Centerity Monitor 4.0. Administration Guide

Size: px
Start display at page:

Download "Centerity Monitor 4.0. Administration Guide"

Transcription

1 Centerity Monitor 4.0 Administration Guide May 2017

2 About This Guide 2 Contents About This Guide... 8 End-User License Agreement (EULA)... 8 Before You Begin... 8 Audience... 8 Centerity Monitor User Guide... 8 Technical Support... 9 Chapter 1: Overview Centerity Monitor Enterprise edition - Introduction Centerity Monitor main features Start Using Centerity Monitor Chapter 2: Node Administration Overview Node Configuration Add Node to Enterprise Managing Nodes Chapter 3: Hosts & Metrics Administration Overview Adding New Hosts Host Setting General Host settings Monitoring Hosts with Dynamic IP Address Advanced Properties Associated Metrics Auto Add Services Host Dependencies Asset Management & Host Inventory Host Details Extended host information Proxy Server Discovery Engines

3 About This Guide 3 Duplicate a Host Adding ahost Profile to An Existing Host Adding a Metric to an Existing Host Chapter 4: Policy Manager Overview Exporting Policy via Policy Manager Chapter 5: Business Service Management (BSM) Overview Configuration Chapter 6: Metrics Overview Creating A New metric Profile General Settings Command Properties Notification Settings Status Settings Misc. Settings Metric Extended information Metric Details Edit a Metric Profile Displaying a List of Hosts with a specific metric Metric Search Options Edit a Host-Associated Metric Applying a Metric Profile to Multiple Hosts or Hosts Groups Chapter 7: Contacts and Contact Groups Creating a New Contact Host Notifications Metric Notifications User Settings Contact Permissions Creating a New Contact Group

4 About This Guide 4 Adding a Contact Group to a Host Group Add a Contact Group to a Business Service Add a Contact Group to a Metric Member Chapter 8: Plug-ins, Templates and Metric Profiles Overview Adding a New Plug-in Plug-in Information Screen Command Templates Creating Host /metric Check Commands Working With Commands Creating Notification Templates Assigning a Check Command to a Metric Profile Chapter 9: Maps Overview Visual Layouts - Hypermap Visual Layouts - Topology Map Visual Real-Time Layouts Advanced Designer Settings Visual Live Layouts Module Views & Slide Shows Chapter 10: Host & Metrics Dependencies Host Dependencies Metric Dependencies Chapter 11: Escalation Host Escalations Metric Escalations Chapter 12: Settings Overview General Tab Web Settings Tab Status Settings Tab Logging Tab

5 About This Guide 5 Other Settings tab Resource Settings Tab Central Tab Authentication Settings Tab System Settings Tab Categories Import / Export Media Manager Chapter 13: System Overview Monitor Servers Logs Audit Log Task Scheduler Chapter 14: Graphs Configurations Overview Graph builder methodology Disable Generic Graph Creation Assigning Graph To Metric Chapter 15: Reports and Report Scheduler Reports option Creating a New Report Template Creating a New Scheduled Report Editing Report Template Remove Report Template Managing Report Templates Edit Scheduled Reports Manage Scheduled Reports Setting Report Scheduler Mail Server Chapter 16: Backup and Recovery Backup

6 About This Guide 6 Restore

7

8 About This Guide 8 About This Guide This Centerity Monitor Administration Guide describes how to configure and administer the Centerity Monitor system. END-USER LICENSE AGREEMENT (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of Centerity s EULA can be found here. BEFORE YOU BEGIN This guide assumes that you have installed the Centerity Monitor software and logged into the web administration as described in the Centerity Monitor Installation guide. For installation guide, please click here. AUDIENCE This Admin-Guide is intended for network and system administrators who responsible for the implementation and operation of the Centerity system in the organization. The system administration should be the system administrator familiar with basic IT-system (Linux, Windows etc.) and networking configuration. CENTERITY MONITOR USER GUIDE An additional guide which describes the Monitor console options for Centerity Monitor software. For download click here User Guide. 8

9 Technical Support 9 Technical Support For technical support, contact Centerity at: support@centerity.com Phone (EMEA): Phone (U.S.): (EXT: 1005). Or contact your local Centerity partner. Check the website ( for additional information and most updated technical information. Under the support section you can find useful content including documents, solution packs, certified plug-ins and more. With any support contact please provide the following information: License version. Server s configuration and operating system, including any OS patches that have been applied. Detailed description of the requires support assistance. Relevant attachments such as error messages, memory dumps, compiler listings, and error logs. 9

10 Chapter 1: Overview 10 Chapter 1: Overview CENTERITY MONITOR ENTERPRISE EDITION - INTRODUCTION Centerity Monitor is an enterprise class all-in-one IT and Business service management (BSM) monitoring platform. Centerity provides in depth monitoring capabilities for a wide range of technologies including Servers, Networks, DB, Applications, passive-equipment, Clouds, SAAS and much more while simplifying all aspects of network and IT management as well as information flow, and enhance business performance. 10

11 Chapter 1: Overview 11 CENTERITY MONITOR MAIN FEATURES Fast and easy deployment across large heterogenic networks. Multi-Tenant - Centerity enable multi-tenant management. Ideal for MSP's and organizations with multiple entities and several stand-alone networks. All-In-One Unified and Comprehensive monitoring platform - a single Glass Pane for all essential network information. Widest range of "out of the box" monitoring solution packs. Advanced Business Services Management (BSM) - In addition to the infrastructure monitoring features, Centerity Monitor provides the most advanced tools to measure and analyze business services SLA and user experience, monitoring. Most Advanced Features and Module all included! o o o o o o o Assets management Real-Time Layouts (unique feature for Centerity!) Real-time Hyper-Maps VMware Topology maps User-Experience monitoring Ticketing management including escalations Repots Center Flexibility - In addition of hundreds of predefined best-practice monitoring templates and solution packs for most Data-Center technologies, Centerity Monitor provides an easy way to customize proprietary monitoring plug-ins within very short time and vendor independency. 11

12 Chapter 1: Overview 12 START USING CENTERITY MONITOR LOG-IN TO CENTERITY MONITOR Open Web- Browser Insert server IP address Type user-name & Password use Monitor / Admin tabs AUTHENTICATION AND PERMISSIONS Centerity Monitor installation includes 2 default users: Administration Web Login Web administrator: admin Web administrator Password: admin Standard User Web Login Standard login user: user Standard login password: user Note: Do not delete these users before you set a new users and assign them to the monitored hosts and metrics. 12

13 Chapter 2: Node Administration 13 Chapter 2: Node Administration OVERVIEW Centerity Monitor provides two methods to manage nodes: Push configuration (recommended) and Pull configuration. In this chapter, there will be examples of both configurations, and a guide to adding a new monitoring node. NODE CONFIGURATION Go to Admin Settings General Distributed. 1. Server Name: The display name for the node. 2. Enable distributed mode: Enable / Disable distribution. 3. Centerity Monitor Central servers: Enterprise server IP-address. 4. User Name: A user name to connect with on the enterprise. 5. Password: A password to connect with on the enterprise. 6. Shared Secret: A passphrase secret to connect with on the enterprise. 7. Centerity Server Distributed Type: Pull is the default option. 8. Monitor Server Instance: Specify Centerity instance number (Required only when instance configuration is used). 13

14 Chapter 2: Node Administration 14 ADD NODE TO ENTERPRISE Go to Admin Management Monitors For a new node, click on the "+" icon. 14

15 Chapter 2: Node Administration Distributed Server Name: The node name. 2. Description: The node description. 3. IP Address: The node IP-address. 4. Enable Distributed Server: Enable/Disable the node. 5. Enable as Failover Server: Failover server option can be used with an empty node. The node will be always passive, unless another node fails which will activate it with the failed node's checks. 6. Monitor Server Configuration: Allows managing configuration on the node level or manage configuration from the enterprise. This can only be set on creating new node. 7. Configuration Sync Mode Standard configuration using HTTP/HTTPS mode or using SSH sync configuration, which requires keys exchange between nodes. 8. Monitor Sync Mode: Activate Centerity Monitor Push / Pull distributed mode environment. 9. Timeout: Define node distribution timeout. 10. SSL Mode: Install Policy via SSL (HTTPS, 443) instead of HTTP (80). 11. Encryption: Enable password encryption via SHA protocol. 12. Remote Username: Remote node username. 13. Remote Password: Remote node password. 14. Install Policy Secret: Remote node secret passphrase. 15. Remote Server Management Realm: Allow setting up a new realm if apache configuration is changed. 16. Monitor Server Instance: An advance feature allowing multiple nodes, to be used only upon agreement with Centerity Systems. 17. Limit Node Host and Metric Count: Limit the number of hosts and metrics allowed on the selected distributed node. 18. Comments: Additional comments. Use "Check Connection" and "Verify Configuration" to test successful connection to the remote node. 15

16 Chapter 2: Node Administration 16 MANAGING NODES After the initial node configuration, each node has a management section with the following tabs: General Tab: The general tab for the node includes the node information, licensing, amount of metrics etc. Settings Tab: The settings tab for the node includes all settings listed in the initial node configuration. Advanced Tab: 1. Limit Node Host and Metric Count: Limit the number of hosts and metrics allowed on the selected distributed node. 2. Node s License: Update node licensing. 3. Update Acknowledgement and Downtime: Re-deploy all downtime and acknowledgement tickets to nodes. 4. Comments: Additional comments for node. 16

17 Chapter 2: Node Administration 17 Members Tab: Update host members per node and contact group members. 17

18 Chapter 2: Node Administration 18 Status: Log: Node logging. 18

19 Chapter 3: Hosts & Metrics Administration 19 Chapter 3: Hosts & Metrics Administration OVERVIEW Centerity Monitor provides multiple methods to add new hosts and metrics from the web interface Admin menu. Advanced users can use the command line; however, it is recommended to use the admin- UI only. This chapter will describe the web administration options and how to add or modify settings of hosts, host groups, and metrics. To define new monitoring, a certain hierarchy needs to be implemented. The diagram below explains the Host group Host Metrics internal topology from the monitor server point of view. Monitor Topology Host Group HostA HostB HostC HostD Service Service Service Service Service Service * Metrics must be associates to a Host and host must be associates to Host group. Host group - A host group contains one or more hosts in one group. Host - Monitored element in the network. A host can be physical or virtual server, workstation, router, etc. metrics - A metric definition is used to identify monitored metric / KPI associated to a host. Each host can have multiple associated metrics. For virtual devices such as clusters, databases etc. it is required to define a virtual host and assign the desired metrics to it. 19

20 Chapter 3: Hosts & Metrics Administration 20 ADDING NEW HOSTS 1. Go to Admin Management Hosts 2. Select the Wizard option from the top right corner of the page 3. Fill out the wizard form (detailed instructions provided below) 4. Save the new host. 5. Test the host and metrics. Admin menu Host Wizard Save After every new configuration in the admin section, it is mandatory to run the install policy process in order to activate the new configuration in the monitoring server. Please refer to Chapter8 Policy Manager which explains the steps of policy installation. 20

21 Chapter 3: Hosts & Metrics Administration Hostname: this is used to define a short name used to identify the host. It is used in Host Group and metric definitions to reference this host. Hosts can have multiple metrics (which are monitored) associated with them. 2. Description - this is used to define a longer name or description used to identify the host. It is provided to allow you to more easily identify a host. 3. IP Address: IP Address of the host. It is advised not to use DNS names. In case of DNS problems, you will not be able to do proper monitoring. Click on the globe icon to DNS resolve the host. Be sure to re-enter the IP address before saving. 4. Host Category: this sets how the devices are displayed in the business service and which information is available to the Inventory Collector. 5. Distributed Monitor Server: The node to which the host belongs to. 6. Host Group: This is used to define which host group the host belongs to. For example, if you have a cluster of web servers you will able to report on and see availability of this group. 7. Sub-Group: This is used to define which sub group the host belongs to. 8. Parents: this is used to define a list of short names of the "parent" hosts for this host. Parent hosts are typically routers, switches, firewalls, etc. that lie between the monitoring host and remote hosts. A router, switch, etc. which is closest to the remote host is considered to be that host's "parent". 9. Host Profile: Determine which metrics will be applied from the predefined templates available in the Host Profile menu. 21

22 Chapter 3: Hosts & Metrics Administration 22 HOST SETTING The system allows a variety of advanced settings such as event handlers, flap detection, control notifications etc. Note: After adding a new a host using the wizard interface you are still able to edit and set advanced features from the screen below There are 7 tabs for advanced settings and configurations: 1. General: Basic host settings. 2. Advanced: Read the information below for details regarding available options for the host. 3. Metrics: View and set metrics to the host. 4. Dependencies: View and set host dependencies. 5. Inventory: Setting of Hardware, Software and administrative information. (Information is collected automatically with the inventory discovery tool). 6. Details: Manual host inventory such as: host ID, hardware type, author, and phones. 7. Extended: Define host image and comments. 22

23 Chapter 3: Hosts & Metrics Administration 23 GENERAL HOST SETTINGS General host settings are used to define the host properties in the system: Host name Description IP Address Enable / Disable Host Template Host Category Host Group Parrent SAVE Install Policy 23

24 Chapter 3: Hosts & Metrics Administration Host name: Host name must be exclusive to the host. 2. Description: Detailed description of the host to allow clear identification of any host. 3. IP Address: Define the IP address of the host. FQDN can be used as well to identify the host instead of an IP address (require available DNS services!) 4. Enable/Disable Host: Enable/Disable the host. 5. Host Template: Pre-defined set of metrics to be associate with the host (i.e. check command, event handler etc. 6. Category: Define how the devices should be displayed in the business service and which information is available to the Inventory Collector. 7. Distributed Monitor Server: The node relevant for this host. 8. Host Group: Defines the host group of the host. 9. Parents / Child: Define the parent-child relationship between two hosts. Every host can be a parent or child of another host. (Host can be a parent only if the enabled as parent is checked) Note: Parent-child definition is mandatory to generate automatic topology map and root-cause analysis (outages dashboard) 10. Save as Host Profile - Before saving this template you can create a Host Profile from the specified settings and then associate the template with new or existing hosts. At the bottom left of the Host settings page across from the Save button, you will see Save as Host Profile. Mark the checkbox and click Save. This will create a new Template with the name of the Host. 11. Delete Deletes the host. MONITORING HOSTS WITH DYNAMIC IP ADDRESS The following instructions explain how to monitor a host with a dynamic IP address (DHCP). Set DNS server Add new host Verify & install policy Step 1 Setting DNS server To monitor hosts with dynamic IP, the system uses hostname from the DNS server rather than fixed IP address. Connect to the Centerity server via SSH using your favorite SSH client like putty Edit the /etc/resolve.conf file so it will include your domain search suffix and your DNS servers, for example: 24

25 Chapter 3: Hosts & Metrics Administration 25 Step 2 - Define the new host in the web GUI Log-in to the Centerity monitor console. Define the host to monitor in the system. Insert host name in the IP address (see example below) Step 3 - Run the policy manger ADVANCED PROPERTIES Host Commands Properties To activate the check command option, check the box in the advanced tab as shown in the example below. 1. Host Check Command: This feature allows to check host availability over single check rather than one of the multiple metrics associated to the host. Enabling this option will perform single alert in case of host down status. 25

26 Chapter 3: Hosts & Metrics Administration Test Command - This command will process a ping check to the host to verify connectivity (up / down). The command must return a status of OK (0) other ways, Centerity Monitor will assume that the host is down. If the argument stays blank, the host will not be checked and Centerity Monitor will constantly assume the host is up. 3. Max checks attempts - The number of samples (checks) before changing from OK state. Setting this value to 1 will cause Centerity Monitor to generate an alert without retrying the host to be checked again. Notifications Settings Note: The minimum value for this option is "1". 1. Notifications Enable / Disable - This is used to determine whether notifications for this host are enabled. 2. Notification period - Specify the Time frame which notifications for this host will be sent to authorized contacts. 3. Notification interval - Specify the time intervals before re-notifying authorized contacts about the last status. Setting this value to 0 will disable the re-notification. 4. Notifications options Specify the statuses to be notified - Unreachable, Down, and Recovered 26

27 Chapter 3: Hosts & Metrics Administration 27 Other Settings 1. Event Handler: Enable / disable event handler command. 2. Event Handler: Specify the Event Handler command that should be execute whenever a change in the state of the host is detected. 3. Flap Detection: Determines whether flap detection is enabled for this host. 4. Flap Threshold: Specifies the low state and high change threshold used in flap detection for this host. 5. Retain status information: Determines whether status-related information about the host is retained across program restarts 6. Retain non-status information: Determines whether non-status information about the host is retained across program restarts. 7. Performance Data: Determines whether the processing of performance data is enabled for this host. Note: Disabling performance data will disable graphs creation and history archive. 8. Stalking: Determines whether the stalking for this host is enabled. 9. Stalking options: Determines which host states "stalking" is enabled for. 27

28 Chapter 3: Hosts & Metrics Administration 28 ASSOCIATED METRICS Associated Metrics provides a quick way to attach a new service or multiple metrics to an existing host. Adding a new metric Select Metric Profile select metric /metric press "Add" Run Install Policy 1. In the Metric tab select the required metric profile. 2. Select the metric or multiple metrics. 3. Press the add button. 4. Run install policy. Deleting a metric Select the metric checkbox and click "delete". 28

29 Chapter 3: Hosts & Metrics Administration 29 Resetting a Metric Reset history graph and data allows you to remove the metric history. This can be useful when there are errors with the graphs. Select the metric checkbox and click "Reset". Metric Properties 1. Name: The selected metric name. 2. Description: Metric description. 3. Metric Category: Define the category of this metric. 4. Enable / Disable Metric: Enable status will export this metric with the host configuration; Disable status will not export the metric current configuration with the host definitions. You can click on the Enabled / Disabled text to switch between states. 5. Metric Template: The original metric template from which commands tab arguments are taken. 6. Contact Group: The contact groups assigned to the metric. 29

30 Chapter 3: Hosts & Metrics Administration 30 AUTO ADD SERVICES Centerity V4.X allows advanced discovery and automatic attachment of optional services such as hardware metrics, services, system KPIs and processes to the monitored host. Admin Menu - Host Metrics Tab Press "+" icon Select KPIs / Servies Press "Add" & Save Install Policy Press the + icon to open the list of optional metrics and check the box of the required services. Click the "Add" button to complete the attachment process. The following pop-up screen will be opened: 30

31 Chapter 3: Hosts & Metrics Administration 31 All automatic services include best-practice thresholds. To modify the thresholds, use the service properties. HOST DEPENDENCIES Please refer to chapter 10. ASSET MANAGEMENT & HOST INVENTORY OVERVIEW The asset management module provides complete view of the host inventory including system information, hardware configuration, services, processes etc. This functionality is optional and does not impact the monitoring process for this host. 31

32 Chapter 3: Hosts & Metrics Administration General Information: General information about the Host / Device such as Operating System, Service Packs, Patches, Owner, Organization, Configuration and more. An image can be selected for this host that will be displayed when viewing the host inventory in the Monitor Console. (See Importing Images and Sounds). 2. System Information: Display system information such as product ID (S/N), installation directory, boot device, time zone, Language, uptime etc. 3. Hardware Information: Displays hardware information such as manufacturer, model, system type etc. 3.1 Processor information: CPU information of the remote host, such as: MHz, Stepping, Model, and CPU manufacturer. 3.2 Memory information: Real Memory and Virtual Memory / Swap on Host in Megabytes available. 3.3 Bios information: Hardware information of the Computer BIOS; includes manufacturer, version, description and serial. 3.4 Disk Information: Logical disk information for floppy and Zip drives, hard disks, and CD / DVD devices. Disk size and free space information provided in bytes. 3.5 Network Information: Network device information such as: IP address, MAC Address, subnets, gateway, and computer name. 4. Service information: Provides Service State information such as: current state, service name, and Service Display Name. This information can be used when monitoring services with the Centerity Agent. 5. Processes Information: Provides Process Name and Process ID to facilitate the automation of tasks regarding specific processes. HOST DETAILS Host Details tab allows adding customized administrative information. This information is optional and has no effect on the monitoring process. Admin Menue Host Details Tab 32

33 Chapter 3: Hosts & Metrics Administration 33 Host Details 1. OS: Host operating system. 2. Service Pack: Host most recent service pack. 3. Software: Software that is installed on the host. 4. Software license: You can store product license here. 5. Additional IP Addresses: If the host has another constant ip. 6. Default Gateway: Host's default gateway. Hardware 7. Model/Brand: The server's brand. 8. Manufacturer: Server manufacturer. 9. Processor: Amount and processor info. 10. Memory: Memory amount on server. 11. MAC Address: Network card's physical address. 12. Host ID: This is used for the UNIX / Linux specific Host ID. 13. Serial - Device serial number 14. Warranty - Warranty of the equipment Additional Info Supplier name: details about supplier 16. Supplier Contact Details: details about your supplier.

34 Chapter 3: Hosts & Metrics Administration Authority Person: The person in charge of this device and his details 18. Computer Location: Location of the devices such as: Computer room, cabinet number, etc. 19. Mandatory Services: This is for administrative information only. It specifies the mandatory services used by this host. 20. Optional Services: This is for administrative information only. It specifies the optional services used by this host. 21. Notes: Custom notes. SNMP Information 22. Community: Host SNMP community 23. Version: available SNMP versions: 1, 2c Port: Device SNMP Port 25. Username: specify username for security feature in SNMP V3 26. Password: specify password for security feature in SNMP V3 EXTENDED HOST INFORMATION 1. Image -This variable is used to define the name of a GIF, or PNG images that may be associated with this host. 2. Disable image in map - this option allows you to remove undesired hosts from your network map 3. Image Alternate text -This variable is used to define an optional string that is used in the ALT tag of the image specified by the <icon image> argument. 34

35 Chapter 3: Hosts & Metrics Administration External URL Define an external URL to access related websites or local libraries directly from the host properties screen. The URL will be opened in new windows or in the Centerity frame. Note: Host Detail Link should be checked to enable host inventory. PROXY SERVER Centerity Monitor Proxy Server provides a simple and powerful way to monitor Operating System resources that are not accessible directly from the Centerity server. The proxy Server is a regular Centerity windows agent acts as a single gateway between the Centerity server and monitored components. This Proxy Agent needs to be installed on a dedicated Windows workstation or Windows Server platform. Centerity Proxy Server configuration is done by using the Agent Discovery" option under Admin Section. Once the scanning process is done, select the option Enable as Proxy in the General host settings. This option will define this host as a proxy server during Proxy Agent Discovery process. 35

36 Chapter 3: Hosts & Metrics Administration 36 Network Settings - To start using the Proxy Server, port 5666 TCP must be enabled between the Proxy Server and Centerity Server. For monitoring a remote server which is agent based, this port should be also enabled between the Proxy Server and the remote server. On other scenarios, make sure that the relevant port for the check is open and accessible (Ex. port 161 for SNMP monitoring). Proxy Metric Settings - Proxy metrics settings are the same as the regular Centerity metrics, with only one parameter added. The first argument in each metric needs to be changed to the designated Proxy Server IP address or name. It is recommended to make this change in the metric template for all related hosts rather than define a manual change on each host that the proxy metric belongs to. Proxy Monitoring Solution Packs - In addition to the default proxy monitoring solution packs that comes with Centerity installation, there are many related packs available on Centerity support site under the category Centerity Solution Packs. Search for the key word "proxy" to get all the relevant packs. 36

37 Chapter 3: Hosts & Metrics Administration 37 DISCOVERY ENGINES HOST DISCOVERY Centerity Monitor provides advanced automatic discovery engines for hosts and devices in the network. Admin > Management > Discovery 1. Topology Discovery: Network mapping, including all servers and devices. By clicking the button, it will scan the network segment which the server is in, otherwise you can choose the settings manually Advanced: Set the parameters for the TD, select network segment, assign profiles or schedule automatic discovery History: Review Topology Discoveries previously ran. 2. Agent Discovery: after deploying Centerity Agents across your network, Centerity Monitor can detect them and allow you to assign profiles from the list of host profiles WMI Discovery: Centerity engine can detect any server that is open for WMI. 4. Network Discovery: Network discovery provides a fast way to identify which hosts are available across the network 5. SNMP Discovery: Centerity Monitor can scan SNMP enabled devices with predefined SNMP Templates and allow you to assign profiles from the list of SNMP profiles. 6. VMware Discovery: a quick way to scan the "VMware Data Center" or "VMware ESX" and insert all virtual machines to monitor. 37

38 Chapter 3: Hosts & Metrics Administration Proxy Agent Discovery: does the same action as "Agent Discovery" via proxy server. 8. Proxy VMware Discovery: does the same action as "VMware Discovery" via proxy server. 9. Proxy Network Discovery: does the same action as "Network Discovery" via proxy server. 10. Proxy SNMP Discovery: does the same action as "SNMP Discovery" via proxy server. 11. Proxy WMI Discovery: Centerity engine can detect any server that is open for WMI over proxy agent. 38

39 Chapter 3: Hosts & Metrics Administration 39 INVENTORY DISCOVERY 1. Agent Inventory: Collect Hardware and Software information from Centerity Agents. 2. VMware Inventory: Collect host hardware and service information from VMware. 3. WMI Inventory: Hardware and Software information from WMI enabled servers. 4. Custom Inventory: Collect Hardware and Software information from any third-party script/application. PROXY INVENTORY DISCOVERY 1. Proxy VMware Inventory: Collect host hardware and service information from VMware via Proxy. 2. Proxy Agent Inventory: Collect Hardware and Software information from Centerity Agents via Proxy server. 3. Proxy WMI Inventory: Collect Hardware and Software information from WMI enabled servers via Proxy. 39

40 Chapter 3: Hosts & Metrics Administration 40 AGENT DISCOVERY Centerity Monitor Agent allows discovery and monitoring metrics of a wide range of resources that are not visible or accessible over Agentless methods. Centerity Agents also provide a secured way to collect performance data from Operating systems using SSL and an IP based access list. Centerity Agents consume minimal bandwidth (about 1-2 kb per query). 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format: will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / URL Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 40

41 Chapter 3: Hosts & Metrics Administration Host Group: Select the desired host group for the discovered host. 4. Port - Centerity agent communicate with Centerity server over port 5666 as default. For nonstandard port, it is mandatory to update this field. Admin Menu Discovery - Agent discovery Scan Type Insert IP address / range of IPs Speicfy ports Scan network View results 5. Password For a password protected agents. 6. Scan Type - Centerity Monitor Agent for Windows, Linux, and Solaris includes SSL support for highest security. Other Operating Systems such as HPUX, AIX, VMS, and AS400 do not offer these capabilities due to Operating System limitations. Choose one of the following options to detect your agents: 6.1. SSL Agents Scan for SSL-enabled agents 6.2. NO SSL Agents Scan for older agents without SSL Support 6.3. SSL & NO SSL Agents Scan for agents using both SSL and NO SSL. 7. Timeout The default time-out is 10 seconds. The timeout period can be set up to 300 seconds. 8. Skip existing hosts Will skip any host that already exists in the system. 9. Debug Log Writes a debug log to the database. 10. Distributed Node: Global settings will automatically balance hosts between nodes. Fixed node will assign all discovered hosts to the specified node. AGENT SCAN RESULT After selecting View Network Scan Result and clicking Execute, all the hosts with Centerity Agent that were detected will be listed. 41

42 Chapter 3: Hosts & Metrics Administration 42 The information will be displayed in 6 columns: Host Name: a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address: Displays the IP address of the remote Agent Mode: SSL / No SSL modes are available. Depends on your agent installation OS: Centerity Monitor agents and above display inventory information about the Operating System and builds. Version: Agent version installed on the remote Host Profile: Host profile to apply to the host. Note: It is required to apply profile to each host PROXY AGENT DISCOVERY This option will perform the same process as described in the previous chapter (AGENT DISCOVERY) through a proxy agent. 42

43 Chapter 3: Hosts & Metrics Administration 43 Admin Menu Discovery - Agent discovery Scan Type Insert IP address / range of IPs Select Proxy Server Speicfy ports Scan network View results 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format: will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / URL - Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 3. Proxy Server This field is used to determine which Proxy server to use. 43 Note: A Proxy server will be valid only when it is enabled as a proxy in host settings.

44 Chapter 3: Hosts & Metrics Administration DNS Server - This field is used to determine which DNS Server to use. 5. Port - Centerity Monitor agent using port 5666 for standard operations. If you install the agent on anon-standard port you need to configure the Agent Discovery to search this port. 6. Scan Type - Centerity Monitor Agent for Windows, Linux, and Solaris includes SSL support for maximum security. Other Operating Systems such as HPUX, AIX, VMS, and AS400 do not offer these capabilities due to Operating System limitations. Choose one of the following options to detect your agents: 6.1. SSL Agents Scan for SSL-enabled agents 6.2. NO SSL Agents Scan for older agents without SSL Support 6.3. SSL & NO SSL Agents Scan for agents using both SSL and NO SSL. 7. Skip existing hosts Will skip any host that already exists in the system. Note: This last option takes more time to detect agents, since the Scanner scans each device twice. 8. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 9. Skip existing hosts Will skip any host that already exists in the system. 10. Debug Log Writes a debug log to the database. 11. Distributed Node: Global settings will automatically balance hosts between nodes. Fixed node will assign all discovered hosts to the specified node. 44

45 Chapter 3: Hosts & Metrics Administration 45 PROXY AGENT SCAN RESULT After selecting View Proxy Scan Result and clicking Execute, all hosts with Agents that were detected will be listed. The information will be displayed in 6 columns: Host Name: a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address: Displays the IP address of the remote Agent Mode: SSL / No SSL modes are available. Depends on your agent installation OS: Centerity Monitor agents and above display inventory information about the Operating System and builds. Version: Agent version installed on the remote Host Profile: Host profile to apply to the host. Note: It is mandatory to apply template to each host 45

46 Chapter 3: Hosts & Metrics Administration 46 SNMP DISCOVERY Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from network devices such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. Centerity Monitor provides SNMP plug-ins that works with all thirdparty SNMP management interfaces to monitor the status of managed devices and applications. Admin Menu Discovery - SNMP discovery Scan Type Insert IP address / range of IPs Insert community name Speicfy ports and SNMP version Scan network View results 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to

47 Chapter 3: Hosts & Metrics Administration Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 3. Community - SNMP Community of the remote device; either read only or read/write can be used. 4. Port - Specify SNMP port for the device (if other than port 161) 5. SNMP Version - Centerity Monitor supports all SNMP protocols: 5.1. V. 1 using standard community V. 2c using standard community V. 3 Using advanced SNMP security features. 6. Username / Password - If SNMP version 3 is used, specify the Username and Password set on the remote device for accessing information. 7. Timeout -Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 8. Ping Scan - This option is useful when you have multiple SNMP communities and you want only to detect what SNMP enabled devices are available. Do not use Ping Scan if you will be continuing further to a sub scan. 9. Rescan Devices - When changes occur on your SNMP enabled devices you will need to rescan them. This feature allows you to rescan current device and replace / append current information to the existing device. Append new information: Collect more information about interfaces, new memory, etc. Replace new information: Replace existing information with the newly detected information, for example if an existing interface changed names it'll change it, as opposed to the "Append new information" section. 10. Distributed Node: Global settings will automatically balance hosts between nodes. Fixed node will assign all discovered hosts to the specified node. 47

48 Chapter 3: Hosts & Metrics Administration 48 SNMP SCAN RESULT Centerity SNMP discovery engine requires 3 Steps: 1. Define the IP address (or IP range) and the SNMP community. 2. View which hosts were found by the SNMP discovery tool and choose for each host a specific SNMP scan profile template For multiple hosts / devices with the same Profile mark the checkbox near the Global SNMP Profile and select the appropriate profile. 3. Click the Scan button for intensive scan on the remote device to find all the sub components and information available. Note: selecting Save without assigning any SNMP profile will create a host with no metrics. The install policy process will alert about such events. Once the intensive scan has finished, select View Scan Results again to view the discovery results. If the correct template was assigned, there will be a list of all available information. Host Name: a fully qualified domain name resolved by the DNS. If no DNS name is found, the IP address will be displayed. IP Address: Displays the IP address of the remote Agent Metric: Number of Metrics that will be monitored. Information: displays the banner information from the scan result. Profile: displays the SNMP Profile that was chosen for this scan. 48

49 Chapter 3: Hosts & Metrics Administration 49 Click on the to open a list of all the metric profiles that were defined in the SNMP Scan template Metric: the metric name assigned for the profile entry Description: Description specified in the profile entry Identifier: Identifier is usually the OID specified in the entry Found: The number of items defined as metric. If you de-select the checkbox on the right it will remove all entries under this metric. SNMP Discovery Search: Allows filtering within the results by searching and status. 49

50 Chapter 3: Hosts & Metrics Administration 50 PROXY SNMP DISCOVERY This option will perform the same process as described in the previous section (SNMP DISCOVERY) through a proxy agent. Admin Menu Discovery - Proxy SNMP discovery Scan Type Insert IP address / range of IPs Insert community name Speicfy ports and SNMP version Scan network View results 11. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like option 3 above, but is a little more flexible. 50

51 Chapter 3: Hosts & Metrics Administration Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/ IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 13. Community - SNMP Community of the remote device; either read only or read/write can be used. 14. Port - Specify SNMP port for the device (if other than port 161) 15. SNMP Version - Centerity Monitor supports all SNMP protocols: V. 1 using standard community V. 2c using standard community V. 3 Using advanced SNMP security features. 16. Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 17. Username / Password - If SNMP version 3 is used, specify the Username and Password set on the remote device for accessing information. 18. Timeout -Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 19. Ping Scan - This option is useful when you have multiple SNMP communities and you want only to detect what SNMP enabled devices are available. Do not use Ping Scan if you will be continuing further to a sub scan. 20. Rescan Devices - When changes occur on your SNMP enabled devices you will need to rescan them. This feature allows you to rescan current device and replace / append current information to the existing device. Append new information: Collect more information about interfaces, new memory, etc. Replace new information: Replace existing information with the newly detected information, for example if an existing interface changed names it'll change it, as opposed to the "Append new information" section. Note: this feature only works if the metric name is in the exact format name of the SNMP profile template, and has not been edited. 51

52 Chapter 3: Hosts & Metrics Administration 52 PROXY SNMP SCAN RESULT Centerity SNMP discovery engine requires 3 Steps: 4. Define the IP address (or IP range) and the SNMP community. 5. View which hosts were found by the SNMP discovery tool and choose for each host a specific SNMP scan profile template For multiple hosts / devices with the same Profile mark the checkbox near the Global SNMP Profile and select the appropriate profile. 6. Click the Scan button for intensive scan on the remote device to find all the sub components and information available. Note: selecting Save without assigning any SNMP profile will create a host with no metrics. The install policy process will alert about such events. Once the intensive scan has finished, select View Scan Results again to view the discovery results. If the correct template was assigned, there will be a list of all available information. Host Name - a fully qualified domain name resolved by the DNS. If no DNS name is found, the IP address will be displayed. IP Address Displays the IP address of the remote Agent Metric - Number of Metrics that will be monitored. Information displays the banner information from the scan result. Profile displays the SNMP Profile that was chosen for this scan. Click on the to open a list of all the Metric profiles that were defined in the SNMP Scan template Metric the metric name assigned for the profile entry Description Description specified in the profile entry Identifier Identifier is usually the OID specified in the entry Found the number of items defined as Metric. If you de-select the checkbox on the right it will remove all entries under this metric. SNMP Discovery Search: Allows filtering within the results by searching and status. 52

53 Chapter 3: Hosts & Metrics Administration 53 53

54 Chapter 3: Hosts & Metrics Administration 54 VMWARE DISCOVERY Centerity Monitor provides powerful discovery engine for Virtual Centers, ESXs and virtual machines. The VMware discovery process includes automatic dynamic topology map of the VMware and apply monitored metrics with multiple scan options. Admin Menu Discovery - VMware Scan Type VC/ESX User / password Host Group Port Scan network View results 1. Select Scan Type: Scan type allows you to choose between the entire V-Center scan and a single ESX Server scan Virtual Center: will scan the virtual center with all ESXs and virtual machines under it Virtual Center name: Type in the V-Center name or IP address VC username: insert the V-Center administrator username VC password: insert the V-Center administrator password Host-group: Define the host-group that the hosts will be attached to Port: Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist DC or ESX: This option identifies changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan to add them to the monitoring process) Machine state: This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 54

55 Chapter 3: Hosts & Metrics Administration Skip existing hosts: will not display existing hosts in the new discovery scan Scan Only ESX s: will scan ESX s without VMs Debug Log: Will display errors if any occur Distributed Node: Select a node to associate the metrics with, if Global Settings is selected it will balance between all nodes ESX: will scan the ESX and all virtual machines under it ESX name: This field is used for discovering a specific Esx to scan. This field can be filled with the ESX name or IP address ESX username: insert the ESX administrator username ESX password: insert the ESX administrator password Host-group: Define the host-group that the hosts will be attached to Port: Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist DC or ESX: This option identifies changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan to add them to the monitoring process) Machine state: This option is used to determine what state of machine to scan for (power on\off, suspend or all the states) Skip existing hosts: will not display existing hosts in the new discovery scan Debug Log: Will display errors if any occur Distributed Node: Select a node to associate the metrics with, if Global Settings is selected it will balance between all nodes. 55

56 Chapter 3: Hosts & Metrics Administration 56 VMWARE SCAN RESULTS To view the scan results, select "View VMware Scan Results" and click on the "Execute" button. Add hosts to monitoring server: View VMware Scan Results Execute Select Hosts Define Profiles and choose other options Select the host that you want to add to monitor server and specify the profile. Press the save button. Save Run Policy Global host profile Select Global host profile to apply the same profile to all selected hosts. Create map This option will automatically generate a topology map 56

57 Chapter 3: Hosts & Metrics Administration 57 PROXY VMWARE DISCOVERY Centerity Monitor provides powerful discovery engine for Virtual Centers, ESXs and virtual machines. The VMware discovery process includes automatic dynamic topology map of the VMware and apply monitored metrics with multiple scan options. Admin Menu Discovery - VMware Proxy Scan Type VC/ESX User / password Host Group Port Scan network View results 2. Select Scan Type - Scan type allows you to choose between the entire V-Center scan and a single ESX Server scan Virtual Center - will scan the virtual center with all ESXes and virtual machines under it Virtual Center name Type in the V-Center name or IP address VC username - insert the V-Center administrator username VC password insert the V-Center administrator password ESX username insert the ESX administrator username ESX password insert the ESX administrator password Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings Host-group Define the host-group that the hosts will be attached to Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port. 57

58 Chapter 3: Hosts & Metrics Administration Compare exist Dc or ESX This option identify changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan in order to add them to the monitoring process) Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states) ESX - will scan the ESX and all virtual machines under it ESX name - This field is used for discovering a specific Esx to scan. This field can be filled with the ESX name or IP address ESX username insert the ESX administrator username ESX password insert the ESX administrator password Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a proxy in host settings Host-group Define the host-group that the hosts will be attached to Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port Compare exist Dc or ESX This option identifies changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan to add them to the monitoring process) Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 58

59 Chapter 3: Hosts & Metrics Administration 59 PROXY VMWARE SCAN RESULTS To view the scan results, select "View VMware Scan Results" and click on the "Execute" button. Add hosts to monitoring server: View VMware Scan Results Execute Select Hosts Define Profiles and choose other options Select the host that you want to add to monitor server and specify the profile. Press the save button. Save Run Policy Global host profile Select Global host profile to apply the same profile to all selected hosts. Create map this option will generate topology map automatically 59

60 Chapter 3: Hosts & Metrics Administration 60 NETWORK DISCOVERY A Network discovery provides a fast way to identify which hosts are available across the network (either internal or external) and detect which ports are opened and respond. The map file for the port names is in the /etc/services on the Centerity appliance. When saving the detected hosts and opened ports, Centerity Monitor will assign TCP / UDP metric checks to the corresponding ports and try to monitor availability and response time. Admin Menu Discovery - Network discovery Scan Type Insert IP address / range of IP Port Range press "scan network" view results Save & Install policy 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1 IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format: will scan single IP Address 60

61 Chapter 3: Hosts & Metrics Administration Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like option 3 above, but is a little more flexible. 1.3 Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / addresses range / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 3. Port Ranges 3.1 Top Known Ports: By default, Centerity Monitor will try to scan the specified host from Port 1 to All Ports: Centerity Monitor will try to scan the Host from port 1 to 65535, which takes longer. 3.3 Port Range: Specify a range of ports to scan. 3.4 Custom Ports: Specify ports to scan: 443,80, etc. 4. Protocol Type - Select which protocols to detect. By default, Centerity Monitor tries to detect TCP and UDP metrics. 5. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 6. Exclude IP Addresses: Define IP Addresses to exclude from the scan. 7. Force Scan: Detects hosts that have no available ping (ICMP). Hosts with ICMP or PING blocked are not available for the standard network scan and will be not detected. To detect these hosts and devices, choose this option. The scan will immediately start port detection for each IP / Range specified the IP address field. 8. Ping Only: Detects only hosts that are allowing ICMP connection without ports. 9. System DNS: Use host name as the DNS name. 10. Scan Method: Fast / Normal / Aggressive: 11. Skip existing hosts will not display existing hosts in the new discovery scan. 12. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. 61

62 Chapter 3: Hosts & Metrics Administration 62 NETWORK SCAN RESULT When selecting View Network Scan Results Centerity Monitor will display available ports and their Name Mapping. For example, if port 21 was opened on the remote Host, Centerity Monitor will show: Service: ftp Port: 21 Protocol: tcpstate: open. 1. Metric: this is the mapped metric name from /etc/services 2. Port: Port number detected by Centerity Monitor 3. Protocol: Either TCP (Transmission Control Protocol over Internet Protocol) or UDP (User Datagram Protocol) 4. State: metric state is Open, Filtered or Closed. Open means that an application on the target machine is listening for connections/packets on that port. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Centerity Monitor cannot tell whether it is open or closed. Closed ports have no application listening on them Note: Use the Checkbox in the upper right corner to add / remove all hosts and metrics When clicking on Save, all selected hosts will be saved and the scan results will be cleared 62

63 Chapter 3: Hosts & Metrics Administration 63 PROXY NETWORK DISCOVERY This option will perform the same process as Network Discovery. In this option, the discovery process will be activated through a proxy agent. 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format: will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range: choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like option 3 above, but is a little more flexible Subnet Range: Specify your network class in the following form: Range: Subnet: 24/32/48 2. IP Address / addresses range / URL: This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly. 3. Proxy Server: This field is used to define the Proxy server. 4. DNS Server: determine the DNS Server. 63

64 Chapter 3: Hosts & Metrics Administration Port Ranges: By default, Centerity Monitor will try to scan the specified host from Port 1 to If you specify All Ports, Centerity Monitor will try to scan the Host from port 1 to 65535, which takes longer. 6. Scan Type: Scan type allows you to choose which protocols to detect. By default, Centerity Monitor tries to detect TCP and UDP metrics. You can reduce scan time by selecting one or the other, depending on your situation. 7. Timeout: Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 8. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 64

65 Chapter 3: Hosts & Metrics Administration 65 WMI DISCOVERY Centerity Monitor Agent provides a simple and powerful way to monitor Operating System resources that are not available through Agentless methods. WMI is a set of extensions to the Windows Driver Model that provide information and notifications. Admin Menu WMI Discovery Scan Type IP Address URL Admin User Password Domain Name Scan Network 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format: will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to

66 Chapter 3: Hosts & Metrics Administration Start End Range: choosing this option will allow you to specify the exact start and end range, for example: Start IP: End IP This option is like section above, but is a little more flexible Subnet Range: Specify your network class in the following form: Range: Subnet: 24/32/ IP Address (es) / URL: This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: As long the name is resolvable, the scan will be performed correctly Admin user, password and domain name: Fill out this information to get WMI access to the server Skip existing hosts: Will skip hosts who are already listed in the system Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. WMI SCAN RESULT Select View Network Scan Result and clicking Execute, all WMI enabled hosts that were detected will be listed. View Network Scan Result Execute The information will be displayed in 6 columns: 1. Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. 2. IP Address Displays the IP address of the remote Agent 3. OS Centerity Monitor agents and above display inventory information about the Operating System and builds. 4. OS Bit 32bit/64bit System 66

67 Chapter 3: Hosts & Metrics Administration Service Pack Displayed which service pack is installed. 6. Profile Host profile to apply to the host. Note: If no template is chosen an empty Host entry will be created. PROXY WMI DISCOVERY Proxy WMI discovery provides a simple way to find out which hosts are available across the network (either internal or external) and detect which ports are opened and respond. When saving the detected hosts and opened ports, Centerity Monitor will assign TCP / UDP metric checks to the corresponding ports and try to monitor availability and response time. Note: This option also allows you to examine and detect security exploits that can be found on your network, such as disabled firewalls, unwanted services listening etc. Note: A Proxy server will be listed only when it is enabled as a proxy in host settings. 67

68 Chapter 3: Hosts & Metrics Administration 68 Admin Menu Proxy WMI Scan Type IP Address URL Proxy Server Admin User Password Domain Name 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: Single IP Format : will scan single IP Address Wild card Format: * will scan class C network; *.* will scan Class B Network Range Format: will scan range from IP to Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : End IP This option is similar to option 3 above, but is a little more flexible Subnet Range Specify your network class in the following form: Range: Subnet: 24/32/ IP Address (es) / URL - Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 2. Proxy Server This field is used to determine which Proxy server to use. 3. Admin user, password and domain name Fill out this information to get WMI access to the server. 4. Skip existing hosts Will skip hosts who are already listed in the system. 5. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. PROXY WMI SCAN RESULT After selecting View Network Scan Result and clicking Execute, all WMI enabled hosts that were detected will be listed. The information will be displayed in 6 columns: 68 Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address Displays the IP address of the remote Agent

69 Chapter 3: Hosts & Metrics Administration 69 OS Centerity Monitor agents and above display inventory information about the Operating System and builds. OS Bit 32bit/64bit System Service Pack Displayed which service pack is installed. Profile Host profile to apply to the host. Note: If no template is chosen an empty Host entry will be created. TOPOLOGY DISCOVERY This kind of discovery is a new method for discovering all network or subnet components and displaying a detailed map of them within the selected range of addresses. At the end of this search, the results provide the information about how the host was discovered, type of device and its status. The TD can be performed by clicking on Advanced option to define the range and types of devices to be discovered, otherwise the scan would be performed on the automatic subnet (which the server is a member of). Filling the passwords and SNMP community for devices is recommended to achieve a fuller environment view. 69

70 Chapter 3: Hosts & Metrics Administration Scan type and range: Scan type allows you to input addresses in several formats and extends the scan flexibility: 1.1 Start/End Range: Enter an IP range ,100 will scan range from IP to Manual Subnet: Specify the starting address and the subnet prefix (24, 16, etc.) 1.3 Automatic Subnet: Automatically scan the subnet of the server. 2. Scan environment: Choose the environments you would like to include in the scan. Agent-based servers, WMI, SNMP, VMware. Equipment requiring authentication (WMI, SNMP and VMware) require entering credentials. 3. Auto add: Selecting yes will automatically add discovered hosts to the system. The auto-add expands to reveal further options. 4. Schedule task: Schedule the defined scan - the scan could be repeated every defined period and a certain user would be informed about it. The schedule option section would be opened. In case there is another scheduled task running, you should choose in the Scheduler Settings drop-menu the priority of the task you are currently setting. 5. Default Settings: Set the default values applied for the discovered hosts (could be changed at the end of the discovery. a. Default Host Group: Choose the host group applied directly for the discovered hosts, from the existing HGs in the system. b. Default Contact Group: Choose the Contact group applied for the discovered hosts, from the existing CGs in the system. 70

71 Chapter 3: Hosts & Metrics Administration 71 AGENT INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Agent Inventory Scan Type IP Address / Range Port Scan Type Password Timeouts Scan Network 1. Select Scan Type - Define the scan type of the inventory scanner 1.1. Select Hosts Select specific host or multiple hosts (by pressing the shift button while selecting) 1.2. All Hosts Collect inventory information for all hosts 71 Note: if you do not run collector on regular basis and you wish to track only changes, choose specific hosts.

72 Chapter 3: Hosts & Metrics Administration Scan Type 2.1. Agent Centerity Monitor agent discovery provides all the detailed information described in Chapter 2 Asset Management / Host Inventory 2.2. SNMP Collect Simple SNMP information. 3. Port Specify a different port if you install Centerity Monitor agents on different ports. 4. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 5. Agent Inventory Discovery Scan Results - When discovery is finished you can see which Hosts and metrics were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host services. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. AGENT INVENTORY SCAN RESULT Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. Currently, there are 2 Asset management configuration methods available: 1. Agent Centerity Monitor Agents 1.4 and above support advanced asset management collectors and provide information about: General Computer information, Hardware information, and Software information. 2. SNMP Currently Centerity Monitor uses default SNMP agent and detects simple information available by SNMP such as: manufacturer, Location, and description. 72

73 Chapter 3: Hosts & Metrics Administration 73 AGENT PROXY INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information via Proxy server. This is currently done manually from the web admin GUI or using the command line. Admin Menu Inventory Tab Proxy Agent Inventory Scan Option Proxy Server Speicfy ports Timeouts Scan network View results 1. Select Scan Option - Define the scan option of the inventory scanner 1.1. Select Hosts Select specific host or multiple hosts (by pressing the shift button while selecting) All Hosts Collect inventory information for all hosts Select Host Group - Select specific Host Group or multiple Host Groups (by pressing the shift button while selecting) 73

74 Chapter 3: Hosts & Metrics Administration 74 Note: if you do not run the collector on regular basis and you wish to track only changes, choose specific hosts. 2. Proxy Server This field is used to determine which Proxy server to use. 3. Port Centerity Monitor agent using port 5666 for standard operations. If you install the agent on anon-standard port you need to configure the Agent Discovery to search this port. 4. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 5. Debug Log Check to Enable Debug Log AGENT PROXY INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Metrics were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Metrics. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. 74

75 Chapter 3: Hosts & Metrics Administration 75 VMWARE INVENTORY DISCOVERY Centerity Monitor has an asset management tool that allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Select Datacenter ESX User / Password Port Scan network View results 1. Select Data Center Select main Data Center. 2. Select Hosts to scan Select internal Hosts to scan. 3. ESX username insert the ESX administrator username. 4. ESX password insert the ESX administrator password. 5. Port - Centerity Monitor VMware discovery uses port 443 for standard operations. If you use an anon-standard port you need to configure the VMware Discovery to search this port. 75

76 Chapter 3: Hosts & Metrics Administration 76 VMWARE INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Metrics. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. PROXY VMWARE INVENTORY DISCOVERY Centerity Monitor has an asset management tool that allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Select Datacenter ESX User / Password Port Scan network View results Select Data Center Select main Data Center. 7. Select Hosts to scan Select internal Hosts to scan.

77 Chapter 3: Hosts & Metrics Administration Proxy Server - This field is used to determine which Proxy server to use. 8. ESX username insert the ESX administrator username. 9. ESX password insert the ESX administrator password. 10. Port - Centerity Monitor VMware discovery uses port 443 for standard operations. If you use an anon-standard port you need to configure the VMware Discovery to search this port. VMWARE INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Metrics. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. WMI INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory WMI Inventory Choose Hosts / Host Groups Admin User Password Domain Scan Network 77

78 Chapter 3: Hosts & Metrics Administration Scan Options: Choose Host / Host Group. 2. Select Hosts: Select desired hosts / host groups to scan inventory on. 3. Admin User: Domain admin user. 4. Password: Domain admin user password. 5. Domain Name: The domain name. 6. Debug Log: If you wish to have a debug log on this. The debug log writes to Centerity database. WMI INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View Inventory Scan results view the scan results and save / skip Host Metrics. New Inventory Scan remove current scan result and start scanner from beginning. WMI PROXY INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory WMI Inventory Choose Hosts / Host Groups Select Proxy Server Admin User Password Domain Scan Network 78

79 Chapter 3: Hosts & Metrics Administration Scan Options: Choose Host / Host-Group. 2. Select Hosts: Select desired hosts / host groups to scan inventory on. 3. Proxy Server: Select proxy server (must be a parent host.) 4. Admin User: Domain admin user. 5. Password: Domain admin user password. 6. Domain Name: The domain name. 7. Debug Log: If you wish to have a debug log on this. The debug log writes to Centerity database. WMI PROXY INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View Inventory Scan results view the scan results and save / skip Host Services. New Inventory Scan remove current scan result and start scanner from beginning. 79

80 Chapter 3: Hosts & Metrics Administration 80 DUPLICATE A HOST Centerity Monitor provides an easy way to create a new host from an existing host using the Duplicate Host action. This will create an exact copy of a specific host and change only the unique identifiers, such as: Host name, Description and IP Address. The steps for duplicating host in the admin menu are: 1. Go to the Hosts interface and check the checkbox of the host you want to duplicate 2. Select Duplicate from the drop-down menu on the right bottom and click Submit 3. Enter the new Host Name, Description, and IP Address 4. Click Save Admin Menu Host Duplicate Submit Save Note: In case of host name duplication, Remove or disable one of the hosts before running Policy Manager. ADDING AHOST PROFILE TO AN EXISTING HOST Centerity Monitor allows adding an additional Host profile to an existing host. For example, creating a standard host, using the Windows Server profile and applying the Microsoft Exchange Monitoring profile: 1. Go to the Hosts interface and check the checkbox on the right, for the host you want to update. 2. Select Profile from the drop-down menu on the right bottom and click Submit 3. Select the Host profile you created 4. Click Change to apply the new host profile Admin Menu Host Profile Submit Change 80

81 Chapter 3: Hosts & Metrics Administration 81 Click Preview button In order to explore which metrics are available in the specific profile. 81

82 Chapter 3: Hosts & Metrics Administration 82 ADDING A METRIC TO AN EXISTING HOST Centerity Monitor allows adding new definitions, expand metric monitoring & add new applicable metric metrics for existing host. New metrics can be added from the admin menu under the Host administration 1. Go to the Hosts interface and choose a Host from the List by clicking on it 2. Select Metric Tab 3. Choose from Metric Category or All Metric Profile List 4. Click Add to add new metric to the host profile Admin Menu Host Metric Add Save 82

83 Chapter 4: Policy Manager 83 Chapter 4: Policy Manager OVERVIEW Centerity Monitor Policy Manager is used to execute various procedures after some changes are made to the product configuration. For example, configure hosts and metrics, define new check commands, re-draw the map, etc. EXPORTING POLICY VIA POLICY MANAGER Admin Menu Policy Manager Verfity Policy Install 1. Choose Policy Manager from the Admin Menu 2. Click the Remote Policy Install button on the top right corner of the page. Centerity Monitor requires that all changes will be validated and verified before execution. The Verify and Install process examines all the newly created and changed data. When a problem occurs Policy Manager will provide a specific alert describing the configuration issues with related data to assist on fixing the problem 83

84 Chapter 4: Policy Manager 84 84

85 Chapter 5: Business Service Management (BSM) 85 Chapter 5: Business Service Management (BSM) OVERVIEW Business Services are an effective approach for managing Information Technology (IT) from the perspective of the business. They can increase business value through better management of IT and processes. Centerity Monitor can build a logical map containing layers of components such as network, web services, databases, storage, etc. Then, Centerity Monitor calculates the metric utilization overall and for every component layer. Business Service Management leaves no stone unturned. Business services, activities, processes, transactions, etc., are understood from the business user's perspective, internally and externally, in their terms, their language, and their performance expectations, while understanding the impact on their jobs, productivity, goals and objectives, etc. CONFIGURATION 1. Under the management tab in the admin section of the system click on "Business Services": In the Business Services screen click on the "+" button. 3. In the General screen complete all the fields in the following order:

86 Chapter 5: Business Service Management (BSM) 86 BSM Name: The name that you want to give to your new BSM process. Description: The description that you want to give to your new BSM process. Enable / Disable View: Leave the enable checkbox always marked. Category: Select the new BSM category (Windows, Linux, Application etc.) Host Group: Select the host group that the new BSM process will be associated to. Sub Group: Select the sub group that the new BSM process will be associated to (if you have defined sub groups in the system). Contact Groups: Select the contact groups that will be associated to the BSM process. Weight Calculation: Recommended to select the checkbox to enable weight calculation for layers and metrics. Map: Select the map you want associated with this BSM process. 4. After filling in all the relevant fields go to the "advanced" tab. 86

87 Chapter 5: Business Service Management (BSM) Fill in the warning and critical thresholds for the BSM availability, and fill in the "OK Range", "Warning Range", and "Critical Range" according to the thresholds you gave to main BSM availability, for example: 6. After you have defined the thresholds of the BSM availability, go to the "Levels" tab. 7. Inside the levels tab you will need to add levels into your BSM process, by adding levels you will be able to set the amount of percentage that each level will consume for the hole BSM process, also you will be able to pinpoint the exact cause of a mission critical problem in the organization. Inside the level tab add the levels that are relevant to your BSM process (like "DB", "Networking", and "Application", "Storage" etc.), give them a description and set the amount of weight that each level will take from the hole BSM process, for example: 87

88 Chapter 5: Business Service Management (BSM) 88 All the levels must sum up to 100%. You can also define a certain level to be a breakdown level (breakdown level is a level that will breakdown the hole BMS process if that specific level will be in a critical state critical state is defined by the percentage you choose next to the breakdown check box). 8. After finishing with the entire levels configuration go to the "Members" tab. 9. Inside the members tab, add all the relevant checks to the BSM process from all of the monitored checks. You will need to assign each check to the relevant level that you have already defined and give each check the weight of that check from the level (or, the system will balance weight automatically). 10. Under the "Add Members" block click on the "Select Host" drop down menu button and choose the host that you want to add checks from, then all the checks that are associated to the host will appear and you will need to mark the checks that you want to add and click on the "Add" button on the right side like so: 88

89 Chapter 5: Business Service Management (BSM) 89 You can also select checks from a metric list or a host group list of metrics. Additionally, previously available BSMs are available to add and creation of levels-within-levels. 11. Continue to add all the relevant checks from all the relevant hosts that you want to associate to your BSM process. 12. Click on the "save" button in the lower right side of the screen. 13. After saving the new BSM process, inside the monitor menu click on the "Business Services" button, and a screen that contains all the BSM processes in the system will appear. In that screen, see the new BSM process and its currently availability status in %: 14. You can drill down to a specific BSM view by clicking on it. 89

90 Chapter 5: Business Service Management (BSM) Inside the BSM process, see all the levels availability that were defined, and the checks that the level contains to pin point a problem and get an exact idea on what is causing the problem: 90

91 Chapter 6: Metrics 91 Chapter 6: Metrics OVERVIEW A metric definition is used to identify a "metric" that runs on a specific host. The term "metric" can be used in several meanings. It can mean an actual metric that runs on the host (POP, SMTP, HTTP, etc.) or some other type of metric (KPI) associated with the host (response to a ping, number of logged in users, free disk space, etc.). Metric profiles are templates containing information such as: What is monitored: CPU, Memory, Disk Usage, Network Traffic Thresholds Contact group, related to the metric Monitoring schedule Metric notification settings Centerity Monitor provides hundreds of best practice Metric Profiles that are suitable for major standard applications. The metric settings and thresholds can also be modified to fit requirements. CREATING A NEW METRIC PROFILE Admin Menu Management Metrics To create a new Metric Profile, Choose the main Admin screen and click on Metrics to access the Metric Management screen. Click + on the top right corner of the Metrics Management view. 91 The following window will be opened:

92 Chapter 6: Metrics 92 GENERAL SETTINGS 1. Metric Name - The name of the metric which will be displayed in the monitor under the host configuration. Metrics are uniquely identified with their Template Name and Metric Descriptions. 2. Metric Description Clear description for the specific metric. 3. Metric Type - Catalog the metric under a metric type. This is useful information for creating Business Services which allows creating statistics and subbing level trees. 4. Enable / Disable Metric - Enable or disable the metric. 5. Metric Template - This is the template that can be found under Templates Metric Templates which allows saving time by using general template settings for multiple metrics. Any unique settings should be defined under each host. 6. Contact Groups - Contact groups that should be notified whenever there are problems (or recoveries) with this metric. 7. Host & Host Groups Members Assign the Metric Profile to Hosts and/or Host Groups Host Members Select multiple hosts to add this metric Host Groups Select multiple host groups to add this metric. 92

93 Chapter 6: Metrics 93 COMMAND PROPERTIES In the command tab, to activate an option the checkbox on the far right must be selected. Otherwise, the defaults based on the metric template are applied. The line should turn blue and the option you selected will override the one from the template. 1. Metric Check Command: The specific command the system runs to check the status of the metric. 2. Arguments: Command-line arguments that should be passed to the check command. 3. Checks Period - The time-period during which active checks of this metric can be made. Time and Scheduler Periods can be defined using Templates Time Periods Time-Period A fixed time-frame in which the metric check will be execute Scheduler Period A specific date and time-period in which the metric check will be executed. Note: Scheduler Period will change the metric from active to passive settings 93

94 Chapter 6: Metrics Normal Check Interval - Defines the number of "time units" to wait before scheduling the next "regular" check of the metric. "Regular" checks occur when the metric is in OK state. 5. Retry Check Interval The number of "time units" to wait before scheduling a re-check of the metric. Metrics are rescheduled at the retry interval when they have changed to a non-ok state. 6. Max Check Attempts - The number of times the system will retry the metric check command if it returns any state other than an OK state before sending a notification. Setting this value to 1 will cause a notification to generate immediately without retrying the metric check again. Note: The default interval unit is 1 minute, meaning interval value of 5 = 5 minutes. NOTIFICATION SETTINGS 1. Notification Enabled Enables or disables notifications for this metric. 2. Notification Period - Time period during which notifications of events for this metric can be sent out to contacts. If a metric event occurs during a time frame which is not covered by the time-period, no notifications will be sent out. 3. Notification Interval - Number of "time units" to wait before re-notifying a contact that this metric is still down or unreachable. Unless you have changed the interval length from the default value of 60, this number will represent minutes. If you set this value to Once, Centerity Monitor will not renotify contacts about problems for this metric - only one notification will be sent out. 4. Notification Options - This determines which notifications for the metric should be sent out. Valid options are a combination of one or more of the following: Recovered, Critical, Warning, and Unknown 94

95 Chapter 6: Metrics 95 STATUS SETTINGS 1. Active Check - Determines if active checks of this metric are enabled. 2. Passive Check - Determines if passive checks of this metric are enabled. 3. Is volatile A volatile metric is one that changes its status too often. This option detects those kinds of metrics. 4. Parallelize check - Determines if a metric check can be parallelized. By default, all metric checks are parallelized. 5. Obsess over metric - Determines if the system will obsess over metric checks results and run the obsessive-compulsive metric processor commands. MISC. SETTINGS 6. Freshness checks Determines if freshness checks are enabled for this metric. These settings useful when passively monitoring a metric while the remote host does not report at a regular interval (heartbeat). For more information on passive monitoring refer to Centerity Website support section "Centerity Windows Passive Monitoring Guide". 7. Freshness threshold - Specifies the freshness threshold (in seconds) for this metric. Centerity Monitor will determine a freshness threshold to use automatically when setting this value to 0, 8. Event Handler Run action because of change events. Can trigger actions on remote metrics such as restart service, reboot computer, delete temp file, run scripts, etc. 9. Enable / Disable Event Handler Determines if event handler for this metric is enabled. 10. Event Handler Command - The command defined in the Event Handler section 11. Flap Detection Determines if flap detection is enabled for this metric. Centerity Monitor supports the detection of hosts and metrics that are "flapping". Flapping occurs when a metric or host 95

96 Chapter 6: Metrics 96 changes state too frequently, resulting in a many problem and recovery notifications. Flapping can be indicative of configuration problems (i.e. thresholds set too low) or real network problems. 12. Flap Threshold Defines low and High Thresholds for Flap Detection Mechanism Low flap threshold - Specifies the low state change threshold used in flap detection for this service High flap threshold Specifies the high state change threshold used in flap detection for this metric. 13. Process performance data Determines whether processing of performance data is enabled for this metric. Note: If you disable Data performance for specific metric graph information will not be created 14. Retain status information Determines whatever status-related information about the metric is retained across program restarts. 15. Retain non-status information - Determines whether non-status information about the host is retained across program restarts. 16. Stalking Enabled - When enabled, this allows to log changes in metric and host checks even if the state of the host or metric does not change. When stalking is enabled for a particular host or metric, Centerity Monitor will watch that metric very carefully and log any changes occur. This can be very helpful for later analysis of the log files. 17. Stalking options - Determines which host states stalking is enabled. Valid options are a combination of one or more of the followings: OK, Critical, Warning, or Unknown. 96

97 Chapter 6: Metrics 97 METRIC EXTENDED INFORMATION Extended metric information entries effect on how information is displayed and has no effect on monitoring. 1. Graph Enabled: Enable / Disable graphing for this metric. 2. Graph Template: Select Customized graph or a pre-defined graph from the drop-down list. If no graph is selected, the system will automatically graph metrics. 3. External URL: Link to an external URL for the metric. Will appear in the status tab when viewed in the monitor. 4. Notes URL: Link to an external URL, such as a CRM application or any other application. 5. Icon Image & Alternate text: Set icon and text for when the mouse hovers over icon. 97

98 Chapter 6: Metrics 98 METRIC DETAILS Metric details screen display custom information related to this metric. None of the defined in the details tab affects the metric execution. 98

99 Chapter 6: Metrics 99 EDIT A METRIC PROFILE Admin Menu Management Metrics To edit a Metric Template, go to the Admin menu and click Metrics from the left management menu to display all the metric profiles available. You can search for a specific metric from the search box on the page. After finding the desired template, click the edit link the Metric Properties column UPDATE METRIC MEMBERS Available on the general tab of metric templates, is the Update Options section: Update template only: Changes to the metric template alone will only apply to hosts added in the future. Update selected hosts Update any changes made to the metric template on all selected hosts. Update all hosts Update any changes made to the metric template on all hosts that are currently being monitored. Note: The metric name will stay unique on every host. 99

100 Chapter 6: Metrics 100 DISPLAYING A LIST OF HOSTS WITH A SPECIFIC METRIC To view all hosts that are associated with a Metric Profile, either click on the name of the metric in the metrics page, or click on the number in the Number of Hosts column. METRIC SEARCH OPTIONS To locate a specific Metric Profile, you can use the Search Box at the top of the page, or display by Metric Type from the drop-down menu. 1. Search Metric - Search for a Metric Profile name. You may enter partial keywords to find your desired metric. Search also be used by using the Metric Type drop down menu to locate a specific metric by category. 2. Search Member - Search for metrics which has been assigned to Hosts. Selecting Member and entering a partial name of the metric, will display the associated metrics and Hosts. From those search results, you can perform tasks such as Enable, Disable, or Delete. 100

101 Chapter 6: Metrics 101 EDIT A HOST-ASSOCIATED METRIC There are 2 methods to access a Metric that is assigned to a host: 1. Directly from Host From the Hosts menu, choose the desired host and scroll to the Associated Metrics table and click on the Metric name. 2. Metric Profile host list From the Metric Profile, click on the Metric name to display all hosts that are using this metric. Click Edit and you will be taken to the Metric Definition screen for this Metric on the Host. Note: you cannot change the Host name from this screen. Save as a Template - Before saving this Metric you can create a Metric Profile from the specified settings and then associate the template with new or existing hosts. At the bottom left of page, across from the Save button, you will see Save as template. Mark the checkbox and click Save. This will create a new Template with the name of the Metric. 101

102 Chapter 6: Metrics 102 APPLYING A METRIC PROFILE TO MULTIPLE HOSTS OR HOSTS GROUPS Adding a Metric to a host was covered in Chapter 2: Administering Hosts. Follow these directions to add a Metric to one host, several hosts, or to host groups. Admin Menu Management Metrics From the Metric Definition screen, select the Host(s) in the Host Members list. Additionally, you may apply the metric to Host Groups by selecting the groups from the Host Groups list. 102

103

104 Chapter 7: Contacts and Contact Groups 104 Chapter 7: Contacts and Contact Groups CREATING A NEW CONTACT A contact definition is used to identify persons who should be contacted when a problem occur. 1. Contact Name Short name used to identify the contact. It is referenced in contact group definitions. 2. Contact Alias long name or description for the contact. The $CONTACTALIAS$ macro will contain this value. 3. Enable / Disable Contact Define the active state of a contact. 4. Contact Groups Assigned contact groups for the specific contact 5. Contact address. Mandatory to receive notifications. 6. Phone Number Contact phone number. Mandatory to receive text-message notifications. 7. User password Contact password. Also, can be automatically generated by pressing the "Generate" button. 104

105 Chapter 7: Contacts and Contact Groups 105 HOST NOTIFICATIONS 1. Host Notification Period Time-period during which the contact can be notified about host problems or recoveries. 2. Host Notification Options - Host states for which notifications can be sent out to this contact. Valid options are a combination of one or more of the following: Recovered, Unreachable, and Down. 3. Host notification commands: List of commands used to notify the contact of a host problem or recovery. Multiple notification commands can be selected by holding down the Ctrl or Shift key while selecting the commands. All notification commands are executed when the contact needs to be notified. METRIC NOTIFICATIONS 1. Metric Notification Period Time-period during which the contact can be notified about metric problems or recoveries. 2. Metric notification options States the notifications to be sent out to this contact. Valid options are a combination of one or more of the following: Recovered, Critical, Warning, and Unknown 3. Metric notification commands - List of commands used to notify the contact of a metric problem or recovery. Multiple notification commands can be selected by holding down the Ctrl or Shift key 105

106 Chapter 7: Contacts and Contact Groups 106 while selecting the commands. All notification commands are executed when the contact needs to be notified. USER SETTINGS The address for the contact. Depending on how you configure your notification commands, it can be used to send out an alert to the contact. The $CONTACT $ macro will contain this value. 2. Phone - Phone number for the contact. Depending on how you configure your notification commands, it can be used to send out an alert page to the contact. The $CONTACTPAGER$ macro will contain this value. 3. User Password - Password for the user to login to Centerity Monitor. The password is encrypted by default but you can generate a password for the user by clicking the Generate button. The password will be displayed until you click Save. Note: After you save the contact, the password is encrypted and not available for viewing in Centerity Monitor web. CONTACT PERMISSIONS Centerity Monitor allows to manage user permissions and control which information and commands users can access. User permissions can be set to view only a specific metrics or hosts by removing all permissions listed below (only allowing the user Web Login). 106

107 Chapter 7: Contacts and Contact Groups Web Login Determines if user can access the Monitor Console, Dashboard, reports, etc. 2. Web administration: 2.1. Administration: Grant user permissions to be administrator and have full access to system configuration, management and resources Limited: Grant user limited permissions Group Admin: Grant user permissions to manage all hosts relevant to their contact group. Note: If you disable user permissions for all host / system information, the user will not be able to view the dashboard, and this feature will be removed from the menu. 3. Authorized for all hosts - Set user permissions to view status and configuration information for all hosts. Users in this list are also automatically authorized to view information for all metrics. 4. Authorized for all host commands - Set user permissions to issue commands for all hosts via the command. Users in this list are also automatically authorized to issue commands for all metrics. 5. Authorized for system information - Set user permissions to view system/process information in the extended information. 6. Authorized for configuration information - Set user permissions to view configuration information in the configuration. Users in this list can view information on all configured hosts, host groups, metrics, contacts, contact groups, time periods, and commands. 7. Authorized for API: Allow contact to execute API commands. API token is listed below. 8. Authorized for topology commands: Allow user to execute topology discoveries. 9. Authorized for all metrics - Set user permissions to view status and configuration information for all metrics. Users in this list are not automatically authorized to view information for all hosts, but only the hosts under their contact group. 107

108 Chapter 7: Contacts and Contact Groups Authorized for all metric commands - Set user permissions to issue commands for all metrics via the command. Users in this list are not automatically authorized to issue commands for all hosts and not automatically authorized to view status or configuration information for all hosts. 11. Authorized for system commands - Set user permissions to issue system/process commands via the command. 12. Hide sensitive information - Remove Check command data and arguments from this user. If you are storing clear text passwords in the Arguments field in Metric Profiles this will encrypt the data in the standard Monitor views. Note: Sensitive information will not be hidden in the admin menu. 13. Can view topology maps: Allow user to view Topology map results. CREATING A NEW CONTACT GROUP Admin Menu Management Users Contact Groups A contact group definition is used to group one or more contacts together for the purpose of sending out alert/recovery notifications. When a host or metric has a problem or recovers, Centerity Monitor will find the appropriate contact groups to send notifications to, and notify all contacts in those groups. 1. Contact group name - Short name used to identify the contact group. 2. Alias - long name or description used to identify the contact group. 108

109 Chapter 7: Contacts and Contact Groups Contact Members - List of the short names of contacts that should be included in this group. Hold down the Shift or Ctrl key to select more than one name. 4. Add to all host groups Add the Contact Group to all Host Groups. 5. Add to all metrics - Add the Contact Group to all Metrics. Note: This does not add the contact group to a Metric Profile. You need to assign the group manually to the Metric Profile as described in Chapter 3 Metric Profiles. ADDING A CONTACT GROUP TO A HOST GROUP To get alerts for a host a contact group that should be notified need to be set. To add new contact group to a specific host group, go to the Host Group section from the main Admin screen and choose the desired Host Group. Then select the new contact group and click the Save button. 1. To give the contact group permissions check the Add Contact groups to all Hosts and metrics under the selected Host group. 2. To remove permissions from the selected host groups, check Remove Contact groups from all Metrics. The host group permissions affect Monitor view for the users in the selected contact group. Note: This only affects users who are not administrators. Administrators can see all the hosts. 109

110 Chapter 7: Contacts and Contact Groups 110 ADD A CONTACT GROUP TO A BUSINESS SERVICE ADD A CONTACT GROUP TO A METRIC MEMBER 110

111 Chapter 8: Plug-ins, Templates and Metric Profiles 111 Chapter 8: Plug-ins, Templates and Metric Profiles OVERVIEW Centerity Monitor provides a flexible way to add new monitoring metrics (KPI) using the Plug-ins and Templates mechanism. By harnessing external APIs such as WMI, SNMP, Web services etc., you can query the status, performance, and availability of almost all hardware devices, operating systems, and applications. Centerity Monitor relies on external programs - called plug-ins, to check a metric or host that is being monitored. This method delivers very high performance and more flexibility on user side. The plug-in generate action to perform the check and then simply returns the results to Centerity Monitor. Centerity Monitor will process the received results from the Plug-in and generate any necessary actions (running event handlers, sending out notifications, etc.). The correlation between plug-ins and Metric checks is simple. When Centerity Monitor needs to check the status of a defined metric, it will execute the plug-in specified in the Metric Check Command, and use the arguments of the Metric Definition. The plug-in will check the status of the metric or resource specify and return the results to Centerity Monitor. Plug-ins are compiled executable or scripts (Perl, shell, etc.) that can be run from a command line to check the status of a host or metric. Centerity Monitor uses the results from plug-ins to determine the status of hosts and metrics on your infrastructure. 111

112 Chapter 8: Plug-ins, Templates and Metric Profiles 112 MANAGING PLUG-INS Admin Menu Utilities Plug-ins Add Centerity Monitor allows managing plug-ins from a simple web interface. It is simple to view and edit plug-in information, execute the checks online, view plug-in help, and much more. From the Admin menu, under the Utilities section, choose Plug-ins. The page will display the Plug-ins installed and available on the system. ADDING A NEW PLUG-IN Click the Add button in the top right of the page. New Plug In page will be displayed. There are three ways to upload new plug-ins: 1. Scan Directory Upload via FTP or sftp the new plug-in and click the Scan Directory button. This will detect new plug-ins available in the directory. For new plug-ins, the checkbox on the right is clickable. Mark new plug-in and click Save in order to save the new Plug-ins to the database. 2. Upload Local Plug-in Select a plug-in from your local computer and click Upload to send the plugin to Centerity Monitor and update the database. 3. Remote server file browser Upload the plug-in to your home directory and use this option to browse the file system remotely to find the new plug-in. 112

113 Chapter 8: Plug-ins, Templates and Metric Profiles 113 PLUG-IN INFORMATION SCREEN 1. Scan Directory Scans the /nagios/libexec directory and allows plugin addition directly from that folder. 2. Plug-in Name - Short name of the plug-in. If it was chosen to upload the file and not use the automatic directory scan, this will become the plug-in name. 3. Plug-in Description - A long description of the plug-in. 4. Plug-in Type Select category for the selected plug-in. This is informational data only, but it allows you to be more efficient in your Plug-ins management. 5. File Location Click on the link to open or save the plug-in to your local computer for editing. 6. Comments any other relevant information related to the Plug-in. A command definition defines commands for Metric checks, Metric notifications, Metric event handlers, host checks, host notifications, and host event handlers. Command definitions can contain macros, but it is most important to make sure that it includes only those macros that are "valid" for the circumstances when the command will be used in Centerity Monitor. 113

114 Chapter 8: Plug-ins, Templates and Metric Profiles 114 COMMAND TEMPLATES Command Templates are accessed from the Admin Menu, under Templates Commands. Admin Menu Templates Commands There are three different Command Templates used in standard operations: 1. Host Check Command These are instructions for Centerity Monitor to run on every host check occurs. Usually host checks are not run in regular intervals, only when one or more problems or state changes from OK to any other state. This Host command is bound to the host itself and can be defined in the Host Template or in the Host settings. 2. Metric Check Command Metric check command is used in every Metric Profile assigned to a host, and it performs operations as defined. The information returned by the check command to Centerity Monitor is interpreted and analyzed, and spawns different actions which are eventually displayed in the Monitor Console. 3. Notification Commands Notification commands are used to notify the contact of a problem or recovery. All notification commands are executed when the contact needs to be notified, per definitions. The maximum amount of time that a notification command can run is controlled by the notification timeout option. 114

115 Chapter 8: Plug-ins, Templates and Metric Profiles 115 CREATING HOST /METRIC CHECK COMMANDS Admin Menu Templates Commands Host / Metric Add To create Metric command definition to use in Host definition or in the Metric Profile choose Commands under Templates in the Admin menu and choose either Host Command or Metric Command. A list of all available commands for Hosts and Metrics will appear. It is possible to either locate a command and duplicate it, or create a new command definitions. To create a new Command, click the Add button at the top right corner of the page. 115

116 Chapter 8: Plug-ins, Templates and Metric Profiles Host / Metric Command Name Short command name that will be used by the monitor. It will also be displayed under the Metric Profile. Choose a short name that will enable you to locate the command quickly. 2. Description A Long meaningful description. This is informational data only and does not affect the monitoring process. 3. Metric Type Choose a category that fits the command to aid in batch operations or to display the commands by categories. 4. Select Plug-ins The plug-in used by the Host or Metric command which will be executed with the arguments passed by the monitor server. 5. Command Definitions - Arguments that will be passed to the plug-in. For example, if the plug-in gets parameters such as H <ipaddress> -w <warning> -c <critical> you can specify here the exact settings such as H w 80% -c 90%, and these settings will be passed to the plug-in by default. It is also recommended to use macros (see Appendix A: Macros), and not hard-coded parameters. For example, in order use the host address, use $HOSTADDRESS$, for warning $ARG1$, and for critical $ARG2$.This will be taken from the arguments of the Metric. 6. Command Example Informational data only which does not affect the monitor. 7. Command Default Values Informational settings that will be applied to the Metric Profile Arguments and will provide a display on how the command should be defined with a macro separator. 8. Comments Any other relevant information. When using macros in the Command Definitions field such as: $ARG1$ and $ARG2$ note that the separator between them is the! sign. Note: Click the Plug-in Help button to find out which command switches available for the current plug-in 116

117 Chapter 8: Plug-ins, Templates and Metric Profiles 117 WORKING WITH COMMANDS There are three types of commands: 1. Vanilla Command - The command name is the name of a command that was previously defined. 2. Command w/ Arguments Same as "vanilla" command style, but with command options separated by a! character. Arguments are separated from the command name (and other arguments) with the! character. The command should be defined to make use of the $ARGx$ macros. Note: Centerity Monitor will handle a maximum of sixteen command line arguments ($ARG1$ through $ARG16$). 3. "Raw" Command Line - An actual command line to be executed. To do so the syntax must enclose the entire command line in double quotes. CREATING NOTIFICATION TEMPLATES Notification commands are very similar to the Standard Check commands but due to flexible enhancements, the notification field allows to enter a raw command in the definition. Example Send Mail alert for user: /usr/local/nagios/tools/centerity _send -f -t $CONTACT $ -u "$HOSTALIAS$ - $HOSTNAME$" -s m "Notification: $NOTIFICATIONTYPE$\r\n \r\nhost: $HOSTALIAS$\r\nAddress: $HOSTADDRESS$\r\nAddress: $HOSTADDRESS$\r\nState: $$HOSTSTATE$\r\nAdditional Info: $OUTPUT$\r\nDate/Time: $DATETIME$\r\n\n*** Message generated by Centerity Monitor ***\r\n\n" -cr host -ch $HOSTNAME$ 117

118 Chapter 8: Plug-ins, Templates and Metric Profiles 118 Notification commands are assigned directly to contacts and used to notify the contact of a problem or recovery. Multiple notification commands should be separated by commas. All notification commands are executed when the contact needs to be notified. ASSIGNING A CHECK COMMAND TO A METRIC PROFILE Once defining a Metric command, it needs to be assigned to a new Metric Profile or to an existing host. Add or edit the template as described in Chapter 3: Metric Profiles. Open the Command Properties section and select the Metric Check Command for your newly added template. Apply the new arguments as necessary. This option is also available to an existing Associated Metric under Host in the Hosts Menu. Note: For convenience purposes, selecting a new check command replaces the content of the Arguments to fit the current argument format for the Check Command Template. 118

119 Chapter 9: Maps 119 Chapter 9: Maps OVERVIEW A network diagram is always important to visualize problems in your network. Centerity Monitor provides 4 types of maps 1. Hyper Map 2. Topology map 3. Live Network map The Hyper Map, Air View and Topology map will be created automatically based on hierarchy definition ant parent-child relationship. VISUAL LAYOUTS - HYPERMAP The Hyper map provides dynamic and interactive network layout. Each Host-Group automatically creates a Hyper-Map. The hyper map provides real-time indication about problems with the metrics in every host or host group. In case of new event, the host background color in the hyper map will present the status (yellow - warning, orange - unknown, red - critical). 119

120 Chapter 9: Maps 120 VISUAL LAYOUTS - TOPOLOGY MAP The Topology Map represents the result of the Topology scan. 120

121 Chapter 9: Maps 121 VISUAL REAL-TIME LAYOUTS Centerity Visual Live Layouts Module provide fast and easy way to create verity of live layout such as geographical maps, business processes (BPM), Network chart etc. The live layout presents the status of each component including hosts, metrics (services), host groups and business services. Creating New Layout Admin Menu Maps press "+" to add new layout 1. From the admin menu bar select Map Map Designer Build Layout Save Enable Map 2. Press on the Add button (right top corner) to open a new map builder. Fill in the new layout name and Click "OK" 121

122 Chapter 9: Maps Layout designing Centerity allows easy drag & drop process with verity of built-in icons and options to design advanced layouts. Each icon can represent one of the following objects in the system: 3.1. Host The system will present the host status as following: Host up with no warning only the icon Host Down Red Halo around the icon Host with one or more metrics in critical state red Halo with a Metric icon Host with one or more metrics in warning state Yellow Halo Host with one or more metrics in Unknown state Orange Halo 3.2. Host Group The system will present the host Group status as following: Host Group with no warning Clear icon with no halo Host Group with one or more hosts in down Red Halo around the icon Host Group with one or more metrics in critical state red Halo with a Metric icon 122

123 Chapter 9: Maps Host Group with one or more metrics in warning state Yellow Halo Host Group with one or more metrics in Unknown state Orange Halo 3.3. Metric - The system will present the host status as following: Metric in OK state only icon or green led Metric in critical state red Halo / Red led Metric in warning state Yellow Halo / Yellow Led Metric in Unknown state Orange Halo / Orange Led 3.4. Business Service The system will present the BSM percentage availability. 4. To add a new object to the layout, drag the selected icon from the left menu pane to the stencil and drop it. Double clicking on the icon will open the object properties window: 123

124 Chapter 9: Maps To add line-connection between two objects use the connector button drag the curser from one object to the other. Double clicking on the line will open advanced properties for the line status. 6. Saving new layout Click on the disk icon to save the new layout. 7. Enabling new layout - To enable / disable map, mark the checkbox and press the enable button on the screen top right corner. ADVANCED DESIGNER SETTINGS Centerity live layout module allows advanced designing settings Click on the "designer settings" button on the top right of the screen.

125 Chapter 9: Maps 125 The designer settings screen includes several options as follows: 1.1. Map Resolution - Define the layout resolution Background Selected background for the layout (any PNG / GIF file from the media manager can be selected as background) 1.3. Grid enable / disable grid lines Auto save define auto save. Note: Auto save will save automatically the latest version with no Redo option. 125

126 Chapter 9: Maps 126 VISUAL LIVE LAYOUTS MODULE VIEWS & SLIDE SHOWS The live layouts module allows defining automatic slide show of multiple selected layouts. Admin Menu - Maps Maps View "+" (Add New) Insert view properties Select members (2nd tab) Click OK to save 1. Select "Map Views" tab in the admin section 2. Click the Add-View button on the top right corner 3. On that screen, there are 2 tabs: "Views Settings" and "Views Members" 3.1. in the views settings tab fill in the information as following: View Name slide show name View description slide show description Slides Interval the time intervals between layouts Refresh Interval the refresh time intervals Map Title display the map title. 126

127 Chapter 9: Maps In the "Views Members" tab: Select the layouts that will appear in the slide show by checking the checkbox near the selected layout Click ok to save. 127

128 Chapter 10: Host & Metrics Dependencies 128 Chapter 10: Host & Metrics Dependencies HOST DEPENDENCIES Configuring New Host Dependencies: Admin Menu - Host Dependencies Tab Press "+" icon Select Dependencies Select Failure Criteria & Save Install Policy Click on the + icon. 1. Select Dependent hosts from the left column showing all available hosts. 2. Select their failure criteria up/down/unreachable. 3. Click "Ok". 128

129 Chapter 10: Host & Metrics Dependencies 129 Removing Host Dependencies: 1. Select the host you want to remove in the checkbox. 2. Click on the X button and click "Ok" to confirm. METRIC DEPENDENCIES Admin Menu - Hosts MetricsTab - Select Metric Dependencies Tab - Click "+" Select Dependencies Select Failure Criteria & Save Install Policy 129

130 Chapter 10: Host & Metrics Dependencies 130 Adding New Metric Dependencies: Adding Metric Dependencies: Click on the + icon. 1. Click on the + icon 2. Select Dependent metric from the left column showing all available metrics. 3. Select their execution failure criteria Ok/Warning/Unknown/Critical. 4. Select their notification failure criteria Ok/Warning/Unknown/Critical. 5. Click "Ok". Removing Metric Dependencies: 1. Select the metric you want to remove in the checkbox. 2. Click on the X button and click "Ok" to confirm. 130

131 Chapter 10: Host & Metrics Dependencies 131 Viewing and managing all dependent hosts and metrics from settings menu. Managing host dependencies: Description: The host dependency description. Host Name: The host name. Dependent Host Name: The dependent host name. Notifications failure criteria: The host status on which the dependent host will fail, and will not send 131

132 Chapter 10: Host & Metrics Dependencies 132 notifications to users. Comments: Admin comments. Managing metric dependencies: Description: The Metric dependency description. Host Name: The host name of the service. Metric Description: The dependency description. Dependent Host Name: The dependent host name. Dependent Metric Description: The dependent metric name and description. Execution Failure Criteria: The host status, on which the dependent Metric will fail, will not continue checking the dependent Metric and will not send notifications about the Metric status. Notifications failure criteria: The host status on which the dependent Metric will fail, and will not send notifications to users. Comments: Admin comments. 132

133 Chapter 11: Escalation 133 Chapter 11: Escalation Centerity Monitor provides powerful solution for host and Metric notifications. 1. Host escalations - escalate host events (up, unknown and down states.) 2. Host group escalations - handle multiple host escalations. 3. Metric escalations - escalate all Metric events ok, warning, critical and unknown states. HOST ESCALATIONS 1. Under the Users tab in the admin section of the system click on "Escalations" and then click Hosts : 2. In the host escalations screen click on the "+" button. 3. Complete all fields in the following order: Description: The escalation description.

134 Chapter 11: Escalation Host Name: The escalated host First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). Note: In the screenshot above, the notification will be escalate after 3 notifications to the first level escalations. The escalation will be sent 5 times to the escalation group every 10 minutes. If by then, the event isn t solved it ll send notifications to the first group again, etc. 4. Go to the escalated host, click the Advanced tab: 5. Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). 134

135 Chapter 11: Escalation 135 METRIC ESCALATIONS 1. Under the Users tab in the admin section of the system click on "Escalations" and then click Metrics : 2. In the metric escalations screen click on the "+" button. 3. In the following screen fill in all the fields in the following order: 135

136 Chapter 11: Escalation Description: The escalation description Host Name: The host to choose the escalated Metric from Dependent Metric: The escalated Metric First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). Note: In the screenshot above, the notification will be escalate after 3 notifications are sent to the first level escalations, the escalation will be sent once to the escalation group and will stop after that. 4. Go to the escalated metric, click the commands tab: 5. Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). 136

137 Chapter 12: Settings 137 Chapter 12: Settings OVERVIEW Centerity s Settings menu provides wide range of general settings for different personal preferences and maximum, performance. GENERAL TAB General Setting 1. Admin - This is the address for the administrator of the local machine. 2. Admin Pager - This is the pager number (or pager gateway) for the administrator of the local machine. 3. Date Format - This option allows you to specify what kind of date/time format Centerity should use in the web interface and date/time macros. 4. Select Timezone This option allows you to change timezone. 5. Passive Metric Check Acceptance - This option determines whether Monitor Server will accept passive metric checks when it initially (re)starts. 6. Notifications Option - This option determines whether Centerity will send out notifications when it initially (re)starts. 7. Top Menu Logo - Select which logo you want to display on top menu. 137

138 Chapter 12: Settings 138 Event Handlers 1. Enable Event Handlers - This option determines whether Centerity will enable event handlers. 2. Global Host Event Handler - This option allows you to specify a host event handler command that is to be run for every host state change. 3. Global Metric Event Handler - This option allows you to specify a metric event handler command that is to be run for every metric state change. Data Handling 1. Soft State Dependencies - This option determines whether Centerity will use soft Metric state information when checking Metric dependencies. 2. Process Performance Data - This value determines whether Centerity will process host and Metric check performance data. Status Note: Disabling this option eliminates graph creation 1. Retain State Information - This option determines whether Centerity Monitor will retain state information for hosts and metrics between program restarts. 2. Retention Update Interval - This setting determines how often (in minutes) that Centerity Monitor will automatically save retention data during normal operation. 3. Use Retained Program State - This setting determines whether Centerity Monitor will set various program-wide state variables based on the values saved in the retention file. 4. Use Retained Scheduling Info - This setting determines whether Centerity Monitor will retain scheduling info (next check times) for hosts and metrics when it restarts. 5. Aggressive Host Checking - Centerity Monitor tries to be smart about how and when it checks the status of hosts. 6. Parent-Child mode: Enable/Disable parent child relationships between two separate nodes. WEB SETTINGS TAB 1. Screen Refresh Rate - This option allows you to specify the number of seconds between page refreshes for the status, status map, and extinfo CGIs. 2. Dashboard Refresh Rate - This option allows you to specify the number of seconds to refresh the Dashboard. 3. Password Complexity: Enable/Disable password complexity and define all the required settings. 4. Online Command Remote Mode: Enable/Disable the ability to execute test commands directly from the node. Map Settings 1. Dashboard Map A - This option allows you to specify the default dashboard map A. 2. Dashboard Map B - This option allows you to specify the default dashboard map B. 138

139 Chapter 12: Settings 139 Sound Settings 1. Host Unreachable Sound - Play audio file when Host is unreachable. 2. Host Down Sound - Play audio file when Host is down. 3. Metric Critical Sound - Play audio file when Metric is in critical state. 4. Metric Warning Sound - Play audio file when Metric is in warning state. 5. Metric Unknown Sound - Play audio file when metric is in unknown state. 6. Normal Sound - Play audio file when state is ok. Web Admin Settings Rows per Admin Page - The number of rows to display on a single page in admin tab. Rows per Monitor Page - The number of rows to display on a single page in monitor tab. Persistent Tabs - Remember Last tab selected. Hyper Map Mode Choose between a full map view and a view of Host groups & Subgroups. Group Admin Node Access: Enables/Disables group admin node accessibility. When disabled the group admin will be able to access all nodes. When enabled the access will be limited according to permissions. STATUS SETTINGS TAB Host & Metric Checks 1. Check External Commands - This option determines whether or not Centerity Monitor will check the command file for internal commands it should execute. 2. External Command Check Interval - Determines how often Centerity Monitor checks commands submitted. (I.e. from web, Passive Checks) 3. Check for Orphaned Metrics - This option allows you to enable or disable checks for orphaned metric checks. Timing 1. Inter Check Sleep Time - Number of seconds that Centerity Monitor will sleep before checking to see if the next Metric check in the scheduling queue should be executed. 2. Inter Check Delay Method - This option allows you to control how Metric checks are initially "spread out" in the event queue. 3. Metric Interleave Factor - This variable determines how Metric checks are interleaved. Interleaving allows for a more even distribution of Metric checks, reduced load on remote hosts, and faster overall detection of host problems. 4. Maximum Concurrent Checks - This option allows you to specify the maximum number of Metric checks that can be run in parallel at any given time. Specifying a value of 1 for this variable essentially prevents any metric checks from being parallelized. 5. Metric Reaper Frequency - This option allows you to control the frequency in seconds of metric "reaper" events. "Reaper" events process the results from parallelized metric checks that have finished executing. 139

140 Chapter 12: Settings 140 Timeouts 1. Interval Length - This is the number of seconds per "unit interval" used for timing in the scheduling queue, re-notifications, etc. "Units intervals" are used in the host configuration file to determine how often to run a metric check, how often of re-notify a contact, etc. 2. Metric Check Timeout - This is the maximum number of seconds that Centerity Monitor will allow metric checks to run. If checks exceed this limit, they are killed and a CRITICAL state is returned. A timeout error will also be logged. 3. Host Check Timeout - This is the maximum number of seconds that Centerity Monitor will allow host checks to run. If checks exceed this limit, they are killed and a CRITICAL state is returned and the host will be assumed to be DOWN 4. Event Handler Timeout - This is the maximum number of seconds that Centerity Monitor will allow event handlers to be run. If an event handler exceeds this time limit it will be killed and a warning will be logged. 5. Notification Timeout - This is the maximum number of seconds that Centerity Monitor will allow notification commands to be run. If a notification command exceeds this time limit it will be killed and a warning will be logged. 6. Aggregate Status Updates - This option determines whether or not Centerity Monitor will aggregate updates of host, metric, and program status data. If you do not enable this option, status data is updated every time a host or metric checks occurs. 7. Aggregated Status Update Interval - This setting determines how often (in seconds) that Centerity Monitor will update status data in the status file. The minimum update interval is five seconds. LOGGING TAB General Settings 1. Log Rotation Method - This is the rotation method that you would like Centerity Monitor to use for your log file. 2. Use SYSLOG - This variable determines whether messages are logged to the SYSLOG facility on your local host. Retry Loggings 1. Log Notifications - This variable determines whether or not notification messages are logged. 2. Log Host Retries - This variable determines whether or not host check retries are logged. 3. Log Metric Retries - This variable determines whether or not metric check retries are logged. Metric check retries occur when a metric check results in a non-ok state. 4. Log Event Handlers - This variable determines whether or not metric and host event handlers are logged. Event handlers are optional commands that can be run whenever a metric or hosts changes state. State Logging 1. Log Initial States This variable determines whether or not Centerity Monitor will force all initial host and metric states to be logged. 140

141 Chapter 12: Settings Log External Commands - This variable determines whether or not Centerity Monitor will log external commands that it receives from the external command file. 3. Log Passive Metric Checks - This variable determines whether or not Centerity Monitor will log passive host and metric checks that it receives from the external command file. Mail Settings These are the mail settings used to send out reports. 1. SMTP User Name: Represent s username account, 2. SMTP User Password: Represent s password account. 3. SMTP Server: Represents server address. 4. SMTP Alias Name: The that the will appear to be sent from. 5. SMTP TLS: Represents the use of TLS protocol. The following are optional parameters: o o SMTP Alias Name SMTP TLS OTHER SETTINGS TAB OSCP Commands 1. Obsess Over Metrics - This value determines whether or not Centerity Monitor will "obsess" over metric checks results and run the obsessive compulsive metric processor command you define. 2. Obsessive Compulsive Metric Processor Command - This option allows you to specify a command to be run after every metric check, which can be useful in distributed monitoring. This command is executed after any event handler or notification commands. 3. Obsessive Compulsive Metric Processor Timeout - This is the maximum number of seconds that Centerity Monitor will allow an obsessive compulsive metric processor command to be run. 4. Performance Data Processor Command Timeout - This is the maximum number of seconds that Centerity Monitor will allow a host performance data processor command or metric performance data processor command to be run. Flap Detection 1. Enable Flap Detection - This option determines whether or not Centerity Monitor will try and detect hosts and metrics that are "flapping". Flapping occurs when a host or metric changes between states too frequently, resulting in a barrage of notifications being sent out. 141

142 Chapter 12: Settings Low Metric Flap Threshold - This option is used to set the low threshold for detection of metric flapping. 3. High Metric Flap Threshold - This option is used to set the high threshold for detection of metric flapping. 4. Low Host Flap Threshold - This option is used to set the low threshold for detection of host flapping. 5. High Host Flap Threshold - This option is used to set the high threshold for detection of host flapping. Freshness 1. Check Metric Freshness - This option determines whether or not Centerity Monitor will periodically check the "freshness" of metric checks. 2. Metric Freshness Check Interval - This setting determines how often (in seconds) Centerity Monitor will periodically check the "freshness" of metric check results. SNMP Settings 1. Reset SNMP State - This option determines whether or not Policy Manager will reset all SNMP TRAPS metrics to status ok. Enable this function if you don't use retention state. SYSLOG Settings 1. Reset SYSLOG State - This option determines whether or not Policy Manager will reset all syslog metrics to status ok. Enable this function if you don't use retention state. 2. Syslog Database: Defines whether syslog is written to the database or not. Data Settings 1. Remove RRD data files - This option determines whether or not rrd data file will be removed upon metric deletion. Note: If you choose not to enable file deletion and you add the metric again, new data will be appended to the file. 2. History Data - This option determines whether or not history stored data will be removed. Select a period of time to keep historical data RESOURCE SETTINGS TAB This setting screen allows adding user-names and passwords for monitored hosts and metrics. All fields from $USER6$ are available. For secured credentials use fields $USER14$ - $USER$32 which hide the credentials text. 142

143 Chapter 12: Settings 143 CENTRAL TAB General Settings 1. Server name - Centerity Monitor distributed node name. 2. Enable cluster mode - Activate Centerity Monitor enterprise edition in cluster mode. Note: Requires proper license Note: This feature require valid license in order to activate the monitor server in distributed environment with Centerity Monitor Enterprise edition. Please contact support team support@centerity.com for additional information. 3. Centerity Monitor Central Servers - Enter IP address or fully qualified domain name of Centerity Monitor enterprise console. Note: Multiple IPs can be specified and separated by comma. 4. Customized Logo: Upload a logo via media manager. Security Settings 1. User Name: Enter username variable determines whether or not notification messages are logged. 2. Password: This variable determines whether or not Centerity Monitor will log passive host and metric checks that it receives from the external command file. 3. Shared Secret: This variable determines whether or not Centerity Monitor will log passive host and metric checks that it receives from the external command file. 4. SSL Mode: Enable/Disable SSL mode. Note: Consult Centerity support before change. 5. Type: Activate Centerity Monitor Push / Pull distributed mode enviroment. Note: Consult Centerity support before change. Administration Settings 1. Limit Node Host and Metrics Global Count: Globally limit all nodes to a certain amount of hosts / metrics. 2. Add / Wizard distributed node selection: Prioritize default node to add new hosts to. 3. Use Central Monitoring Server: 4. Use Local Graphs: 5. Use Local Information: Install Policy Settings 1. Parallel Install Policy: Run Install policy on several nodes Simultaneously. 143

144 Chapter 12: Settings 144 AUTHENTICATION SETTINGS TAB Local Authentication: Authentication via MySQL database. Active Directory Authentication: Authentication via Active Directory server, requires filling out active directory configuration settings. SYSTEM SETTINGS TAB Centerity Monitor allows you to manage the system without the need of any prior Linux knowledge. The system tab allows you to perform actions to the Centerity Server. 1. Start Monitor Server: Restarts the monitor server and the associated processes. 2. Stop Monitor Server: Stop the monitor server entirely. 3. Restart Monitor Server: Restarts the monitor server. 144

145 Chapter 12: Settings 145 CATEGORIES Manage the host categories for your monitor. 1. Name The category name. 2. Description The category description. 3. Comments Category comments. 4. Image A logo for the category. 5. Inventory Adds the category to a type of inventory scan. 6. Applet How to connect to the server in the monitor mode. 145

146 Chapter 12: Settings 146 IMPORT / EXPORT Through this tab you can import and export settings such as host profiles, database settings etc. Export: 146

147 Chapter 12: Settings Analyzers: Exports Graph analyzers: a. Single Analyzer: Allows export of a single analyzer. b. Multiple Analyzers: Allows selection of preferred analyzers. c. Output XML to Browser: Exports an XML output: d. Save file locally: exports a CSP file to local computer Graphs: Exports graphs + attached analyzers.

148 Chapter 12: Settings 148 a. Single Graph: Allows export of a single analyzer. b. Multiple Graphs: Allows selection of preferred analyzers. c. Output XML to Browser: Exports an XML output: d. Save file locally: exports a CSP file to local computer. 3. Host Information: Allows export of all host information on the Monitor: host name, alias, address, host template, parents. 148

149 Chapter 12: Settings 149 a. Output to the Browser: Exports a table of hosts: b. Save file locally: exports an EXCEL file to local computer. 4. Host Profile: Allows export of a host profile, including metrics and plugins. a. Output to the Browser: Exports an XML output: 149

150 Chapter 12: Settings 150 b. Save file locally: exports a CSP file to local computer. 5. Centerity Solution Pack: Allows export of metrics including plugins. a. Output to the Browser: Exports an XML output: 150

151 Chapter 12: Settings 151 b. Save file locally: exports a CSP file to local computer. 6. Complete Database: Allows export of complete database settings. a. Output to the Browser: Exports an XML output. b. Save file locally: exports a DB file to local computer. 151

152 Chapter 12: Settings 152 Import: 1. Analyzers: Import Graph analyzers. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 2. Graphs: Import graphs + attached analyzers. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 3. Host Information: Import Host Information. a. Upload File: Allows import from EXCEL file. b. Paste data into browser: Allows pasting of Host Lists. 4. Host Profile: Allows import of a host profile, including metrics and plugins. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 5. Centerity Solution Pack: Allows import of metrics including plugins. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 6. Complete Database: Allows import of complete database settings. a. Upload File: Allows import from DB file. b. Paste data into browser: Allows pasting of XML data. Note: Complete Database import will erase your current configuration! 152

153 Chapter 12: Settings 153 MEDIA MANAGER Through this tab you can add images and sounds to be used in the system. Adding an Image file: Admin Menu Settings - Media Manager press "+" to add new image Fill out name, description and select file Select proper category Save 1. Host: Used as host icons (Recommended: 40x40 resolutions). 2. Metric: Used as metric icons (Recommended: 40x40 resolutions). 3. Background Map: Can be used as map background. 4. Misc. images: Can be added to maps as an icon (Recommended: 40x40 resolutions). 5. Logos: A logo that can be displayed along with the Centerity logo on top of the system. Adding Audio file: Audio files can be used as alert sounds. 153 Admin Menu Settings - Media Manager Select "Sounds" as media type press "+" to add new sound Fill out name, description and select file Save

154 Chapter 12: Settings

155 Chapter 13: System 155 Chapter 13: System OVERVIEW Centerity s System menu provides insight into system logs, a user audit log, the status of monitor servers and a task scheduler. MONITOR SERVERS The Monitor Servers view is available for Enterprise License users. This section provides the status of all monitoring nodes attached to the Enterprise manager. 1. Server Name: The given name of the node. 2. IP Address: The node IP-address. 3. Instance: The instance number of the node. When node is not an instance, this will be blank. 4. Start Time: Last recorded start time of the monitoring engine. 5. Running Time: Consistent running time of the monitoring engine. 6. Last Updated: Last recorder time of completed monitoring cycle. 7. Hosts: Number of hosts on the node. 8. Metrics: Number of metrics on the node. 9. Status: The node status, based on monitoring engine running time and state. LOGS All available logs for monitor servers. 155

156 Chapter 13: System 156 AUDIT LOG The audit log provides the ability to keep track of user activities and actions within the Centerity Monitor. 1. Username: User name that executed the action. 2. IP Address: IP Address from which the action was executed. 3. Interface: The name of the accessed page in the system. 4. Entity Name: The changed entity. For example: a user, a metric, a command, etc. 5. Entity ID: The ID of the entity that has been changed. For example: user id, command id, etc. 6. Action: The executed action. 7. Page Name: Represents the real page name (CGI) that was accessed / changed. 8. Time: Time range to display the logs for. 9. Parameters: This field is a free text search field. The system can match any partial word with a wildcard sign ( * ). For example, if a user is searching all entries that have the value WIN- in it, he will search for WIN*. 156

157 Chapter 13: System 157 TASK SCHEDULER The task scheduler can be used to schedule any action it can be an inventory scan, a script or a plugin that needs to be run on the monitor server without using crontab. Scheduling new event: 1. Click on the + sign to add a new schedule, and fill out the information on the general tab Name: Scheduler name Description: Scheduler description Category: Scheduler category Status: Enabled/Disabled Comments: Scheduler comments Task Details: Filled out automatically. 157

158 Chapter 13: System Settings: 3.1. Task run type: Select the desired task Select Task: Select from database: default, saved tasks Upload file: upload a script file Arguments: Additional arguments to the script/plugin Selected hosts: Host to execute the inventory/script/plugin on. 4. Triggers: 4.1. Time settings: Select time period hourly, daily, weekly, and monthly Select start time Select end time Select Timezone Task timeout: Select this option only if the task has to finish in a certain amount of time Scheduler settings: Choose how a task should be executed: wait for previous task to finish, run simultaneously etc. 158

159 Chapter 14: Graphs Configurations 159 Chapter 14: Graphs Configurations OVERVIEW Centerity Monitor provides powerful engine to produce verity of trends and time series data graphs. The value in these graphs differs from metric to metric and reflects the metric performance. For example: CPU Usage in percentage Interface Traffic in Megabytes Disk Space in Gigabytes Metrics availability by returned value 0 or 1 such as power supplies and fans. Performance and Availability graphs will be automatically generated by Centerity collector which runs the following tasks: 1. Analyzer - engine which captures the metric check output information and analyzing the output according to predefined regular expressions disassemble the string to numerical values. 2. DB controller push the information to RRD files which are later can be viewed as graphs and if specified also to create raw data in Database datastore. 3. Graph Creator- building specific graph from the data sources that were captured and pushed to database and assigning it to the metric. Mathematical functions and algorithms can be applied to specific graph such as calculation, division, summary and more. The mathematical functions uses HP RPN calculation format which all also described in appendix A. 159

160 Chapter 14: Graphs Configurations 160 GRAPH BUILDER METHODOLOGY In order to generate graph it is mandatory to define a metric. For this example the Metric Profile PING will be used (ping usually assigned to each host in order to measure Packet loss, Latency and availability). Monitor procedure 1. Centerity Monitor executes metric checks to remote host either using Agent or Agent less methods. 2. The Plugin return data to the server and the data is being displayed in the web console. Several rules may execute according to the system settings such as Notifications, Event Handlers, Retry checks etc. 3. The Centerity Analyzer receives the data from the metric check and match the regular expression database for the metric PING. In the example below there is a regular expression of two (2) values - Packet loss and RTA : PING.*?(\d+)%.+?([.\d]+)\sms Explanation: If the output of the metric is PING, than the first value will be applied to $1 is the first brackets and the second value applied to $2 will be the second bracket. The system allows to define any regular expression which available in programming languages such as C, PERL and more. 4. Graph settings allow you to visualize the data in your preferred display. Example Graph Result for metric: PING 160

161 Chapter 14: Graphs Configurations 161 Creating Analyzer Rules Analyzer settings allow flexible capture of data from the plugin output. To create or edit rules follow these steps: Admin Menu > Reports> Analyzer "+" (Add New) Insert template properties Save Install Policy 1. From the Admin menu Reports Graphs Analyzers 2. On the top right click + to add new analyzer 3. Set Template name and Template description.* 4. Select Template type in order to create search sorting more quickly from the main analyzer screen. 5. Paste the plugin output. For the PING Example paste the following data: PING OK - Packet loss = 0%, RTA = 0.05 ms 6. Presses analyze output to generate proper pattern match. NOTE: The analyzer produce pattern to match the rule of the plugin output. However, sometimes it requires some modifications such as removing characters like : or other nonalphanumeric special signs that can interfere the regular expression. For integer numbers the regular expression set the value (\d+) which mean capture complete number for number with fractions the regular expression is set to (\d+.?\d{0,}) which capture both numbers. Create Datasources depeding on how much (\d+) or (\d+.?\d{0,}) were found. 161

162 Chapter 14: Graphs Configurations Assign the capture entry while $1 represents the first entry, $2 the second etc. 8. Select the data source type. There are 4 available data sources: 8.1. GAUGE - Gauge data source represent values such as temperature, number of people in a room, CPU usage in percentage etc COUNTER - Counter is a data source that suitable for continuous incrementing counters such as the ifinoctets counter in a router. The COUNTER data source assumes that the counter never decreases, except when a counter overflows. The update function takes the overflow into account. The counter is stored as a per-second rate. When the counter overflows, RRDTool checks if the overflow happened at the 32bit or 64bit border and acts accordingly by adding an appropriate value to the result DERIVE - Derive data source used to store the derivative of the line sorting from the last to the current value of the data source. This can be useful for gauges. For example - to measure the number of people entering or leaving a room. Internally, derive works exactly like COUNTER but without overflow checks. So if your counter does not reset at 32 or 64 bit you might want to use DERIVE and combine it with a MIN value of ABSOLUTE - Absolute data source is suitable for counters which should be "reset" after the last value reading. This data-source should be used for fast counters which tend to overflow. Another usage is for counters such as number of messages since the last update. Note: It is recommended not to use special non-alphanumeric characters since the analyzer uses the name for internal usage. Paste the data whiteout white spaces in the start of the line or in the end of the line. 9. Data source Values It is not mandatory to create data sources for all entries. For example in the PING example if only the first value is required, than only one data source will be created and will be assigned to value "$1" An advanced option is to create a data source which executes mathematical calculation such as: "$1" * "$2" Other examples for optional mathetical functions: Memory value in Bytes can to be multiply by 1,000,000 (data source value should be $1 * 1000,0000) in order to be presented in Mega bytes Total memory used and memory free can be presented in data source ($1 + $2 ) * 1,000,

163 Chapter 14: Graphs Configurations 163 DISABLE GENERIC GRAPH CREATION By default Centerity Monitor uses 3 analyzer rules to capture unknown data and produce matched graphs. In some cases these rules does not apply to RRD files. It is recommended to disable Generic graph creation by going to the analyzer page selecting the 3 entries: DEFAULT 1 GUAGE DATA applies to 1 value in the plug-in output. DEFAULT 2 GUAGE DATA applies to 2 values in the plug-in output. DEFAULT 32 GUAGE DATA applies to 3 values in the plug-in output. And setting them to disable from the right bottom actions menu Creating Graph By default Centerity Monitor will display a basic graph with the time-frame of hourly, daily, weekly, monthly & yearly. Admin Menu > Reports> Graphs "+" (Add New) Insert Graphs General Setting Insert Graphs properties Setting Save To add a new graph or modify existing graph follow the instructions below: 1. From the Admin Menu Reports Graphs Graphs Add ("+" Button) 2. General Graph Settings - Insert the graphs information 2.1. Garph name 2.2. Graph Description 2.3. Graph type Graph title 2.5. Vertical lables 163

164 Chapter 14: Graphs Configurations Enable / Disable Graph 2.7. Comments 3. Using Macros - You can change the Graph title and the Vertical Label to to your needs using macros: $HOSTNAME$ - The hostname. $HOSTADDRESS$ - The host address. $HOSTALIAS$ - The host description. $METRICNAME$ - The metric name. $METRICDESC$ - The metric description. $METRICTEMPLATE$ - The metric Porfile. For Example: 4. Properties Tab 4.1. Graph Height the height of the graph Graph Width the width of the graph Units Value - With this option y-axis values on logarithmic graphs will be scaled to the appropriate units (k, M, etc.) instead of using exponential notation. Note that for linear graphs, SI notation is used by default. Note: in order to set a graph to start at "0" set the value: l=0 1. Positiioning the graph Datasources 164 After saving the general and properties settings a new tab will be generated. Thid tab contains the data sources that applied to the graph.

165 Chapter 14: Graphs Configurations 165 The datasource order is layered the first one (1) will be the background bottom value, and the last ones will be on top. Example - Memory Usage graph with three values: (1) Total Memory (2) Used Memory and percentage value that will be displayed at the bottom of the graph. The output of this graph: 165

166 Chapter 14: Graphs Configurations Adding Data sources to Graph Data source contains all the information that was pushed from the analyzer function and can papulates the graph with data. There are several data source and advanced functunallity: 2.1. Data Source select the data source to appear in the graph and that has been defined in the analyzer settings Color select the color of the Data source in the graph. Only applies if the data source is not legend or comment or any other none graphical element specifed in graph type Graph Type AREA draw line and the area between the x-axis and the line will be filled COMMENT general text to add to the legend GPRINT print the values of the specfieid data source in the legend HRULE - Draw a horizontal line at value. HRULE acts much like LINE except that will have no effect on the scale of the graph LEGEND prints legend of the current data source LINE1 - Draw a line of the specified width onto the graph LINE2 - Draw a line of the specified width onto the graph Ticker line LINE3 - Draw a line of the specified width onto the graph the tickets line PRINT similar to GPRINT SHIFT shift the graph time frame. you can specify an offset of ( 7*24*60*60 = ) 604'800 seconds to "look back" one week STACK - STACK modifier is used, this line is stacked on top of the previous element which can be a LINE or an AREA TICK - Plot a tick mark (a vertical line) for each value of vname that is non-zero and not *UNKNOWN* VRULE - Draw a vertical line at time Consilidation Function- general function to apply to the data source AVERAGE average value of the data source MIN - the minium value in the time range specified of the data source MAX - - the maximum value in the time range specified of the data source CURRENT the last value that was pushed to the RRD database. In addition to the aggregate functions, there are a set of specialized functions that enable RRDtool to provide data smoothing (via the Holt-Winters forecasting algorithm), confidence bands, and the flagging aberrant behavior in the data source time series data source types HWPREDICT,SEASONAL,DEVPREDICT,DEVSEASONAL,FAILURES applied to this function. Additional information can be found on Centerity Support website CDEF / VDEF Function the mathematical function to apply to the data source:

167 Chapter 14: Graphs Configurations Gprint Exact Numbers print the exact numbers from the Database Load Average- compute load average ( usually non integer numbers) of the data source Insert New Line insert new line in the legend 2.7. HRULE / VRULE Value sets the HRULE / VRULE value to print in the graph Text Format the text format that will appear in the legend for example if your data source is called load1min. you can use this settting to set the Legend Called: Load Average 1 Min RRA Name this sets the Data source name when computing mathemitical funtions Opacity control the opacity of the AREA, LINE1, LINE2, LINE3 it is usefull if you want to make a data source semi transparent. Note: default RRA name are abc1, abc2, abcn for every data source available in the graph. Note: if specified none value in the HRULE / Vrule Value and in the Text Format it will remove the current data source print from the legend it is usefull if you want to add additional lines surrounding specific area. Note: Cannot generate Graph error message means that the graph contains unavailable data sources. 167

168 Chapter 14: Graphs Configurations 168 Mathematical RPN Functions Centerity provides the powerful ability to perform all sorts of calculations on the data retrieved from its databases 1. Name: Describe the function 2. Function Type: Sets the function to use on the mathematical algorithm 2.1. CDEF -When retrieving data from an RRD, you are using a "DEF" to work with that data. Think of it as a variable that changes over time (where time is the x-axis). The value of this variable is what is found in the database at that particular time and you can't do any modifications on it. This is what CDEFs are for: they takes values from DEFs and perform calculations on them. For CDEF instructions, the stack is processed for each data point on the graph 2.2. VDEF - VDEF are just like CDEF but the instructions work on an entire data set in one run. Note, that currently VDEF instructions only support a limited list of functions 3. Function Name - if you use more than one CDEF / CDEF function on the same graph. Or using nested functions for example one function calls other multiplication. 4. Function -RPN calculator that uses a stack and push your data onto this stack. Whenever you execute an operation, it takes as many elements from the stack as needed. Pushing is done implicitly, so whenever you specify a number or a variable, it gets pushed onto the stack automatically. 168

169 Chapter 14: Graphs Configurations 169 ASSIGNING GRAPH TO METRIC To assign new graph template to metric follow these steps: 1. From the admin menu choose a Host and edit the metric. 2. Enter the tab "Extended". 3. Select graph from the list of graphs. 4. Save the metric. The new graph can be displayed from this menu by pressing the graph Icon or by editing the metric and pressing Preview Graph button. The preview button only applies to metrics that already exist and have RRD files created and you only want to change the graph type. In order to preview the graph you need to save the metric first and re edit. In order to apply the new settings to Metric Template follow the steps above but apply them to Metric template and when adding the metric to new host it will inherit the graph settings from the template. Note: Changing graph to metric does not require install policy and it is being applied immediately. 169

170 Chapter 15: Reports and Report Scheduler 170 Chapter 15: Reports and Report Scheduler REPORTS OPTION Centerity Monitor provides wide range of professional built-in reports. Each report can be saved as excel, pdf or generated in HTML format. 170

171 Chapter 15: Reports and Report Scheduler SLA Report Display the total availability of the selected object/s over a selected time frame. The report wizard includes the following options: 1.1. Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Metric / Group: Host/Hosts availability Metric / Metrics availability Host group availability Business Service availability (BSM) Profile Perspective: Allows availability by selected metric profile: Metric: Displays the metric profile within hosts BSM: Displays the metric profile within business services. 171

172 Chapter 15: Reports and Report Scheduler Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above Report Time-Period: What Schedule Time-period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/metric Calculate Metric Uptime: The report will display current uptime for this host Assumed Initial Host State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications. 172

173 Chapter 15: Reports and Report Scheduler Assume States During Program Downtime: If Centerity Monitor is not running for some time during a report period this will assume states for hosts and metrics during the downtime. Example of Last 7 Days BSM report: 2. Event Level Report The event level report shows period averages and host events in calendric view Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Metric /Group: Host/Hosts averages Metric/Metrics averages Host group averages Business Service averages (BSM) 173

174 Chapter 15: Reports and Report Scheduler Profile Perspective: Allows averages by selected metric profile: Metric: Displays the metric profile within hosts BSM: Displays the metric profile within business services Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above Report Time-Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/metric Calculate Metric Uptime: The report will display current uptime for this host Assumed Initial Host State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/ metric. Default value is Current State. 174

175 Chapter 15: Reports and Report Scheduler History Report The history report presents detailed information about historical states of any element in the system with several of options. This report can be saved as PDF and to be sent automatically by Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Metric /Group: Host/Hosts event history Metric/Metrics event history Host group event history Business Service event history (BSM) Profile Perspective: Allows history report by selected Metric profile: Metric: Displays the metric profile within hosts BSM: Displays the metric profile within business services. 175

176 Chapter 15: Reports and Report Scheduler Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications Alerts: Host alert/metric alerts Host Alert Types: The host alert types that will be displayed in the report Metric Alert Types: The metric alert types that will be displayed in the report Hide Process Messages: Hides all process messages. 176

177 Chapter 15: Reports and Report Scheduler Inventory Report Inventory report shows all available inventory information on hosts such as OS information, hardware information, software details and more. This report depends on inventory scan, hosts that were not scanned properly will appear blank. 177

178 Chapter 15: Reports and Report Scheduler Report type - there are 2 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host/Hosts inventory Host group inventory 4.2. Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Categories: General Information: IP address, host type, group and alias Administrative Information: All general information, topology, OS information, monitoring information, hardware supplier information and any user defined information Metrics Information: All metrics on the host and their state Software Information: All programs installed on this host System Information: System, domain, hardware, OS and location details Hardware Information: Bios, processor, memory, disks and network details Process Information: Running processes on the host Custom Report: Allows you to select specific information you want from the host such as: OS Name, Domain, Host ID, etc Search Report: Allows you to define a search for a specific detail such as software, serial number, etc. 178

179 Chapter 15: Reports and Report Scheduler Inventory Summary Report Summary inventory report can display how much of a certain software is installed on the environment, operating system etc. This report depends on inventory scan, hosts that weren't scanned properly will appear blank. 179

180 Chapter 15: Reports and Report Scheduler Report type - there are 2 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host/Hosts inventory Host group inventory 5.2. Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Select various settings for your report Custom Report: Allows you to select specific information you want from the host such as: OS Name, Domain, Host ID, etc Search Report: Allows you to search for a specific detail within all hosts, such as software, serial number, etc. 180

181 Chapter 15: Reports and Report Scheduler SNMP Traps Report SNMP Traps Report will display all SNMP trap history. It allows searching within the trap history and time-period selection Search: Allows searching within the SNMP traps history, by this criterion: Search by hosts, metrics, MIB name, output and severity Search by status Ok/Warning/Critical/Unknown Search by keywords 6.2. Report Time-Period: What Schedule Time-Period the report is created for. Click "Search" to display the report. 181

182 Chapter 15: Reports and Report Scheduler Syslog Report Syslog Report Displays all syslog history, and allows search and log filtering within the history Search: Allows searching within the syslog history, by this criterion: Search by hosts, metrics and output Search by status Ok/Warning/Critical/Unknown Search by keywords Search by syslog facility Search by severities critical/alert/debug etc Report Time-Period: What Schedule Time Period the report is created for. Click "Search" to display the report. 182

183 Chapter 15: Reports and Report Scheduler Summary Report Generic reports about host and metric alert data, including alert totals, top alert producers, etc. s 8.1. Report Types: Standard report - Uses all hosts Custom report Customize hosts Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected Top Alerters: Choose the report: Top alert producers Displays top 10 alert producers Less alert producers Displays bottom 10 alert producers Most recent alerts Displays most recent alerts. 183

184 Chapter 15: Reports and Report Scheduler Report Type: Display host alerts or metric alerts Number of alerts: The limit of alerts to display. 9. Charts Report Charts report can display graph history in a selected time-period. 184

185 Chapter 15: Reports and Report Scheduler Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Metric /Group: Host/Hosts graphs Metric/Metrics graphs Host group graphs Business Service graphs (BSM) Profile Perspective: Allows availability by selected metric profile: Metric: Displays the metric profile within hosts BSM: Displays the metric profile within business services Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected. 185

186 Chapter 15: Reports and Report Scheduler Trends Report Trends report displays a top 10 list of metric alerts, and a graph that compares the same metric profile on different hosts. 186

187 Chapter 15: Reports and Report Scheduler Select which Metric profile you wish to compare Select the hosts that monitor this metric profile Select various settings for your report: Select Data Sources: This depends on the report analyzers for the metric, if there isn't an analyzer that fits this metric check, no data sources will appear and you will not be able to generate a report Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date: Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date: Specify End Date if CUSTOM REPORT PERIOD was selected above. 187

188 Chapter 15: Reports and Report Scheduler Uptime Report Shows the uptime of host groups, metric groups, hosts and metrics during a selected period. 188

189 Chapter 15: Reports and Report Scheduler Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Metric /Group: Host/Hosts uptime Metric / Metrics uptime Host group uptime Business Services uptime (BSM) Profile Perspective: Allows uptime by selected Metric profile: Metric: Displays the Metric profile within hosts BSM: Displays the Metric profile within business services Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected Report Time Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/ metric Calculate Metric Uptime: The report will display current uptime for this host Assumed Initial Host State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host. Default value is UP Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the metric. Default value is OK. 189

190 Chapter 15: Reports and Report Scheduler

191 Chapter 15: Reports and Report Scheduler Usage Summary Report This report is recommended for Metric groups (BSMs), it displays all usage summary for each Metric group divided to Level, and it displays all level failures and their effect on the other levels in the Metric group Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box Host / Metric /Group: Metric / Metrics summary Business Service summary (BSM) Profile Perspective: Allows availability by selected Metric profile: Metric: Displays the metric profile within hosts Metric Group: Displays the metric profile within business services Display Raw Log information: Displays event history log Display Extended Report: Displays time duration of downtime as well as availability percentage Display Selected List: Display/Don t display the host list in a PDF export Select the Metric or Metric Group for the report Select various settings for your report. 191

192 Chapter 15: Reports and Report Scheduler Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above Report Time Period: What Schedule Time Period the report is created for Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/ metric Show Extended Information: Gives a more detailed report, with smaller time period statistics Show Stack Graph: Displays a stack for each part of the chosen business services (available only for business services) Use State Value as [Ok]: Choose thresholds to be stated ok in the report. The defaults are: Warning 50 (Treat soft warning events as Ok). Critical - 0 (treat all critical events as critical). Unknown 100 (Treat all unknown events as Ok) Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications. 192

193 Chapter 15: Reports and Report Scheduler Utilization Report Shows top 10 highest/lowest alerts producers Select the metric template for the report Select if highest or lowest values, and how many hosts to display 5, 10, 15, etc Select various settings for your report: Select Data Sources: This depends on the report analyzers for the metric, if there isn't an analyzer that fits this metric check, no data sources will appear, but you can still generate the report. 193

194 Chapter 15: Reports and Report Scheduler Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 194

195 Chapter 15: Reports and Report Scheduler 195 CREATING A NEW REPORT TEMPLATE 1. Select from the main menu Monitor Reports view, and select the desired report. 2. Fill the required parameters for the report. 3. Click the Save report Button at the bottom-right pan 4. A popup window will be opened at the center of the screen. Fill the required parameters: 4.1. Report-Name 4.2. Description 5. All reports can be found under Saved Reports section: 195

196 Chapter 15: Reports and Report Scheduler 196 CREATING A NEW SCHEDULED REPORT 1. Select from the main menu Admin->Reports view, and select Scheduled Reports Note: This window enables you to manage scheduled reports, and will be described in details in the next section. 2. Click on Add label, placed in the top-right of the screen. 3. New schedule window will be displayed, containing 2 tabs: General & Schedule 3.1. In the General Tab fill the required parameters and select the desired Template to be scheduled In the Schedule Tab define the required schedule and timing for the report to be sent. Note: These parameters represent the period that the scheduled-reports will be execute and attendees. 196

197 Chapter 15: Reports and Report Scheduler Click the Save Button at the bottom-right EDITING REPORT TEMPLATE 1. Select from the main menu Monitor->Reports->Saved Reports 2. Select the desired report-template to be edited by clicking on the report name. 3. A new window will open containing 2 tabs: General & Template tabs: 3.1. In General tab edit the Name and Description of the template 197

198 Chapter 15: Reports and Report Scheduler Also, you can edit the template permissions: - Admin members can view and edit the report. - View members can view the report only. 198

199 Chapter 15: Reports and Report Scheduler In Template tab- Edit the reports parameters 4. After editing, click on Save button. REMOVE REPORT TEMPLATE 1. Select from the main menu Admin->Reports view, and select Saved Reports 2. Click on the checkbox attached to the selected report-templates 3. Click on the garbage trash icon and confirm that you sure you want to delete the selected icons. MANAGING REPORT TEMPLATES 1. Select from the main menu Admin->Reports->Saved Report. 2. Select the desired report-templates by clicking on the checkbox attached to them. 3. Choose the desired operation from the boxes: Status (Enable/Disable), Preview or Delete. 199

Centerity Monitor User Guide

Centerity Monitor User Guide Centerity Monitor 4.10 User Guide July 2018 Page 2 End-User License Agreement (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of

More information

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15 Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15 2 Contents About This Guide... 4 End-User License Agreement (EULA)... 4 Before You Begin... 4 Audience... 4 Related Documentation... 4 Technical

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

Centerity Service Pack for VMware Monitoring Maximize your VMware performance and availability

Centerity Service Pack for VMware Monitoring Maximize your VMware performance and availability Centerity Service Pack for VMware Monitoring Maximize your VMware performance and availability Key Features Supports a variety of VMware versions. Tens of in-depth monitored KPI s Dedicated views Virtual

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Edge Device Manager Quick Start Guide. Version R15

Edge Device Manager Quick Start Guide. Version R15 Edge Device Manager Quick Start Guide Version R15 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

WhatsConnected v3.5 User Guide

WhatsConnected v3.5 User Guide WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation

More information

Using vrealize Operations Tenant App as a Service Provider

Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider You can find the most up-to-date technical documentation on the VMware Web site at:

More information

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems. OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

User Guide. Version R95. English

User Guide. Version R95. English Discovery User Guide Version R95 English September 18, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

vapp Deployment and Configuration Guide

vapp Deployment and Configuration Guide vapp Deployment and Configuration Guide vcenter Operations Manager 5.8.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical

More information

ForeScout Amazon Web Services (AWS) Plugin

ForeScout Amazon Web Services (AWS) Plugin ForeScout Amazon Web Services (AWS) Plugin Version 1.1.1 and above Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic Segmentation

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

Acronis Monitoring Service

Acronis Monitoring Service Acronis Monitoring Service PRODUCT DOCUMENTATION Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting

More information

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management You can find the most up-to-date technical documentation

More information

Dell Wyse Management Suite. Version 1.0 Quick Start Guide

Dell Wyse Management Suite. Version 1.0 Quick Start Guide Dell Wyse Management Suite Version 1.0 Quick Start Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Administering vrealize Log Insight. April 12, 2018 vrealize Log Insight 4.6

Administering vrealize Log Insight. April 12, 2018 vrealize Log Insight 4.6 Administering vrealize Log Insight April 12, 2018 4.6 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

ZL UA Exchange 2013 Archiving Configuration Guide

ZL UA Exchange 2013 Archiving Configuration Guide ZL UA Exchange 2013 Archiving Configuration Guide Version 8.0 January 2014 ZL Technologies, Inc. Copyright 2014 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

MOVE AntiVirus page-level reference

MOVE AntiVirus page-level reference McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

QUICK INSTALLATION GUIDE Minder 4.2

QUICK INSTALLATION GUIDE Minder 4.2 QUICK INSTALLATION GUIDE Minder 4.2 1 Minder 4.2 Contents 1. Introducing MindArray Minder... 4 1.1 Gain Visibility into Server, Application, Virtualization and Network Infrastructure... 4 1.2. Why Minder?...

More information

vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7

vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7 vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

vrealize Operations Management Pack for NSX for vsphere 3.0

vrealize Operations Management Pack for NSX for vsphere 3.0 vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

LabTech Ignite Installation

LabTech Ignite Installation LabTech LabTech Ignite Installation LABTECH IGNITE INSTALLATION... 1 Overview... 1 Readiness Checklist... 1 Server Installation... 2 Creating a Client Import File... 17 Using SSL Connections... 18 SSL

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Storage Manager 2018 R1. Installation Guide

Storage Manager 2018 R1. Installation Guide Storage Manager 2018 R1 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

WhatsUp Gold. Evaluation Guide

WhatsUp Gold. Evaluation Guide WhatsUp Gold Evaluation Guide Table of Contents This guide provides and overview of WhatsUp Gold. Refer to our Online Help for more details. Section Step 1: Getting Started Description Installation requirements

More information

vsphere Host Profiles 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vsphere Host Profiles 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

Installing or Upgrading ANM Virtual Appliance

Installing or Upgrading ANM Virtual Appliance CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes

More information

Dell EMC OpenManage Mobile. Version User s Guide (Android)

Dell EMC OpenManage Mobile. Version User s Guide (Android) Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7

vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7 vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Device Manager. Managing Devices CHAPTER

Device Manager. Managing Devices CHAPTER 2 CHAPTER This chapter describes how to perform routine device management tasks using the Administrator Console. It provides information on managing the devices within your Cisco VXC Manager environment.

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Forescout. Configuration Guide. Version 2.4

Forescout. Configuration Guide. Version 2.4 Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Runecast Analyzer User Guide

Runecast Analyzer User Guide Runecast Analyzer User Guide V1.0 Copyright 2014-2017 Runecast Solutions Ltd. All rights reserved. 2 P a g e Contents 1 Installation and Setup... 5 1.1 System requirements... 5 1.2 Deployment... 6 1.3

More information

vrealize Suite Lifecycle Manager 1.1 Installation, Upgrade, and Management vrealize Suite 2017

vrealize Suite Lifecycle Manager 1.1 Installation, Upgrade, and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.1 Installation, Upgrade, and Management vrealize Suite 2017 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Integration Guide. Auvik

Integration Guide. Auvik Integration Guide Auvik Revised: 27 February 2017 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of

More information

User Guide. Version R9. English

User Guide. Version R9. English Discovery User Guide Version R9 English March 5, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.0 Embedded vcenter Server 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Managing System Administration Settings

Managing System Administration Settings This chapter contains the following sections: Setting up the Outgoing Mail Server, page 2 Working with Email Templates, page 2 Configuring System Parameters (Optional), page 5 Updating the License, page

More information

Administering vrealize Log Insight. 12-OCT-2017 vrealize Log Insight 4.5

Administering vrealize Log Insight. 12-OCT-2017 vrealize Log Insight 4.5 Administering vrealize Log Insight 12-OCT-2017 4.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0 ForeScout CounterACT Network Module: Centralized Network Controller Plugin Version 1.0 Table of Contents About the Centralized Network Controller Integration... 4 About This Plugin... 4 How It Works...

More information

VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR. NetApp Storage. User Guide

VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR. NetApp Storage. User Guide VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR User Guide TABLE OF CONTENTS 1. Purpose... 3 2. Introduction to the Management Pack... 3 2.1 Understanding NetApp Integration... 3 2.2 How the Management

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

vrealize Infrastructure Navigator Installation and Configuration Guide

vrealize Infrastructure Navigator Installation and Configuration Guide vrealize Infrastructure Navigator Installation and Configuration Guide vrealize Infrastructure Navigator 5.8.5 This document supports the version of each product listed and supports all subsequent versions

More information

akkadian Provisioning Manager Express

akkadian Provisioning Manager Express akkadian Provisioning Manager Express Version 4.11.04 Release Notes September 14 th, 2017 Copyright and Trademarks: I. Copyright: This website and its content is copyright 2017 Akkadian Labs, LLC. All

More information

IPMI Configuration Guide

IPMI Configuration Guide IPMI Configuration Guide 1. Introduction of IPMI Server Manager... 2 2. IPMI Server Manager GUI Overview... 3 1 1. Introduction of IPMI Server Manager IPMI Server Manager allows remote access of computers

More information

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments Veeam ONE Version 8.0 User Guide for VMware vsphere Environments July, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Version 2.3 User Guide

Version 2.3 User Guide V Mware vcloud Usage Meter Version 2.3 User Guide 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered

More information

Guide for network administrators Systems Management. Guide for network Administrators. Version: Author: Panda Security

Guide for network administrators Systems Management. Guide for network Administrators. Version: Author: Panda Security Guide for network Administrators Version: 5.1.0 1 229 Author: Panda Security Date: 6/02/2018 Contents 1. PREFACE... 11 1.1. Introduction... 12 1.2. Target audience... 12 1.3. Icons... 12 2. INTRODUCTION...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Monitoring Windows Systems with WMI

Monitoring Windows Systems with WMI Monitoring Windows Systems with WMI ScienceLogic version 8.8.1 Table of Contents Introduction 4 Monitoring Windows Devices in the ScienceLogic Platform 5 What is SNMP? 5 What is WMI? 5 PowerPacks 5 Configuring

More information

NexentaStor VVOL

NexentaStor VVOL NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document

More information

Getting Started Using Cisco License Manager

Getting Started Using Cisco License Manager CHAPTER 5 This chapter provides information about the initial setup of Cisco License Manager and an overview of recommended steps to quickly add users and devices and obtain and deploy licenses. This chapter

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Web Self Service Administrator Guide. Version 1.1.2

Web Self Service Administrator Guide. Version 1.1.2 Version 1.1.2 Web Self Service Administrator Guide Version 1.1.2 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

NetApp SANtricity Plug-in for Oracle Enterprise Manager 3.1

NetApp SANtricity Plug-in for Oracle Enterprise Manager 3.1 NetApp SANtricity Plug-in for Oracle Enterprise Manager 3.1 Array Manager Installation and User Guide NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-09304_A0 495 East Java Drive Fax: +1 (408)

More information

Tanium Discover User Guide. Version 2.x.x

Tanium Discover User Guide. Version 2.x.x Tanium Discover User Guide Version 2.x.x June 27, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, four-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

Implementing Infoblox Data Connector 2.0

Implementing Infoblox Data Connector 2.0 DEPLOYMENT GUIDE Implementing Infoblox Data Connector 2.0 2017 Infoblox Inc. All rights reserved. Implementing Infoblox Data Connector, July 2017 Page 1 of 31 Contents Overview... 3 Prerequisites... 3

More information

BMC Remedyforce Discovery and Client Management. Frequently asked questions

BMC Remedyforce Discovery and Client Management. Frequently asked questions BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce

More information

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System 2115 YM Unified Networks Administration & Monitoring System 1. مواصفات نظام ادارة ومراقبة الشبكات الموحد: BOQ of Unified Networks Administration and Monitoring System: N 1 2 3 4 Item Main Network Monitoring

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Administering vrealize Log Insight. 05-SEP-2017 vrealize Log Insight 4.3

Administering vrealize Log Insight. 05-SEP-2017 vrealize Log Insight 4.3 Administering vrealize Log Insight 05-SEP-2017 4.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

VMware vrealize Operations Management Pack for vcloud Director 4.5 Guide

VMware vrealize Operations Management Pack for vcloud Director 4.5 Guide VMware vrealize Operations Management Pack for Director 4.5 Guide This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Administrator Guide. CA Agile Central On-Premises CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Router Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

CDP Data Center Console User Guide CDP Data Center Console User Guide Version CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you

More information

Dell Storage Manager 2016 R3 Installation Guide

Dell Storage Manager 2016 R3 Installation Guide Dell Storage Manager 2016 R3 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server NN49000-302 Document status: Standard Document version: 0101 Document date: 24 May 2007 All Rights

More information

VMware Infrastructure Planner

VMware Infrastructure Planner Thanks for participating in a assessment! Table of Contents 1. Release Notes for vsan Assessment v. 2.0.168.0... 2 2. About vsan Assessment... 34 3. Install and configure the virtual appliance... 45 2.1

More information

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide KACE Systems Deployment Appliance (K2000) 4.1 Administrator Guide Table of Contents About the KACE Systems Deployment Appliance (K2000)... 9 Getting started... 10 Tasks for getting started using the K2000

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

FileCruiser. Administrator Portal Guide

FileCruiser. Administrator Portal Guide FileCruiser Administrator Portal Guide Contents Administrator Portal Guide Contents Login to the Administration Portal 1 Home 2 Capacity Overview 2 Menu Features 3 OU Space/Team Space/Personal Space Usage

More information