. Data cleanup tasks run nightly to delete old alarms. In addition to the data cleanup task, Prime Infrastructure has an hourly task to check alarm table size. When the alarm table size exceeds 300K, the task deletes the oldest cleared alarms until the alarm table size is within 300 K.. The default retention scheme is to retain active alarms, cleared security alarms, events, and syslogs for no more than 30 days. Cleared non-security alarms are retained for 7 days only. You can customize these retention periods following the steps below. Step 5 Select Alarms and Events Under Alarm and Event Cleanup Options, change the alarm and event retention periods, as needed. Under Syslog Cleanup Options, change the syslog retention period as needed Controlling Health Data Retention Device Health and System Health data are assembled constantly, and deleted on an hourly, daily and weekly basis. SMEs: Why would someone want to change these? What does it mean that data are deelted on an hourly basis? What is retained after that to be deleted on the daily and weekly basis? You can customize these retention periods following the steps below. Select Data Retention. 16-4
5 Chapter 16 Scaling the System Step 5 Under Device Health Data Retain Periods, change the hourly, daily and weekly retention period, as needed. Under System Health Data Retain Periods, change the hourly, daily and weekly retention period, as needed. Controlling Trend Data Retention Trend data is aggregated constantly, and deleted on an hourly, daily and weekly basis. SMEs: Why would someone want to change this? What does it mean that the data are aggregated? How is this different from the other data being retained? You can customize the retention period following the steps below. Select Data Retention. Under Trend Data Retain Periods, change the hourly, daily and weekly aggregated data retention period, as needed. Controlling Performance Data Retention Performance data is ssembled constantly, and deleted on a flexible short-, medium- and long-term basis. SMEs: Why would someone want to change this? What kind of data is deleted on the short-term basis? What on long-term? You can customize these retention periods following the steps below. Select Data Retention. Under Performance Data Retain Periods, change the short, medium and long-term data retention period, as needed. 16-5
6 Maintaining the Database Chapter 16 Controlling Audit Data Retention Network audit data is normally deleted after 90 days.. SMEs: Why would someone want to change this? You can customize this retention period following the steps below. Select Data Retention. Under Network Audit Data Retain Period, change the retention period, as needed. Maintaining the Database As with any other system upon which your organization relies, you will need to ensure that Prime Infrastructure s databases are backed up regularly and can be restored in case of hardware or other failures. Backups are always stored in a depository. You may specify remote FTP repositories as well as the default local repositories. Backups are aaved as.zip files in the ftp-install-dir/ftp-server/root/ncsbackup directory, with a filename in this format: dd-mmm-yy_ hh-mm-ss.zip (for example, 10-Dec-12_ zip). Running Database Backups On Demand, page 16-6 Scheduling Automatic Database Backups, page 16-7 Restoring the Database From Backups, page 16-7 Running Database Backups On Demand You will normally want to schedule automatic database backups, so that the time- and processor-intensive backup process occurs only at relatively low-traffice periods during the day. If you want to execute an immediate system backup, follow the steps below. Choose Administration > Task Manager > Background Tasks. Under Other Background Tasks, find the NCS Server Backup task. If you want to change the backup repository and maximum number of backups, click the NCS Server Backup link and adjust these values, then click Save. 16-6
7 Chapter 16 Maintaining the Database Step 5 Step 6 Step 7 Check the NCS Server Backup task checkbox. At the top of the page, select the command Execute Now. Click Go. Click Refresh to see the current status of the task. Scheduling Automatic Database Backups T.his section provides instructions for backing up the Prime Infrastructuredatabase. You can schedule regular backups through the user interface. Most machine-specifie settings are not included in the database backup. If you restore the backup to a different device, you will need to manually re-create these settings. Machine-specific settings include FTP enable and disable, the FTP port, the FTP root directory, TFTP enable and disable, the TFTP port, the TFTP root directory, HTTP forward enable and disable, the HTTP port, the HTTPS port, the report repository directory, and all high availability settings. To schedule automatic backups of the Prime Infrastructure database, follow these steps: Choose Administration > Task Manager > Background Tasks. Under Other Background Tasks, click NCS Server Backup. Complete the fields as follows: a. Make sure Enabled is checked b. Enter the maximum number of backups to keep (the default is 2). c. Specify an existing backup repository (local or remote) or click Create to create a new repository. d. Enter the number of days between each backup. For example, 1 = a daily backup, 2 = a backup every other day, 7 = a weekly backup, and so on. The default is 7, the minimum is 1, the maximum is 360. e. Enter the time when you want the backup to start. Use this format: hh:mm AM/PM (for example: 03:00 AM). Note Note Backing up a large database affects the performance of the server. You should schedule backups to run when the server is less active (for example, in the middle of the night). Click Save. The backup file will be saved as a.zip file in the ftp-install-dir/ftp-server/root/ncsbackup directory, with a filename in this format: dd-mmm-yy_ hh-mm-ss.zip (for example, 10-Dec-12_ zip). Restoring the Database From Backups SME: New section. Customer needs to know how to do this, otherwise pulling backups is meaningless. Last time I spoke to anyone about it, they said it could be done both in the GUI and at the command line. I have no info on how to do either. 16-7
8 Maintaining the Database Chapter
Performing Administrative Tasks
CHAPTER 15 The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and
More informationData Collection and Background Tasks
This section contains the following topics: Control Data Collection Jobs, on page 1 How Data Retention Settings Affect Web GUI Data, on page 1 About Historical Data Retention, on page 2 Performance and
More informationAdministrative Tasks CHAPTER
15 CHAPTER This chapter describes administrative tasks to perform with WCS. These tasks include the following: Running Background Tasks, page 15-2 (such as database cleanup, location server synchronization,
More informationAdministrative Tasks. Running Background Tasks CHAPTER
CHAPTER 18 This chapter describes administrative tasks to perform with WCS. These tasks include the following: Running Background Tasks, page 18-1 (such as database cleanup, mobility service synchronization,
More informationRunning Reports. Choosing a Report CHAPTER
13 CHAPTER WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report
More informationC H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL
CHAPTER 14 The Cisco NCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis.
More informationRunning Reports CHAPTER
CHAPTER 14 WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report
More informationMonitoring System Health
Monitoring System Health Cisco Prime Infrastructure 3.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
More informationOverview. About the Cisco Context-Aware Mobility Solution CHAPTER
1 CHAPTER This chapter describes the role of the Cisco 3300 series mobility services engine (MSE), a component of the Cisco Context-Aware Mobility (CAM) solution, within the overall Cisco Unified Wireless
More informationConfigure NFS Staging for ACS 5.x Backup on Windows and Linux
Configure NFS Staging for ACS 5.x Backup on Windows and Linux Document ID: 119030 Contributed by Piotr Borowiec and Aditya Ganjoo, Cisco TAC Engineers. Jul 21, 2015 Contents Introduction Prerequisites
More informationPrime Performance Manager Overview
1 CHAPTER The following topics provide an overview to Cisco Prime Performance Manager user operations: Prime Performance Manager Features and Functions, page 1-1 Prime Performance Manager Reports, page
More informationAuditConfigurationArchiveandSoftwareManagementChanges (Network Audit)
This section contains the following topics: Audit Configuration Archive and Software Management Changes (Network Audit), on page 1 Audit Changes Made By Users (Change Audit), on page 1 Audit Actions Executed
More informationMonitoring Location Servers and Site
8 CHAPTER This chapter describes how to monitor location servers by configuring and viewing alarms, events, and logs. It also describes how to use Cisco WCS to view location server, client and asset tag
More informationManaging the Growth of the ehealth Database
Focus on Setup Managing the Growth of the ehealth Database The ehealth Suite of management tools collects a wide variety of information about your critical business resources. ehealth includes a database
More informationBackup and Restore Operations
Backup Data Type, page 1 Backup and Restore Repositories, page 2 On-Demand and Scheduled Backups, page 3 Cisco ISE Restore Operation, page 8 Export Authentication and Authorization Policy Configuration,
More informationPerformance Monitor Administrative Options
CHAPTER 12 Effective network management requires the fastest possible identification and resolution of events that occur on mission-critical systems. Performance Monitor administrative options enable you
More informationGetting Started CHAPTER
CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-2 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Configuring WCS
More informationMonitoring Location Servers and Site
8 CHAPTER This chapter describes how to monitor location servers by configuring and viewing alarms, events, and logs. It also describes how to use Cisco WCS to view location server, client and asset tag
More informationKaseya 2. User Guide. Version 1.0
Kaseya 2 Online Backup User Guide Version 1.0 August 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationGetting Started. Prerequisites CHAPTER
CHAPTER 2 This chapter describes how to prepare Cisco WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-6 Installing
More informationBackup and Restore Operations
Backup Data Type Backup Data Type, on page 1 Backup and Restore Repositories, on page 1 On-Demand and Scheduled Backups, on page 3 Cisco ISE Restore Operation, on page 8 Export Authentication and Authorization
More informationGetting Started. Prerequisites CHAPTER
CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Installing WCS
More informationGentran Integration Suite. Archiving and Purging. Version 4.3
Gentran Integration Suite Archiving and Purging Version 4.3 Copyright 2007 Sterling Commerce, Inc. All rights reserved. Additional copyright information is located on the Gentran Integration Suite Documentation
More informationMaintenance Tasks CHAPTER
CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,
More informationManaging, Monitoring, and Reporting Functions
This chapter discusses various types of managing, monitoring, and reporting functions that can be used with Unified CVP. It covers the following areas: Unified CVP Operations Console Server Management,
More informationThis section contains context-sensitive Online Help content for the Web Client > Dashboard tab.
This section contains context-sensitive Online Help content for the Web Client > tab. Summary, page 1 Network, page 6 Storage, page 9 Compute, page 15 Summary The intent of the Summary dashboard is to
More informationUser Permissions and Device Access
User Interfaces, User Types, and How To Transition Between Them, on page 1 Enable and Disable root Access for the Linux CLI and the Prime Infrastructure Web GUI, on page 6 Control the Tasks Users Can Perform
More informationGetting Started. Prerequisites CHAPTER
CHAPTER 2 This chapter describes how to prepare WCS for operation. It contains these sections: Prerequisites, page 2-1 System Requirements, page 2-2 Installing WCS for Windows, page 2-4 Installing WCS
More informationMaintenance Tasks CHAPTER
CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-4 Configuring Date and Time Properties,
More informationAdministrator Guide. Flexible Storage
Administrator Guide Flexible Storage Contents Introduction and Overview Define a plan Create/Change a user Other functionalities Introduction and Overview What is Flexible Storage? Sign in to the administrator
More informationvcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7
vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationMonitoring the System and Services
This chapter describes how to monitor the Cisco Mobility Services Engine by configuring and viewing alarms, events, and logs and how to generate reports on system use and element counts (tags, clients,
More informationUser Guide. Version R95. English
Data Backup User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
More informationLogging Mechanism. Cisco Logging Mechanism
Cisco, page 1 Cisco ISE System Logs, page 2 Configure Remote Syslog Collection Locations, page 7 Cisco ISE Message Codes, page 8 Cisco ISE Message Catalogs, page 8 Debug Logs, page 8 Endpoint Debug Log
More informationAppResponse Xpert RPM Integration Version 2 Getting Started Guide
AppResponse Xpert RPM Integration Version 2 Getting Started Guide RPM Integration provides additional functionality to the Riverbed OPNET AppResponse Xpert real-time application performance monitoring
More informationRecorder Database Management Guide
Recorder Database Management Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845) 732-7900 Fax:
More informationCisco Prime Collaboration Deployment Configuration and Administration
Cisco Prime Collaboration Deployment Configuration and Administration Services, page 1 Limitations and Restrictions, page 5 Services After the installation of the Cisco Prime Collaboration Deployment platform,
More informationConfiguring Data Collection Manager
This module describes the configuring of the Data Collection Manager feature. Table 1: Feature History for Release Release 5.2.2 Modification This feature was introduced Data Collection Manager, on page
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationInstalling Cisco CMX in a VMware Virtual Machine
Installing Cisco CMX in a VMware Virtual Machine This chapter describes how to install and deploy a Cisco Mobility Services Engine (CMX) virtual appliance. Cisco CMX is a prebuilt software solution that
More informationConfigure Wireless Technologies
Track Tagged Assets Using Optimized Monitor Mode on APs, page 2 Creating a Wireless Chokepoint, page 2 Removing a Wireless Chokepoint from the Network, page 3 Configure Autonomous APs, page 3 Configure
More informationStorageCraft OneXafe and Veeam 9.5
TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated
More informationCCIE Wireless v3 Lab Video Series 1 Table of Contents
CCIE Wireless v3 Lab Video Series 1 Table of Contents Section 1: Network Infrastructure Layer 2 Technologies VLANs VTP Layer 2 Interfaces DTP Spanning Tree- Root Election Spanning Tree- Path Control Spanning
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationWorking with Trace and Log Central
CHAPTER 11 The trace and log central feature in the Cisco Unified Real-Time Monitoring Tool (RTMT) allows you to configure on-demand trace collection for a specific date range or an absolute time. You
More informationUsing the Backup module
Using the Backup module THIS WIKI HAS BEEN UPDATED FOR VERSION 13 OF YOUR PBX GUI. Overview Logging In Menu Items Backups Restores Servers Templates Backup Settings Backup Name Description Status Email
More informationHP Dynamic Deduplication achieving a 50:1 ratio
HP Dynamic Deduplication achieving a 50:1 ratio Table of contents Introduction... 2 Data deduplication the hottest topic in data protection... 2 The benefits of data deduplication... 2 How does data deduplication
More informationHurricane SQL Audit APPLICATION NOTE
Hurricane SQL Audit APPLICATION NOTE May 2015 Cutting edge simplicity Introduction The Hurricane SQL Audit service provides an alternate archive of Hurricane historical events using Microsoft SQL server.
More informationNavigating Cisco Prime Internetwork Performance Monitor Tasks in LMS 4.1
CHAPTER 7 Navigating Cisco Prime Internetwork Performance Monitor Tasks in LMS 4.1 Cisco Prime Monitor (IPM) is a network troubleshooting application that gauges network response time and availability.
More informationEmbedded Event Manager (EEM)
CHAPTER 12 This chapter consists of the following: What is EEM? Components of Cisco IOS EEM Types of Actions What is EEM? EEM (Embedded Event Manager) is an IOS technology that runs on the control plane
More informationPerform Backup and Restore
, page 1 You can schedule periodic backups using the Cisco Prime Collaboration Assurance user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However,
More informationASN Configuration Best Practices
ASN Configuration Best Practices Managed machine Generally used CPUs and RAM amounts are enough for the managed machine: CPU still allows us to read and write data faster than real IO subsystem allows.
More informationPerform Backup and Restore
, page 1 You can schedule periodic backups using the Cisco Prime Collaboration user interface, or run backup commands manually by logging in to the system as an admin user (CLI user). However, you must
More informationIndependent Electricity System Operator Rapid Migration of Big Data - Oracle DB using IBM Enterprise Storage Tools
Independent Electricity System Operator Rapid Migration of Big Data - Oracle DB using IBM Enterprise Storage Tools Presented by: Sajid Rizvi, Oracle Database Consultant / IT Architect IBM GBS Customer
More informationHistorical Collection Best Practices. Version 2.0
Historical Collection Best Practices Version 2.0 Ben Stern, Best Practices and Client Success Architect for Virtualization and Cloud bstern@us.ibm.com Copyright International Business Machines Corporation
More informationHierarchical HiveManager Configuration Guide
Hierarchical HiveManager Configuration Guide This guide explains how to enable and use HHM (Hierarchical HiveManager) in HiveManager NG. You will learn how to create and manage organizations, view data
More informationArchiware Pure User Manual
Archiware Pure User Manual Content 1 Preface... 3 1.1 About This Manual... 3 1.2 Who Should Read This Document?...3 1.3 Software Description... 3 1.4 Software Licensing... 3 1.5 Registration... 3 1.6 Technical
More informationGetting Started. NCS Delivery Modes CHAPTER
CHAPTER 2 This chapter describes information on system requirements, setting up and starting the NCS. The NCS is an application used to configure, manage, and monitor the wired and wireless networks. This
More informationAdministrative Procedures Manual. Office of Information Technology Services Cape Fear Community College October 23, 2015
Administrative Procedures Manual Office of Information Technology Services Cape Fear Community College October 23, 2015 1 Introduction Cape Fear Community College has adopted the IT Standards published
More informationWorking with Reports. User Roles Required to Manage Reports CHAPTER
CHAPTER 10 Cisco Prime Network (Prime Network) provides a Report Manager that enables you to schedule, generate, view, and export reports of the information managed by Prime Network. You can save the generated
More informationManaging Software. Upgrading the Controller Software. Considerations for Upgrading Controller Software
Upgrading the Controller Software, on page 1 Considerations for Upgrading Controller Software, on page 1 Upgrading Controller Software (GUI), on page 2 Upgrading Controller Software (CLI), on page 5 Predownloading
More informationArchiving and Purging Data
CHAPTER 10 These topics provide basic information about data purging and archiving and system stability: Prime Network Database Schemas, page 10-1, describes the schemas supported by the Prime Network
More informationPerform Backup and Restore
This section explains the following:, page 1 You can schedule periodic backups using the Cisco Prime Collaboration Assurance user interface. Cisco Prime Collaboration Analytics data is backed up on a remote
More informationInventory Reports. Detailed Device Report CHAPTER
CHAPTER 2 include the following device reports. Detailed Device Report Device Attributes Reports Generating a 24-Hour Inventory Change Report Hardware Reports Management Status Reports Software Reports
More informationInstalling or Upgrading ANM Virtual Appliance
CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes
More informationNexentaStor VVOL
NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document
More informationINFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE
INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic
More informationCool things in Navigator for IBM i to be a Rock Star Administrator
Cool things in Navigator for IBM i to be a Rock Star Administrator itech Solutions because IBM i (AS/400s) don t come with System Administrators Pete Massiello itech Solutions pmassiello@itechsol.com 203-744-7854
More informationProperly Sizing Processing and Memory for your AWMS Server
Overview This document provides guidelines for purchasing new hardware which will host the AirWave Wireless Management System. Your hardware should incorporate margin for WLAN expansion as well as future
More informationvrealize Operations Management Pack for NSX for vsphere 2.0
vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationVeeam and HP: Meet your backup data protection goals
Sponsored by Veeam and HP: Meet your backup data protection goals Eric Machabert Сonsultant and virtualization expert Introduction With virtualization systems becoming mainstream in recent years, backups
More informationOverview. ACE Appliance Device Manager Overview CHAPTER
1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager
More informationDatabase Administration
Unified CCE, on page 1 Historical Data, on page 2 Database Statistics, on page 3 Tool, on page 3 Database Sizing Estimator Tool, on page 11 Administration & Data Server with Historical Data Server Setup,
More informationITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!
ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 350-050 Title : CCIE Wireless Exam (V2.0) Vendor : Cisco Version : DEMO Get Latest & Valid 350-050 Exam's Question
More informationInstalling K2 BACKUPONLINE Online Backup 1. Choosing Components
Installing K2 BACKUPONLINE Online Backup 1. Choosing Components K2 BACKUPONLINE is a suite of applications that offer many options for backup and recovery. K2 BACKUPONLINE offers two choices for the foundation
More informationNavigating Cisco EPN Manager
Navigating Cisco EPN Manager Cisco EPN Manager 1.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
More informationEMC VNXe Series. Configuring Hosts to Access NFS File Systems. Version 3.1 P/N REV. 03
EMC VNXe Series Version 3.1 Configuring Hosts to Access NFS File Systems P/N 302-000-190 REV. 03 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
More informationMission Control 5.0. Mission Control Admin Guide. January, 2016
Mission Control 5.0 Mission Control Admin Guide January, 2016 Mission Control Admin Guide You can find the most up-to-date technical documentation at: docs.delphix.com The Delphix Web site also provides
More informationvrealize Operations Management Pack for NSX for vsphere 3.0
vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationAP-51XX v r Release Notes Part Number 72E
AP-51XX v2.3.0.0-019r Release Notes Part Number 72E-126383-01 Introduction New Features AP-51XX Hardware/ Software Compatibility Matrix AP-51XX Default Configurations Firmware Update Resetting the AP-51XX
More informationServices. Service descriptions. Cisco HCS services
Service descriptions, page 1 Infrastructure Platform Automation Description, page 5 Infrastructure Manager Sync Introduction, page 5 Service descriptions After the installation of the Cisco HCM-F platform,
More informationMarkLogic Server. Monitoring MarkLogic Guide. MarkLogic 9 May, Copyright 2017 MarkLogic Corporation. All rights reserved.
Monitoring MarkLogic Guide 1 MarkLogic 9 May, 2017 Last Revised: 9.0-2, July, 2017 Copyright 2017 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Monitoring MarkLogic Guide
More informationVirtual Private Servers
Virtual Private Servers Introduction - What is a Virtual Private Server?? A Virtual Private Server (VPS) is just like having your own enterprise-grade server, located in a major datacentre and available
More informationIBM Archiving Solution DB2 CommonStore for Lotus Domino
IBM Software Group IBM Email Archiving Solution DB2 CommonStore for Lotus Domino Anthony Tang Advisory Sales Specialist Information Management Software Group Challenges for Notes Administrators Increasing
More informationBest Practices: Server Security Hardening
The following sections explain how to enhance server security by eliminating or controlling individual points of security exposure. Disable Insecure Services, on page 1 Disable Root Access, on page 1 Use
More informationPerfmon Collection Setup Instructions for Windows Server 2008R2+
Perfmon Collection Setup Instructions for Windows Server 2008R2+ Performance statistics are critically vital for the long-term health and capacity management of an enterprise environment. Unless a third-party
More informationBU-3028-IVS Vehicle Counting Guide. Version 1.0
BU-3028-IVS Vehicle Counting Guide Version 1.0 BU-3028-IVS Vehicle Counting Guide 1. Overview The BU-3028-IVS has built-in video analytic function for object counting. It is a standalone function built
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationStorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide
TECHNICAL DEPLOYMENT GUIDE StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneBlox, compliments Veeam to create a differentiated diskbased
More informationVeritas Exam VCS-273 Administration of Veritas NetBackup and NetBackup Appliances Version: 7.0 [ Total Questions: 123 ]
s@lm@n Veritas Exam VCS-273 Administration of Veritas NetBackup 7.6.1 and NetBackup Appliances 2.6.1 Version: 7.0 [ Total Questions: 123 ] Veritas VCS-273 : Practice Test Topic break down Topic Topic 1:
More informationChange and Configuration Management Administration
CHAPTER 7 Change and Configuration Management Administration These topics provide administrative information on Change and Configuration Management: Configuring Global Settings for Configuration Management,
More information0. Introduction On-demand. Manual Backups Full Backup Custom Backup Store Your Data Only Exclude Folders.
Backup & Restore 0. Introduction..2 1. On-demand. Manual Backups..3 1.1 Full Backup...3 1.2 Custom Backup 5 1.2.1 Store Your Data Only...5 1.2.2 Exclude Folders.6 1.3 Restore Your Backup..7 2. On Schedule.
More informationCisco Prime Infrastructure 3.4 Administrator Guide
First Published: 2017-12-18 Last Modified: 2018-04-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
More informationCA User Activity Reporting Module
CA User Activity Reporting Module Implementation Guide Release 12.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to s only and
More informationServer Status Dashboard
The Cisco Prime Network Registrar server status dashboard in the web user interface (web UI) presents a graphical view of the system status, using graphs, charts, and tables, to help in tracking and diagnosis.
More informationUser Activities. These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc.
Executive Over view User Activities These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc. Session Log Summary This report helps you
More informationOpen Windows Perfmon and expand the Data Collector Sets, User Defined tree item.
Perfmon Collection Setup Instructions for Windows Server 2008R2+ Performance statistics are critically vital for the long-term health and capacity management of an enterprise environment. Unless a third-party
More informationCloudamize Agents FAQ
Cloudamize Agents FAQ Cloudamize is a cloud infrastructure analytics platform that provides data analysis and recommendations to speed and simplify cloud migration and management. Our platform helps you
More informationProduct Guide. McAfee Performance Optimizer 2.2.0
Product Guide McAfee Performance Optimizer 2.2.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee
More informationUser and System Administration
CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical
More information