Centerity Monitor 4.0. Administration Guide

Similar documents
Centerity Monitor User Guide

Centerity Monitor Standard V3.8.4 USER GUIDE VERSION 2.15

WhatsConfigured v3.1 User Guide

Centerity Service Pack for VMware Monitoring Maximize your VMware performance and availability

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Edge Device Manager Quick Start Guide. Version R15

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Installing VMware vsphere 5.1 Components

WhatsConnected v3.5 User Guide

Using vrealize Operations Tenant App as a Service Provider

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.

HySecure Quick Start Guide. HySecure 5.0

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

User Guide. Version R95. English

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

vapp Deployment and Configuration Guide

KYOCERA Net Admin User Guide

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

ForeScout Amazon Web Services (AWS) Plugin

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

Acronis Monitoring Service

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017

Dell Wyse Management Suite. Version 1.0 Quick Start Guide

ElasterStack 3.2 User Administration Guide - Advanced Zone

Installing and Configuring vcloud Connector

Administering vrealize Log Insight. April 12, 2018 vrealize Log Insight 4.6

ZL UA Exchange 2013 Archiving Configuration Guide

Configuring the Cisco APIC-EM Settings

ForeScout Extended Module for Tenable Vulnerability Management

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

MOVE AntiVirus page-level reference

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

QUICK INSTALLATION GUIDE Minder 4.2

vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7

vrealize Operations Management Pack for NSX for vsphere 3.0

LabTech Ignite Installation

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2

Storage Manager 2018 R1. Installation Guide

WhatsUp Gold. Evaluation Guide

vsphere Host Profiles 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

Installing or Upgrading ANM Virtual Appliance

Dell EMC OpenManage Mobile. Version User s Guide (Android)

vcenter Server Installation and Setup Modified on 11 MAY 2018 VMware vsphere 6.7 vcenter Server 6.7

Device Manager. Managing Devices CHAPTER

Transport Gateway Installation / Registration / Configuration

Forescout. Configuration Guide. Version 2.4

Runecast Analyzer User Guide

vrealize Suite Lifecycle Manager 1.1 Installation, Upgrade, and Management vrealize Suite 2017

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

Integration Guide. Auvik

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3

User Guide. Version R9. English

Extended Search Administration

Getting Started with ESXi Embedded

Managing System Administration Settings

Administering vrealize Log Insight. 12-OCT-2017 vrealize Log Insight 4.5

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0

VMWARE VREALIZE OPERATIONS MANAGEMENT PACK FOR. NetApp Storage. User Guide

Freshservice Discovery Probe User Guide

vrealize Infrastructure Navigator Installation and Configuration Guide

akkadian Provisioning Manager Express

IPMI Configuration Guide

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

Virtual Appliance User s Guide

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Version 2.3 User Guide

Guide for network administrators Systems Management. Guide for network Administrators. Version: Author: Panda Security

Installing and Configuring vcloud Connector

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Monitoring Windows Systems with WMI

NexentaStor VVOL

Getting Started Using Cisco License Manager

ForeScout Extended Module for VMware AirWatch MDM

Web Self Service Administrator Guide. Version 1.1.2

ForeScout Extended Module for IBM BigFix

NetApp SANtricity Plug-in for Oracle Enterprise Manager 3.1

Tanium Discover User Guide. Version 2.x.x

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Implementing Infoblox Data Connector 2.0

BMC Remedyforce Discovery and Client Management. Frequently asked questions

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Administering vrealize Log Insight. 05-SEP-2017 vrealize Log Insight 4.3

VMware vrealize Operations Management Pack for vcloud Director 4.5 Guide

CA Agile Central Administrator Guide. CA Agile Central On-Premises

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

Dell Storage Manager 2016 R3 Installation Guide

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server

VMware Infrastructure Planner

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide

vrealize Operations Management Pack for NSX for vsphere 2.0

FileCruiser. Administrator Portal Guide

Transcription:

Centerity Monitor 4.0 Administration Guide May 2017

About This Guide 2 Contents About This Guide... 8 End-User License Agreement (EULA)... 8 Before You Begin... 8 Audience... 8 Centerity Monitor User Guide... 8 Technical Support... 9 Chapter 1: Overview... 10 Centerity Monitor Enterprise edition - Introduction... 10 Centerity Monitor main features... 11 Start Using Centerity Monitor... 12 Chapter 2: Node Administration... 13 Overview... 13 Node Configuration... 13 Add Node to Enterprise... 14 Managing Nodes... 16 Chapter 3: Hosts & Metrics Administration... 19 Overview... 19 Adding New Hosts... 20 Host Setting... 22 General Host settings... 23 Monitoring Hosts with Dynamic IP Address... 24 Advanced Properties... 25 Associated Metrics... 28 Auto Add Services... 30 Host Dependencies... 31 Asset Management & Host Inventory... 31 Host Details... 32 Extended host information... 34 Proxy Server... 35 Discovery Engines... 37 2

About This Guide 3 Duplicate a Host... 80 Adding ahost Profile to An Existing Host... 80 Adding a Metric to an Existing Host... 82 Chapter 4: Policy Manager... 83 Overview... 83 Exporting Policy via Policy Manager... 83 Chapter 5: Business Service Management (BSM)... 85 Overview... 85 Configuration... 85 Chapter 6: Metrics... 91 Overview... 91 Creating A New metric Profile... 91 General Settings... 92 Command Properties... 93 Notification Settings... 94 Status Settings... 95 Misc. Settings... 95 Metric Extended information... 97 Metric Details... 98 Edit a Metric Profile... 99 Displaying a List of Hosts with a specific metric... 100 Metric Search Options... 100 Edit a Host-Associated Metric... 101 Applying a Metric Profile to Multiple Hosts or Hosts Groups... 102 Chapter 7: Contacts and Contact Groups... 104 Creating a New Contact... 104 Host Notifications... 105 Metric Notifications... 105 User Settings... 106 Contact Permissions... 106 Creating a New Contact Group... 108 3

About This Guide 4 Adding a Contact Group to a Host Group... 109 Add a Contact Group to a Business Service... 110 Add a Contact Group to a Metric Member... 110 Chapter 8: Plug-ins, Templates and Metric Profiles... 111 Overview... 111 Adding a New Plug-in... 112 Plug-in Information Screen... 113 Command Templates... 114 Creating Host /metric Check Commands... 115 Working With Commands... 117 Creating Notification Templates... 117 Assigning a Check Command to a Metric Profile... 118 Chapter 9: Maps... 119 Overview... 119 Visual Layouts - Hypermap... 119 Visual Layouts - Topology Map... 120 Visual Real-Time Layouts... 121 Advanced Designer Settings... 124 Visual Live Layouts Module Views & Slide Shows... 126 Chapter 10: Host & Metrics Dependencies... 128 Host Dependencies... 128 Metric Dependencies... 129 Chapter 11: Escalation... 133 Host Escalations... 133 Metric Escalations... 135 Chapter 12: Settings... 137 Overview... 137 General Tab... 137 Web Settings Tab... 138 Status Settings Tab... 139 Logging Tab... 140 4

About This Guide 5 Other Settings tab... 141 Resource Settings Tab... 142 Central Tab... 143 Authentication Settings Tab... 144 System Settings Tab... 144 Categories... 145 Import / Export... 146 Media Manager... 153 Chapter 13: System... 155 Overview... 155 Monitor Servers... 155 Logs... 155 Audit Log... 156 Task Scheduler... 157 Chapter 14: Graphs Configurations... 159 Overview... 159 Graph builder methodology... 160 Disable Generic Graph Creation... 163 Assigning Graph To Metric... 169 Chapter 15: Reports and Report Scheduler... 170 Reports option... 170 Creating a New Report Template... 195 Creating a New Scheduled Report... 196 Editing Report Template... 197 Remove Report Template... 199 Managing Report Templates... 199 Edit Scheduled Reports... 200 Manage Scheduled Reports... 200 Setting Report Scheduler Mail Server... 200 Chapter 16: Backup and Recovery... 201 Backup... 201 5

About This Guide 6 Restore... 201 6

About This Guide 8 About This Guide This Centerity Monitor Administration Guide describes how to configure and administer the Centerity Monitor system. END-USER LICENSE AGREEMENT (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of Centerity s EULA can be found here. BEFORE YOU BEGIN This guide assumes that you have installed the Centerity Monitor software and logged into the web administration as described in the Centerity Monitor Installation guide. For installation guide, please click here. AUDIENCE This Admin-Guide is intended for network and system administrators who responsible for the implementation and operation of the Centerity system in the organization. The system administration should be the system administrator familiar with basic IT-system (Linux, Windows etc.) and networking configuration. CENTERITY MONITOR USER GUIDE An additional guide which describes the Monitor console options for Centerity Monitor software. For download click here User Guide. 8

Technical Support 9 Technical Support For technical support, contact Centerity at: Email: support@centerity.com Phone (EMEA): +972-9-765-8080 Phone (U.S.): +1-339-225-6064 (EXT: 1005). Or contact your local Centerity partner. Check the website (http://www.centerity.com) for additional information and most updated technical information. Under the support section you can find useful content including documents, solution packs, certified plug-ins and more. With any support contact please provide the following information: License version. Server s configuration and operating system, including any OS patches that have been applied. Detailed description of the requires support assistance. Relevant attachments such as error messages, memory dumps, compiler listings, and error logs. 9

Chapter 1: Overview 10 Chapter 1: Overview CENTERITY MONITOR ENTERPRISE EDITION - INTRODUCTION Centerity Monitor is an enterprise class all-in-one IT and Business service management (BSM) monitoring platform. Centerity provides in depth monitoring capabilities for a wide range of technologies including Servers, Networks, DB, Applications, passive-equipment, Clouds, SAAS and much more while simplifying all aspects of network and IT management as well as information flow, and enhance business performance. 10

Chapter 1: Overview 11 CENTERITY MONITOR MAIN FEATURES Fast and easy deployment across large heterogenic networks. Multi-Tenant - Centerity enable multi-tenant management. Ideal for MSP's and organizations with multiple entities and several stand-alone networks. All-In-One Unified and Comprehensive monitoring platform - a single Glass Pane for all essential network information. Widest range of "out of the box" monitoring solution packs. Advanced Business Services Management (BSM) - In addition to the infrastructure monitoring features, Centerity Monitor provides the most advanced tools to measure and analyze business services SLA and user experience, monitoring. Most Advanced Features and Module all included! o o o o o o o Assets management Real-Time Layouts (unique feature for Centerity!) Real-time Hyper-Maps VMware Topology maps User-Experience monitoring Ticketing management including escalations Repots Center Flexibility - In addition of hundreds of predefined best-practice monitoring templates and solution packs for most Data-Center technologies, Centerity Monitor provides an easy way to customize proprietary monitoring plug-ins within very short time and vendor independency. 11

Chapter 1: Overview 12 START USING CENTERITY MONITOR LOG-IN TO CENTERITY MONITOR Open Web- Browser Insert server IP address Type user-name & Password use Monitor / Admin tabs AUTHENTICATION AND PERMISSIONS Centerity Monitor installation includes 2 default users: Administration Web Login Web administrator: admin Web administrator Password: admin Standard User Web Login Standard login user: user Standard login password: user Note: Do not delete these users before you set a new users and assign them to the monitored hosts and metrics. 12

Chapter 2: Node Administration 13 Chapter 2: Node Administration OVERVIEW Centerity Monitor provides two methods to manage nodes: Push configuration (recommended) and Pull configuration. In this chapter, there will be examples of both configurations, and a guide to adding a new monitoring node. NODE CONFIGURATION Go to Admin Settings General Distributed. 1. Server Name: The display name for the node. 2. Enable distributed mode: Enable / Disable distribution. 3. Centerity Monitor Central servers: Enterprise server IP-address. 4. User Name: A user name to connect with on the enterprise. 5. Password: A password to connect with on the enterprise. 6. Shared Secret: A passphrase secret to connect with on the enterprise. 7. Centerity Server Distributed Type: Pull is the default option. 8. Monitor Server Instance: Specify Centerity instance number (Required only when instance configuration is used). 13

Chapter 2: Node Administration 14 ADD NODE TO ENTERPRISE Go to Admin Management Monitors For a new node, click on the "+" icon. 14

Chapter 2: Node Administration 15 1. Distributed Server Name: The node name. 2. Description: The node description. 3. IP Address: The node IP-address. 4. Enable Distributed Server: Enable/Disable the node. 5. Enable as Failover Server: Failover server option can be used with an empty node. The node will be always passive, unless another node fails which will activate it with the failed node's checks. 6. Monitor Server Configuration: Allows managing configuration on the node level or manage configuration from the enterprise. This can only be set on creating new node. 7. Configuration Sync Mode Standard configuration using HTTP/HTTPS mode or using SSH sync configuration, which requires keys exchange between nodes. 8. Monitor Sync Mode: Activate Centerity Monitor Push / Pull distributed mode environment. 9. Timeout: Define node distribution timeout. 10. SSL Mode: Install Policy via SSL (HTTPS, 443) instead of HTTP (80). 11. Encryption: Enable password encryption via SHA protocol. 12. Remote Username: Remote node username. 13. Remote Password: Remote node password. 14. Install Policy Secret: Remote node secret passphrase. 15. Remote Server Management Realm: Allow setting up a new realm if apache configuration is changed. 16. Monitor Server Instance: An advance feature allowing multiple nodes, to be used only upon agreement with Centerity Systems. 17. Limit Node Host and Metric Count: Limit the number of hosts and metrics allowed on the selected distributed node. 18. Comments: Additional comments. Use "Check Connection" and "Verify Configuration" to test successful connection to the remote node. 15

Chapter 2: Node Administration 16 MANAGING NODES After the initial node configuration, each node has a management section with the following tabs: General Tab: The general tab for the node includes the node information, licensing, amount of metrics etc. Settings Tab: The settings tab for the node includes all settings listed in the initial node configuration. Advanced Tab: 1. Limit Node Host and Metric Count: Limit the number of hosts and metrics allowed on the selected distributed node. 2. Node s License: Update node licensing. 3. Update Acknowledgement and Downtime: Re-deploy all downtime and acknowledgement tickets to nodes. 4. Comments: Additional comments for node. 16

Chapter 2: Node Administration 17 Members Tab: Update host members per node and contact group members. 17

Chapter 2: Node Administration 18 Status: Log: Node logging. 18

Chapter 3: Hosts & Metrics Administration 19 Chapter 3: Hosts & Metrics Administration OVERVIEW Centerity Monitor provides multiple methods to add new hosts and metrics from the web interface Admin menu. Advanced users can use the command line; however, it is recommended to use the admin- UI only. This chapter will describe the web administration options and how to add or modify settings of hosts, host groups, and metrics. To define new monitoring, a certain hierarchy needs to be implemented. The diagram below explains the Host group Host Metrics internal topology from the monitor server point of view. Monitor Topology Host Group HostA HostB HostC HostD Service Service Service Service Service Service * Metrics must be associates to a Host and host must be associates to Host group. Host group - A host group contains one or more hosts in one group. Host - Monitored element in the network. A host can be physical or virtual server, workstation, router, etc. metrics - A metric definition is used to identify monitored metric / KPI associated to a host. Each host can have multiple associated metrics. For virtual devices such as clusters, databases etc. it is required to define a virtual host and assign the desired metrics to it. 19

Chapter 3: Hosts & Metrics Administration 20 ADDING NEW HOSTS 1. Go to Admin Management Hosts 2. Select the Wizard option from the top right corner of the page 3. Fill out the wizard form (detailed instructions provided below) 4. Save the new host. 5. Test the host and metrics. Admin menu Host Wizard Save After every new configuration in the admin section, it is mandatory to run the install policy process in order to activate the new configuration in the monitoring server. Please refer to Chapter8 Policy Manager which explains the steps of policy installation. 20

Chapter 3: Hosts & Metrics Administration 21 1. Hostname: this is used to define a short name used to identify the host. It is used in Host Group and metric definitions to reference this host. Hosts can have multiple metrics (which are monitored) associated with them. 2. Description - this is used to define a longer name or description used to identify the host. It is provided to allow you to more easily identify a host. 3. IP Address: IP Address of the host. It is advised not to use DNS names. In case of DNS problems, you will not be able to do proper monitoring. Click on the globe icon to DNS resolve the host. Be sure to re-enter the IP address before saving. 4. Host Category: this sets how the devices are displayed in the business service and which information is available to the Inventory Collector. 5. Distributed Monitor Server: The node to which the host belongs to. 6. Host Group: This is used to define which host group the host belongs to. For example, if you have a cluster of web servers you will able to report on and see availability of this group. 7. Sub-Group: This is used to define which sub group the host belongs to. 8. Parents: this is used to define a list of short names of the "parent" hosts for this host. Parent hosts are typically routers, switches, firewalls, etc. that lie between the monitoring host and remote hosts. A router, switch, etc. which is closest to the remote host is considered to be that host's "parent". 9. Host Profile: Determine which metrics will be applied from the predefined templates available in the Host Profile menu. 21

Chapter 3: Hosts & Metrics Administration 22 HOST SETTING The system allows a variety of advanced settings such as event handlers, flap detection, control notifications etc. Note: After adding a new a host using the wizard interface you are still able to edit and set advanced features from the screen below There are 7 tabs for advanced settings and configurations: 1. General: Basic host settings. 2. Advanced: Read the information below for details regarding available options for the host. 3. Metrics: View and set metrics to the host. 4. Dependencies: View and set host dependencies. 5. Inventory: Setting of Hardware, Software and administrative information. (Information is collected automatically with the inventory discovery tool). 6. Details: Manual host inventory such as: host ID, hardware type, author, and phones. 7. Extended: Define host image and comments. 22

Chapter 3: Hosts & Metrics Administration 23 GENERAL HOST SETTINGS General host settings are used to define the host properties in the system: Host name Description IP Address Enable / Disable Host Template Host Category Host Group Parrent SAVE Install Policy 23

Chapter 3: Hosts & Metrics Administration 24 1. Host name: Host name must be exclusive to the host. 2. Description: Detailed description of the host to allow clear identification of any host. 3. IP Address: Define the IP address of the host. FQDN can be used as well to identify the host instead of an IP address (require available DNS services!) 4. Enable/Disable Host: Enable/Disable the host. 5. Host Template: Pre-defined set of metrics to be associate with the host (i.e. check command, event handler etc. 6. Category: Define how the devices should be displayed in the business service and which information is available to the Inventory Collector. 7. Distributed Monitor Server: The node relevant for this host. 8. Host Group: Defines the host group of the host. 9. Parents / Child: Define the parent-child relationship between two hosts. Every host can be a parent or child of another host. (Host can be a parent only if the enabled as parent is checked) Note: Parent-child definition is mandatory to generate automatic topology map and root-cause analysis (outages dashboard) 10. Save as Host Profile - Before saving this template you can create a Host Profile from the specified settings and then associate the template with new or existing hosts. At the bottom left of the Host settings page across from the Save button, you will see Save as Host Profile. Mark the checkbox and click Save. This will create a new Template with the name of the Host. 11. Delete Deletes the host. MONITORING HOSTS WITH DYNAMIC IP ADDRESS The following instructions explain how to monitor a host with a dynamic IP address (DHCP). Set DNS server Add new host Verify & install policy Step 1 Setting DNS server To monitor hosts with dynamic IP, the system uses hostname from the DNS server rather than fixed IP address. Connect to the Centerity server via SSH using your favorite SSH client like putty Edit the /etc/resolve.conf file so it will include your domain search suffix and your DNS servers, for example: 24

Chapter 3: Hosts & Metrics Administration 25 Step 2 - Define the new host in the web GUI Log-in to the Centerity monitor console. Define the host to monitor in the system. Insert host name in the IP address (see example below) Step 3 - Run the policy manger ADVANCED PROPERTIES Host Commands Properties To activate the check command option, check the box in the advanced tab as shown in the example below. 1. Host Check Command: This feature allows to check host availability over single check rather than one of the multiple metrics associated to the host. Enabling this option will perform single alert in case of host down status. 25

Chapter 3: Hosts & Metrics Administration 26 2. Test Command - This command will process a ping check to the host to verify connectivity (up / down). The command must return a status of OK (0) other ways, Centerity Monitor will assume that the host is down. If the argument stays blank, the host will not be checked and Centerity Monitor will constantly assume the host is up. 3. Max checks attempts - The number of samples (checks) before changing from OK state. Setting this value to 1 will cause Centerity Monitor to generate an alert without retrying the host to be checked again. Notifications Settings Note: The minimum value for this option is "1". 1. Notifications Enable / Disable - This is used to determine whether notifications for this host are enabled. 2. Notification period - Specify the Time frame which notifications for this host will be sent to authorized contacts. 3. Notification interval - Specify the time intervals before re-notifying authorized contacts about the last status. Setting this value to 0 will disable the re-notification. 4. Notifications options Specify the statuses to be notified - Unreachable, Down, and Recovered 26

Chapter 3: Hosts & Metrics Administration 27 Other Settings 1. Event Handler: Enable / disable event handler command. 2. Event Handler: Specify the Event Handler command that should be execute whenever a change in the state of the host is detected. 3. Flap Detection: Determines whether flap detection is enabled for this host. 4. Flap Threshold: Specifies the low state and high change threshold used in flap detection for this host. 5. Retain status information: Determines whether status-related information about the host is retained across program restarts 6. Retain non-status information: Determines whether non-status information about the host is retained across program restarts. 7. Performance Data: Determines whether the processing of performance data is enabled for this host. Note: Disabling performance data will disable graphs creation and history archive. 8. Stalking: Determines whether the stalking for this host is enabled. 9. Stalking options: Determines which host states "stalking" is enabled for. 27

Chapter 3: Hosts & Metrics Administration 28 ASSOCIATED METRICS Associated Metrics provides a quick way to attach a new service or multiple metrics to an existing host. Adding a new metric Select Metric Profile select metric /metric press "Add" Run Install Policy 1. In the Metric tab select the required metric profile. 2. Select the metric or multiple metrics. 3. Press the add button. 4. Run install policy. Deleting a metric Select the metric checkbox and click "delete". 28

Chapter 3: Hosts & Metrics Administration 29 Resetting a Metric Reset history graph and data allows you to remove the metric history. This can be useful when there are errors with the graphs. Select the metric checkbox and click "Reset". Metric Properties 1. Name: The selected metric name. 2. Description: Metric description. 3. Metric Category: Define the category of this metric. 4. Enable / Disable Metric: Enable status will export this metric with the host configuration; Disable status will not export the metric current configuration with the host definitions. You can click on the Enabled / Disabled text to switch between states. 5. Metric Template: The original metric template from which commands tab arguments are taken. 6. Contact Group: The contact groups assigned to the metric. 29

Chapter 3: Hosts & Metrics Administration 30 AUTO ADD SERVICES Centerity V4.X allows advanced discovery and automatic attachment of optional services such as hardware metrics, services, system KPIs and processes to the monitored host. Admin Menu - Host Metrics Tab Press "+" icon Select KPIs / Servies Press "Add" & Save Install Policy Press the + icon to open the list of optional metrics and check the box of the required services. Click the "Add" button to complete the attachment process. The following pop-up screen will be opened: 30

Chapter 3: Hosts & Metrics Administration 31 All automatic services include best-practice thresholds. To modify the thresholds, use the service properties. HOST DEPENDENCIES Please refer to chapter 10. ASSET MANAGEMENT & HOST INVENTORY OVERVIEW The asset management module provides complete view of the host inventory including system information, hardware configuration, services, processes etc. This functionality is optional and does not impact the monitoring process for this host. 31

Chapter 3: Hosts & Metrics Administration 32 1. General Information: General information about the Host / Device such as Operating System, Service Packs, Patches, Owner, Organization, Configuration and more. An image can be selected for this host that will be displayed when viewing the host inventory in the Monitor Console. (See Importing Images and Sounds). 2. System Information: Display system information such as product ID (S/N), installation directory, boot device, time zone, Language, uptime etc. 3. Hardware Information: Displays hardware information such as manufacturer, model, system type etc. 3.1 Processor information: CPU information of the remote host, such as: MHz, Stepping, Model, and CPU manufacturer. 3.2 Memory information: Real Memory and Virtual Memory / Swap on Host in Megabytes available. 3.3 Bios information: Hardware information of the Computer BIOS; includes manufacturer, version, description and serial. 3.4 Disk Information: Logical disk information for floppy and Zip drives, hard disks, and CD / DVD devices. Disk size and free space information provided in bytes. 3.5 Network Information: Network device information such as: IP address, MAC Address, subnets, gateway, and computer name. 4. Service information: Provides Service State information such as: current state, service name, and Service Display Name. This information can be used when monitoring services with the Centerity Agent. 5. Processes Information: Provides Process Name and Process ID to facilitate the automation of tasks regarding specific processes. HOST DETAILS Host Details tab allows adding customized administrative information. This information is optional and has no effect on the monitoring process. Admin Menue Host Details Tab 32

Chapter 3: Hosts & Metrics Administration 33 Host Details 1. OS: Host operating system. 2. Service Pack: Host most recent service pack. 3. Software: Software that is installed on the host. 4. Software license: You can store product license here. 5. Additional IP Addresses: If the host has another constant ip. 6. Default Gateway: Host's default gateway. Hardware 7. Model/Brand: The server's brand. 8. Manufacturer: Server manufacturer. 9. Processor: Amount and processor info. 10. Memory: Memory amount on server. 11. MAC Address: Network card's physical address. 12. Host ID: This is used for the UNIX / Linux specific Host ID. 13. Serial - Device serial number 14. Warranty - Warranty of the equipment Additional Info 33 15. Supplier name: details about supplier 16. Supplier Contact Details: details about your supplier.

Chapter 3: Hosts & Metrics Administration 34 17. Authority Person: The person in charge of this device and his details 18. Computer Location: Location of the devices such as: Computer room, cabinet number, etc. 19. Mandatory Services: This is for administrative information only. It specifies the mandatory services used by this host. 20. Optional Services: This is for administrative information only. It specifies the optional services used by this host. 21. Notes: Custom notes. SNMP Information 22. Community: Host SNMP community 23. Version: available SNMP versions: 1, 2c 3 24. Port: Device SNMP Port 25. Username: specify username for security feature in SNMP V3 26. Password: specify password for security feature in SNMP V3 EXTENDED HOST INFORMATION 1. Image -This variable is used to define the name of a GIF, or PNG images that may be associated with this host. 2. Disable image in map - this option allows you to remove undesired hosts from your network map 3. Image Alternate text -This variable is used to define an optional string that is used in the ALT tag of the image specified by the <icon image> argument. 34

Chapter 3: Hosts & Metrics Administration 35 4. External URL Define an external URL to access related websites or local libraries directly from the host properties screen. The URL will be opened in new windows or in the Centerity frame. Note: Host Detail Link should be checked to enable host inventory. PROXY SERVER Centerity Monitor Proxy Server provides a simple and powerful way to monitor Operating System resources that are not accessible directly from the Centerity server. The proxy Server is a regular Centerity windows agent acts as a single gateway between the Centerity server and monitored components. This Proxy Agent needs to be installed on a dedicated Windows workstation or Windows Server platform. Centerity Proxy Server configuration is done by using the Agent Discovery" option under Admin Section. Once the scanning process is done, select the option Enable as Proxy in the General host settings. This option will define this host as a proxy server during Proxy Agent Discovery process. 35

Chapter 3: Hosts & Metrics Administration 36 Network Settings - To start using the Proxy Server, port 5666 TCP must be enabled between the Proxy Server and Centerity Server. For monitoring a remote server which is agent based, this port should be also enabled between the Proxy Server and the remote server. On other scenarios, make sure that the relevant port for the check is open and accessible (Ex. port 161 for SNMP monitoring). Proxy Metric Settings - Proxy metrics settings are the same as the regular Centerity metrics, with only one parameter added. The first argument in each metric needs to be changed to the designated Proxy Server IP address or name. It is recommended to make this change in the metric template for all related hosts rather than define a manual change on each host that the proxy metric belongs to. Proxy Monitoring Solution Packs - In addition to the default proxy monitoring solution packs that comes with Centerity installation, there are many related packs available on Centerity support site under the category Centerity Solution Packs. Search for the key word "proxy" to get all the relevant packs. 36

Chapter 3: Hosts & Metrics Administration 37 DISCOVERY ENGINES HOST DISCOVERY Centerity Monitor provides advanced automatic discovery engines for hosts and devices in the network. Admin > Management > Discovery 1. Topology Discovery: Network mapping, including all servers and devices. By clicking the button, it will scan the network segment which the server is in, otherwise you can choose the settings manually. 1.1. Advanced: Set the parameters for the TD, select network segment, assign profiles or schedule automatic discovery. 1.2. History: Review Topology Discoveries previously ran. 2. Agent Discovery: after deploying Centerity Agents across your network, Centerity Monitor can detect them and allow you to assign profiles from the list of host profiles. 2.1. 3. WMI Discovery: Centerity engine can detect any server that is open for WMI. 4. Network Discovery: Network discovery provides a fast way to identify which hosts are available across the network 5. SNMP Discovery: Centerity Monitor can scan SNMP enabled devices with predefined SNMP Templates and allow you to assign profiles from the list of SNMP profiles. 6. VMware Discovery: a quick way to scan the "VMware Data Center" or "VMware ESX" and insert all virtual machines to monitor. 37

Chapter 3: Hosts & Metrics Administration 38 7. Proxy Agent Discovery: does the same action as "Agent Discovery" via proxy server. 8. Proxy VMware Discovery: does the same action as "VMware Discovery" via proxy server. 9. Proxy Network Discovery: does the same action as "Network Discovery" via proxy server. 10. Proxy SNMP Discovery: does the same action as "SNMP Discovery" via proxy server. 11. Proxy WMI Discovery: Centerity engine can detect any server that is open for WMI over proxy agent. 38

Chapter 3: Hosts & Metrics Administration 39 INVENTORY DISCOVERY 1. Agent Inventory: Collect Hardware and Software information from Centerity Agents. 2. VMware Inventory: Collect host hardware and service information from VMware. 3. WMI Inventory: Hardware and Software information from WMI enabled servers. 4. Custom Inventory: Collect Hardware and Software information from any third-party script/application. PROXY INVENTORY DISCOVERY 1. Proxy VMware Inventory: Collect host hardware and service information from VMware via Proxy. 2. Proxy Agent Inventory: Collect Hardware and Software information from Centerity Agents via Proxy server. 3. Proxy WMI Inventory: Collect Hardware and Software information from WMI enabled servers via Proxy. 39

Chapter 3: Hosts & Metrics Administration 40 AGENT DISCOVERY Centerity Monitor Agent allows discovery and monitoring metrics of a wide range of resources that are not visible or accessible over Agentless methods. Centerity Agents also provide a secured way to collect performance data from Operating systems using SSL and an IP based access list. Centerity Agents consume minimal bandwidth (about 1-2 kb per query). 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1. IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1. Single IP Format: 192.168.1.1 will scan single IP Address 1.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 1.2. Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like option 3 above, but is a little more flexible. 1.3. Subnet Range Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 2. IP Address / URL Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 40

Chapter 3: Hosts & Metrics Administration 41 3. Host Group: Select the desired host group for the discovered host. 4. Port - Centerity agent communicate with Centerity server over port 5666 as default. For nonstandard port, it is mandatory to update this field. Admin Menu Discovery - Agent discovery Scan Type Insert IP address / range of IPs Speicfy ports Scan network View results 5. Password For a password protected agents. 6. Scan Type - Centerity Monitor Agent for Windows, Linux, and Solaris includes SSL support for highest security. Other Operating Systems such as HPUX, AIX, VMS, and AS400 do not offer these capabilities due to Operating System limitations. Choose one of the following options to detect your agents: 6.1. SSL Agents Scan for SSL-enabled agents 6.2. NO SSL Agents Scan for older agents without SSL Support 6.3. SSL & NO SSL Agents Scan for agents using both SSL and NO SSL. 7. Timeout The default time-out is 10 seconds. The timeout period can be set up to 300 seconds. 8. Skip existing hosts Will skip any host that already exists in the system. 9. Debug Log Writes a debug log to the database. 10. Distributed Node: Global settings will automatically balance hosts between nodes. Fixed node will assign all discovered hosts to the specified node. AGENT SCAN RESULT After selecting View Network Scan Result and clicking Execute, all the hosts with Centerity Agent that were detected will be listed. 41

Chapter 3: Hosts & Metrics Administration 42 The information will be displayed in 6 columns: Host Name: a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address: Displays the IP address of the remote Agent Mode: SSL / No SSL modes are available. Depends on your agent installation OS: Centerity Monitor agents 1.4.2 and above display inventory information about the Operating System and builds. Version: Agent version installed on the remote Host Profile: Host profile to apply to the host. Note: It is required to apply profile to each host PROXY AGENT DISCOVERY This option will perform the same process as described in the previous chapter (AGENT DISCOVERY) through a proxy agent. 42

Chapter 3: Hosts & Metrics Administration 43 Admin Menu Discovery - Agent discovery Scan Type Insert IP address / range of IPs Select Proxy Server Speicfy ports Scan network View results 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1. IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1. Single IP Format: 192.168.1.1 will scan single IP Address 1.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 1.2. Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like option 3 above, but is a little more flexible. 1.3. Subnet Range Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 2. IP Address / URL - Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 3. Proxy Server This field is used to determine which Proxy server to use. 43 Note: A Proxy server will be valid only when it is enabled as a proxy in host settings.

Chapter 3: Hosts & Metrics Administration 44 4. DNS Server - This field is used to determine which DNS Server to use. 5. Port - Centerity Monitor agent using port 5666 for standard operations. If you install the agent on anon-standard port you need to configure the Agent Discovery to search this port. 6. Scan Type - Centerity Monitor Agent for Windows, Linux, and Solaris includes SSL support for maximum security. Other Operating Systems such as HPUX, AIX, VMS, and AS400 do not offer these capabilities due to Operating System limitations. Choose one of the following options to detect your agents: 6.1. SSL Agents Scan for SSL-enabled agents 6.2. NO SSL Agents Scan for older agents without SSL Support 6.3. SSL & NO SSL Agents Scan for agents using both SSL and NO SSL. 7. Skip existing hosts Will skip any host that already exists in the system. Note: This last option takes more time to detect agents, since the Scanner scans each device twice. 8. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 9. Skip existing hosts Will skip any host that already exists in the system. 10. Debug Log Writes a debug log to the database. 11. Distributed Node: Global settings will automatically balance hosts between nodes. Fixed node will assign all discovered hosts to the specified node. 44

Chapter 3: Hosts & Metrics Administration 45 PROXY AGENT SCAN RESULT After selecting View Proxy Scan Result and clicking Execute, all hosts with Agents that were detected will be listed. The information will be displayed in 6 columns: Host Name: a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address: Displays the IP address of the remote Agent Mode: SSL / No SSL modes are available. Depends on your agent installation OS: Centerity Monitor agents 1.4.2 and above display inventory information about the Operating System and builds. Version: Agent version installed on the remote Host Profile: Host profile to apply to the host. Note: It is mandatory to apply template to each host 45

Chapter 3: Hosts & Metrics Administration 46 SNMP DISCOVERY Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from network devices such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. Centerity Monitor provides SNMP plug-ins that works with all thirdparty SNMP management interfaces to monitor the status of managed devices and applications. Admin Menu Discovery - SNMP discovery Scan Type Insert IP address / range of IPs Insert community name Speicfy ports and SNMP version Scan network View results 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1. IP Address - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1. Single IP Format : 192.168.1.1 will scan single IP Address 1.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 46

Chapter 3: Hosts & Metrics Administration 47 1.2. Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like option 3 above, but is a little more flexible. 1.3. Subnet Range Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 2. IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: www.centerity.com. As long the name is resolvable, the scan will be performed correctly. 3. Community - SNMP Community of the remote device; either read only or read/write can be used. 4. Port - Specify SNMP port for the device (if other than port 161) 5. SNMP Version - Centerity Monitor supports all SNMP protocols: 5.1. V. 1 using standard community. 5.2. V. 2c using standard community. 5.3. V. 3 Using advanced SNMP security features. 6. Username / Password - If SNMP version 3 is used, specify the Username and Password set on the remote device for accessing information. 7. Timeout -Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 8. Ping Scan - This option is useful when you have multiple SNMP communities and you want only to detect what SNMP enabled devices are available. Do not use Ping Scan if you will be continuing further to a sub scan. 9. Rescan Devices - When changes occur on your SNMP enabled devices you will need to rescan them. This feature allows you to rescan current device and replace / append current information to the existing device. Append new information: Collect more information about interfaces, new memory, etc. Replace new information: Replace existing information with the newly detected information, for example if an existing interface changed names it'll change it, as opposed to the "Append new information" section. 10. Distributed Node: Global settings will automatically balance hosts between nodes. Fixed node will assign all discovered hosts to the specified node. 47

Chapter 3: Hosts & Metrics Administration 48 SNMP SCAN RESULT Centerity SNMP discovery engine requires 3 Steps: 1. Define the IP address (or IP range) and the SNMP community. 2. View which hosts were found by the SNMP discovery tool and choose for each host a specific SNMP scan profile template For multiple hosts / devices with the same Profile mark the checkbox near the Global SNMP Profile and select the appropriate profile. 3. Click the Scan button for intensive scan on the remote device to find all the sub components and information available. Note: selecting Save without assigning any SNMP profile will create a host with no metrics. The install policy process will alert about such events. Once the intensive scan has finished, select View Scan Results again to view the discovery results. If the correct template was assigned, there will be a list of all available information. Host Name: a fully qualified domain name resolved by the DNS. If no DNS name is found, the IP address will be displayed. IP Address: Displays the IP address of the remote Agent Metric: Number of Metrics that will be monitored. Information: displays the banner information from the scan result. Profile: displays the SNMP Profile that was chosen for this scan. 48

Chapter 3: Hosts & Metrics Administration 49 Click on the to open a list of all the metric profiles that were defined in the SNMP Scan template Metric: the metric name assigned for the profile entry Description: Description specified in the profile entry Identifier: Identifier is usually the OID specified in the entry Found: The number of items defined as metric. If you de-select the checkbox on the right it will remove all entries under this metric. SNMP Discovery Search: Allows filtering within the results by searching and status. 49

Chapter 3: Hosts & Metrics Administration 50 PROXY SNMP DISCOVERY This option will perform the same process as described in the previous section (SNMP DISCOVERY) through a proxy agent. Admin Menu Discovery - Proxy SNMP discovery Scan Type Insert IP address / range of IPs Insert community name Speicfy ports and SNMP version Scan network View results 11. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 11.1. IP Address - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 11.1.1. Single IP Format : 192.168.1.1 will scan single IP Address 11.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 11.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 11.2. Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like option 3 above, but is a little more flexible. 50

Chapter 3: Hosts & Metrics Administration 51 11.3. Subnet Range Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 12. IP Address (es) / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: www.centerity.com. As long the name is resolvable, the scan will be performed correctly. 13. Community - SNMP Community of the remote device; either read only or read/write can be used. 14. Port - Specify SNMP port for the device (if other than port 161) 15. SNMP Version - Centerity Monitor supports all SNMP protocols: 15.1. V. 1 using standard community. 15.2. V. 2c using standard community. 15.3. V. 3 Using advanced SNMP security features. 16. Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 17. Username / Password - If SNMP version 3 is used, specify the Username and Password set on the remote device for accessing information. 18. Timeout -Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 19. Ping Scan - This option is useful when you have multiple SNMP communities and you want only to detect what SNMP enabled devices are available. Do not use Ping Scan if you will be continuing further to a sub scan. 20. Rescan Devices - When changes occur on your SNMP enabled devices you will need to rescan them. This feature allows you to rescan current device and replace / append current information to the existing device. Append new information: Collect more information about interfaces, new memory, etc. Replace new information: Replace existing information with the newly detected information, for example if an existing interface changed names it'll change it, as opposed to the "Append new information" section. Note: this feature only works if the metric name is in the exact format name of the SNMP profile template, and has not been edited. 51

Chapter 3: Hosts & Metrics Administration 52 PROXY SNMP SCAN RESULT Centerity SNMP discovery engine requires 3 Steps: 4. Define the IP address (or IP range) and the SNMP community. 5. View which hosts were found by the SNMP discovery tool and choose for each host a specific SNMP scan profile template For multiple hosts / devices with the same Profile mark the checkbox near the Global SNMP Profile and select the appropriate profile. 6. Click the Scan button for intensive scan on the remote device to find all the sub components and information available. Note: selecting Save without assigning any SNMP profile will create a host with no metrics. The install policy process will alert about such events. Once the intensive scan has finished, select View Scan Results again to view the discovery results. If the correct template was assigned, there will be a list of all available information. Host Name - a fully qualified domain name resolved by the DNS. If no DNS name is found, the IP address will be displayed. IP Address Displays the IP address of the remote Agent Metric - Number of Metrics that will be monitored. Information displays the banner information from the scan result. Profile displays the SNMP Profile that was chosen for this scan. Click on the to open a list of all the Metric profiles that were defined in the SNMP Scan template Metric the metric name assigned for the profile entry Description Description specified in the profile entry Identifier Identifier is usually the OID specified in the entry Found the number of items defined as Metric. If you de-select the checkbox on the right it will remove all entries under this metric. SNMP Discovery Search: Allows filtering within the results by searching and status. 52

Chapter 3: Hosts & Metrics Administration 53 53

Chapter 3: Hosts & Metrics Administration 54 VMWARE DISCOVERY Centerity Monitor provides powerful discovery engine for Virtual Centers, ESXs and virtual machines. The VMware discovery process includes automatic dynamic topology map of the VMware and apply monitored metrics with multiple scan options. Admin Menu Discovery - VMware Scan Type VC/ESX User / password Host Group Port Scan network View results 1. Select Scan Type: Scan type allows you to choose between the entire V-Center scan and a single ESX Server scan. 1.1. Virtual Center: will scan the virtual center with all ESXs and virtual machines under it. 1.1.1. Virtual Center name: Type in the V-Center name or IP address. 1.1.2. VC username: insert the V-Center administrator username. 1.1.3. VC password: insert the V-Center administrator password. 1.1.4. Host-group: Define the host-group that the hosts will be attached to. 1.1.5. Port: Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port. 1.1.6. Compare exist DC or ESX: This option identifies changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan to add them to the monitoring process) 1.1.7. Machine state: This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 54

Chapter 3: Hosts & Metrics Administration 55 1.1.8. Skip existing hosts: will not display existing hosts in the new discovery scan. 1.1.9. Scan Only ESX s: will scan ESX s without VMs. 1.1.10. Debug Log: Will display errors if any occur. 1.1.11. Distributed Node: Select a node to associate the metrics with, if Global Settings is selected it will balance between all nodes. 1.2. ESX: will scan the ESX and all virtual machines under it. 1.2.1. ESX name: This field is used for discovering a specific Esx to scan. This field can be filled with the ESX name or IP address. 1.2.2. ESX username: insert the ESX administrator username. 1.2.3. ESX password: insert the ESX administrator password. 1.2.4. Host-group: Define the host-group that the hosts will be attached to. 1.2.5. Port: Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port 1.2.6. Compare exist DC or ESX: This option identifies changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan to add them to the monitoring process). 1.2.7. Machine state: This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 1.2.8. Skip existing hosts: will not display existing hosts in the new discovery scan. 1.2.9. Debug Log: Will display errors if any occur. 1.2.10. Distributed Node: Select a node to associate the metrics with, if Global Settings is selected it will balance between all nodes. 55

Chapter 3: Hosts & Metrics Administration 56 VMWARE SCAN RESULTS To view the scan results, select "View VMware Scan Results" and click on the "Execute" button. Add hosts to monitoring server: View VMware Scan Results Execute Select Hosts Define Profiles and choose other options Select the host that you want to add to monitor server and specify the profile. Press the save button. Save Run Policy Global host profile Select Global host profile to apply the same profile to all selected hosts. Create map This option will automatically generate a topology map 56

Chapter 3: Hosts & Metrics Administration 57 PROXY VMWARE DISCOVERY Centerity Monitor provides powerful discovery engine for Virtual Centers, ESXs and virtual machines. The VMware discovery process includes automatic dynamic topology map of the VMware and apply monitored metrics with multiple scan options. Admin Menu Discovery - VMware Proxy Scan Type VC/ESX User / password Host Group Port Scan network View results 2. Select Scan Type - Scan type allows you to choose between the entire V-Center scan and a single ESX Server scan. 2.1. Virtual Center - will scan the virtual center with all ESXes and virtual machines under it. 2.1.1. Virtual Center name Type in the V-Center name or IP address. 2.1.2. VC username - insert the V-Center administrator username. 2.1.3. VC password insert the V-Center administrator password. 2.1.4. ESX username insert the ESX administrator username. 2.1.5. ESX password insert the ESX administrator password. 2.1.6. Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 2.1.7. Host-group Define the host-group that the hosts will be attached to. 2.1.8. Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port. 57

Chapter 3: Hosts & Metrics Administration 58 2.1.9. Compare exist Dc or ESX This option identify changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan in order to add them to the monitoring process) 2.1.10. Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 2.2. ESX - will scan the ESX and all virtual machines under it. 2.2.1. ESX name - This field is used for discovering a specific Esx to scan. This field can be filled with the ESX name or IP address. 2.2.2. ESX username insert the ESX administrator username. 2.2.3. ESX password insert the ESX administrator password. 2.2.4. Proxy Server - This field is used to determine which Proxy server to use. Note: A Proxy server will be valid only when it is enabled as a proxy in host settings. 2.2.5. Host-group Define the host-group that the hosts will be attached to. 2.2.6. Port - Centerity Monitor VMware discovery uses port 443 by default. If is optional to define different port 2.2.7. Compare exist Dc or ESX This option identifies changes from the last scan and the current scan. (i.e. the number added machines to the V-Center from the last scan to add them to the monitoring process). 2.2.8. Machine state This option is used to determine what state of machine to scan for (power on\off, suspend or all the states). 58

Chapter 3: Hosts & Metrics Administration 59 PROXY VMWARE SCAN RESULTS To view the scan results, select "View VMware Scan Results" and click on the "Execute" button. Add hosts to monitoring server: View VMware Scan Results Execute Select Hosts Define Profiles and choose other options Select the host that you want to add to monitor server and specify the profile. Press the save button. Save Run Policy Global host profile Select Global host profile to apply the same profile to all selected hosts. Create map this option will generate topology map automatically 59

Chapter 3: Hosts & Metrics Administration 60 NETWORK DISCOVERY A Network discovery provides a fast way to identify which hosts are available across the network (either internal or external) and detect which ports are opened and respond. The map file for the port names is in the /etc/services on the Centerity appliance. When saving the detected hosts and opened ports, Centerity Monitor will assign TCP / UDP metric checks to the corresponding ports and try to monitor availability and response time. Admin Menu Discovery - Network discovery Scan Type Insert IP address / range of IP Port Range press "scan network" view results Save & Install policy 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1 IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1 Single IP Format: 192.168.1.1 will scan single IP Address 60

Chapter 3: Hosts & Metrics Administration 61 1.1.2 Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3 Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 1.2 Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like option 3 above, but is a little more flexible. 1.3 Subnet Range Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 2. IP Address / addresses range / URL - This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: www.centerity.com. As long the name is resolvable, the scan will be performed correctly. 3. Port Ranges 3.1 Top Known Ports: By default, Centerity Monitor will try to scan the specified host from Port 1 to 1024. 3.2 All Ports: Centerity Monitor will try to scan the Host from port 1 to 65535, which takes longer. 3.3 Port Range: Specify a range of ports to scan. 3.4 Custom Ports: Specify ports to scan: 443,80, etc. 4. Protocol Type - Select which protocols to detect. By default, Centerity Monitor tries to detect TCP and UDP metrics. 5. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 6. Exclude IP Addresses: Define IP Addresses to exclude from the scan. 7. Force Scan: Detects hosts that have no available ping (ICMP). Hosts with ICMP or PING blocked are not available for the standard network scan and will be not detected. To detect these hosts and devices, choose this option. The scan will immediately start port detection for each IP / Range specified the IP address field. 8. Ping Only: Detects only hosts that are allowing ICMP connection without ports. 9. System DNS: Use host name as the DNS name. 10. Scan Method: Fast / Normal / Aggressive: 11. Skip existing hosts will not display existing hosts in the new discovery scan. 12. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. 61

Chapter 3: Hosts & Metrics Administration 62 NETWORK SCAN RESULT When selecting View Network Scan Results Centerity Monitor will display available ports and their Name Mapping. For example, if port 21 was opened on the remote Host, Centerity Monitor will show: Service: ftp Port: 21 Protocol: tcpstate: open. 1. Metric: this is the mapped metric name from /etc/services 2. Port: Port number detected by Centerity Monitor 3. Protocol: Either TCP (Transmission Control Protocol over Internet Protocol) or UDP (User Datagram Protocol) 4. State: metric state is Open, Filtered or Closed. Open means that an application on the target machine is listening for connections/packets on that port. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Centerity Monitor cannot tell whether it is open or closed. Closed ports have no application listening on them Note: Use the Checkbox in the upper right corner to add / remove all hosts and metrics When clicking on Save, all selected hosts will be saved and the scan results will be cleared 62

Chapter 3: Hosts & Metrics Administration 63 PROXY NETWORK DISCOVERY This option will perform the same process as Network Discovery. In this option, the discovery process will be activated through a proxy agent. 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1. IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1. Single IP Format: 192.168.1.1 will scan single IP Address 1.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 1.2. Start End Range: choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like option 3 above, but is a little more flexible. 1.3. Subnet Range: Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 2. IP Address / addresses range / URL: This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: www.centerity.com. As long the name is resolvable, the scan will be performed correctly. 3. Proxy Server: This field is used to define the Proxy server. 4. DNS Server: determine the DNS Server. 63

Chapter 3: Hosts & Metrics Administration 64 5. Port Ranges: By default, Centerity Monitor will try to scan the specified host from Port 1 to 1024. If you specify All Ports, Centerity Monitor will try to scan the Host from port 1 to 65535, which takes longer. 6. Scan Type: Scan type allows you to choose which protocols to detect. By default, Centerity Monitor tries to detect TCP and UDP metrics. You can reduce scan time by selecting one or the other, depending on your situation. 7. Timeout: Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 8. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. Note: A Proxy server will be valid only when it is enabled as a parent in host settings. 64

Chapter 3: Hosts & Metrics Administration 65 WMI DISCOVERY Centerity Monitor Agent provides a simple and powerful way to monitor Operating System resources that are not available through Agentless methods. WMI is a set of extensions to the Windows Driver Model that provide information and notifications. Admin Menu WMI Discovery Scan Type IP Address URL Admin User Password Domain Name Scan Network 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1. IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1. Single IP Format: 192.168.1.1 will scan single IP Address 1.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 65

Chapter 3: Hosts & Metrics Administration 66 1.2. Start End Range: choosing this option will allow you to specify the exact start and end range, for example: Start IP: 192.168.1.1 End IP 192.168.1.100. This option is like section 1.1.3 above, but is a little more flexible. 1.3. Subnet Range: Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 1.4. IP Address (es) / URL: This field is used for discovering a specific IP address or URL. You may also specify FQDN (fully qualified domain names) to scan, such as: www.centerity.com. As long the name is resolvable, the scan will be performed correctly. 1.5. Admin user, password and domain name: Fill out this information to get WMI access to the server. 1.6. Skip existing hosts: Will skip hosts who are already listed in the system. 1.7. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. WMI SCAN RESULT Select View Network Scan Result and clicking Execute, all WMI enabled hosts that were detected will be listed. View Network Scan Result Execute The information will be displayed in 6 columns: 1. Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. 2. IP Address Displays the IP address of the remote Agent 3. OS Centerity Monitor agents 1.4.2 and above display inventory information about the Operating System and builds. 4. OS Bit 32bit/64bit System 66

Chapter 3: Hosts & Metrics Administration 67 5. Service Pack Displayed which service pack is installed. 6. Profile Host profile to apply to the host. Note: If no template is chosen an empty Host entry will be created. PROXY WMI DISCOVERY Proxy WMI discovery provides a simple way to find out which hosts are available across the network (either internal or external) and detect which ports are opened and respond. When saving the detected hosts and opened ports, Centerity Monitor will assign TCP / UDP metric checks to the corresponding ports and try to monitor availability and response time. Note: This option also allows you to examine and detect security exploits that can be found on your network, such as disabled firewalls, unwanted services listening etc. Note: A Proxy server will be listed only when it is enabled as a proxy in host settings. 67

Chapter 3: Hosts & Metrics Administration 68 Admin Menu Proxy WMI Scan Type IP Address URL Proxy Server Admin User Password Domain Name 1. Select Scan Type - Scan type allows you to input addresses in several formats and extends the scan flexibility. 1.1. IP Address / addresses range - This is the most flexible field available for IP address scan. You may enter addresses in the following formats: 1.1.1. Single IP Format : 192.168.1.1 will scan single IP Address 1.1.2. Wild card Format: 192.168.1.* will scan class C network; 192.168.*.* will scan Class B Network 1.1.3. Range Format: 192.168.1.1-100 will scan range from IP 192.168.1.1 to 192.168.1.100 1.2. Start End Range choosing this option will allow you to specify the exact start and end range, for example: Start IP : 192.168.1.1 End IP 192.168.1.100. This option is similar to option 3 above, but is a little more flexible. 1.3. Subnet Range Specify your network class in the following form: Range: 192.168.1.1 Subnet: 24/32/48 12. IP Address (es) / URL - Discovery process of a specific IP address, URL or FQDN (fully qualified domain names). 2. Proxy Server This field is used to determine which Proxy server to use. 3. Admin user, password and domain name Fill out this information to get WMI access to the server. 4. Skip existing hosts Will skip hosts who are already listed in the system. 5. Distributed Node Select a node to associate the metrics with. When Global Settings is selected, it will balance between all nodes. PROXY WMI SCAN RESULT After selecting View Network Scan Result and clicking Execute, all WMI enabled hosts that were detected will be listed. The information will be displayed in 6 columns: 68 Host Name - a fully qualified domain name resolved by DNS. If no DNS name is found, the host IP Address will be shown. IP Address Displays the IP address of the remote Agent

Chapter 3: Hosts & Metrics Administration 69 OS Centerity Monitor agents 1.4.2 and above display inventory information about the Operating System and builds. OS Bit 32bit/64bit System Service Pack Displayed which service pack is installed. Profile Host profile to apply to the host. Note: If no template is chosen an empty Host entry will be created. TOPOLOGY DISCOVERY This kind of discovery is a new method for discovering all network or subnet components and displaying a detailed map of them within the selected range of addresses. At the end of this search, the results provide the information about how the host was discovered, type of device and its status. The TD can be performed by clicking on Advanced option to define the range and types of devices to be discovered, otherwise the scan would be performed on the automatic subnet (which the server is a member of). Filling the passwords and SNMP community for devices is recommended to achieve a fuller environment view. 69

Chapter 3: Hosts & Metrics Administration 70 1. Scan type and range: Scan type allows you to input addresses in several formats and extends the scan flexibility: 1.1 Start/End Range: Enter an IP range. 192.168.1.1,100 will scan range from IP 192.168.1.1 to 192.168.1.100. 1.2 Manual Subnet: Specify the starting address and the subnet prefix (24, 16, etc.) 1.3 Automatic Subnet: Automatically scan the subnet of the server. 2. Scan environment: Choose the environments you would like to include in the scan. Agent-based servers, WMI, SNMP, VMware. Equipment requiring authentication (WMI, SNMP and VMware) require entering credentials. 3. Auto add: Selecting yes will automatically add discovered hosts to the system. The auto-add expands to reveal further options. 4. Schedule task: Schedule the defined scan - the scan could be repeated every defined period and a certain user would be informed about it. The schedule option section would be opened. In case there is another scheduled task running, you should choose in the Scheduler Settings drop-menu the priority of the task you are currently setting. 5. Default Settings: Set the default values applied for the discovered hosts (could be changed at the end of the discovery. a. Default Host Group: Choose the host group applied directly for the discovered hosts, from the existing HGs in the system. b. Default Contact Group: Choose the Contact group applied for the discovered hosts, from the existing CGs in the system. 70

Chapter 3: Hosts & Metrics Administration 71 AGENT INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Agent Inventory Scan Type IP Address / Range Port Scan Type Password Timeouts Scan Network 1. Select Scan Type - Define the scan type of the inventory scanner 1.1. Select Hosts Select specific host or multiple hosts (by pressing the shift button while selecting) 1.2. All Hosts Collect inventory information for all hosts 71 Note: if you do not run collector on regular basis and you wish to track only changes, choose specific hosts.

Chapter 3: Hosts & Metrics Administration 72 2. Scan Type 2.1. Agent Centerity Monitor agent discovery provides all the detailed information described in Chapter 2 Asset Management / Host Inventory 2.2. SNMP Collect Simple SNMP information. 3. Port Specify a different port if you install Centerity Monitor agents on different ports. 4. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 5. Agent Inventory Discovery Scan Results - When discovery is finished you can see which Hosts and metrics were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host services. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. AGENT INVENTORY SCAN RESULT Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. Currently, there are 2 Asset management configuration methods available: 1. Agent Centerity Monitor Agents 1.4 and above support advanced asset management collectors and provide information about: General Computer information, Hardware information, and Software information. 2. SNMP Currently Centerity Monitor uses default SNMP agent and detects simple information available by SNMP such as: manufacturer, Location, and description. 72

Chapter 3: Hosts & Metrics Administration 73 AGENT PROXY INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information via Proxy server. This is currently done manually from the web admin GUI or using the command line. Admin Menu Inventory Tab Proxy Agent Inventory Scan Option Proxy Server Speicfy ports Timeouts Scan network View results 1. Select Scan Option - Define the scan option of the inventory scanner 1.1. Select Hosts Select specific host or multiple hosts (by pressing the shift button while selecting) 1.1.1. All Hosts Collect inventory information for all hosts. 1.2. Select Host Group - Select specific Host Group or multiple Host Groups (by pressing the shift button while selecting) 73

Chapter 3: Hosts & Metrics Administration 74 Note: if you do not run the collector on regular basis and you wish to track only changes, choose specific hosts. 2. Proxy Server This field is used to determine which Proxy server to use. 3. Port Centerity Monitor agent using port 5666 for standard operations. If you install the agent on anon-standard port you need to configure the Agent Discovery to search this port. 4. Timeout - Default time for each host is 10 seconds. If you want speed up the network scan, reduce the scan timeout. For networks with extreme latency, the timeout period can be set as high as 300 seconds. 5. Debug Log Check to Enable Debug Log AGENT PROXY INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. When the discovery process is finished you can see which Hosts and Metrics were found and save the desired hosts in Centerity Monitor configuration. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Metrics. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. 74

Chapter 3: Hosts & Metrics Administration 75 VMWARE INVENTORY DISCOVERY Centerity Monitor has an asset management tool that allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Select Datacenter ESX User / Password Port Scan network View results 1. Select Data Center Select main Data Center. 2. Select Hosts to scan Select internal Hosts to scan. 3. ESX username insert the ESX administrator username. 4. ESX password insert the ESX administrator password. 5. Port - Centerity Monitor VMware discovery uses port 443 for standard operations. If you use an anon-standard port you need to configure the VMware Discovery to search this port. 75

Chapter 3: Hosts & Metrics Administration 76 VMWARE INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Metrics. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. PROXY VMWARE INVENTORY DISCOVERY Centerity Monitor has an asset management tool that allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory Select Datacenter ESX User / Password Port Scan network View results 76 6. Select Data Center Select main Data Center. 7. Select Hosts to scan Select internal Hosts to scan.

Chapter 3: Hosts & Metrics Administration 77 6. Proxy Server - This field is used to determine which Proxy server to use. 8. ESX username insert the ESX administrator username. 9. ESX password insert the ESX administrator password. 10. Port - Centerity Monitor VMware discovery uses port 443 for standard operations. If you use an anon-standard port you need to configure the VMware Discovery to search this port. VMWARE INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View network Scan results view the scan results and save / skip Host Metrics. Export Network Scan CSV File this option allows you to export the scan results to CSV files. New Network Scan remove current scan result and start scanner from beginning. WMI INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory WMI Inventory Choose Hosts / Host Groups Admin User Password Domain Scan Network 77

Chapter 3: Hosts & Metrics Administration 78 1. Scan Options: Choose Host / Host Group. 2. Select Hosts: Select desired hosts / host groups to scan inventory on. 3. Admin User: Domain admin user. 4. Password: Domain admin user password. 5. Domain Name: The domain name. 6. Debug Log: If you wish to have a debug log on this. The debug log writes to Centerity database. WMI INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View Inventory Scan results view the scan results and save / skip Host Metrics. New Inventory Scan remove current scan result and start scanner from beginning. WMI PROXY INVENTORY DISCOVERY Centerity Monitor s built in asset management allows you to collect host hardware and service information. This is currently done manually from the web admin GUI or from the command line. Admin Menu Discovery Inventory WMI Inventory Choose Hosts / Host Groups Select Proxy Server Admin User Password Domain Scan Network 78

Chapter 3: Hosts & Metrics Administration 79 1. Scan Options: Choose Host / Host-Group. 2. Select Hosts: Select desired hosts / host groups to scan inventory on. 3. Proxy Server: Select proxy server (must be a parent host.) 4. Admin User: Domain admin user. 5. Password: Domain admin user password. 6. Domain Name: The domain name. 7. Debug Log: If you wish to have a debug log on this. The debug log writes to Centerity database. WMI PROXY INVENTORY SCAN RESULTS Inventory Scan Result is for information only and does not provide additional settings. While the scan is in progress, you can view the detected hosts and inventory methods applied. The following options are available after Centerity Monitor has finished the scan: View Inventory Scan results view the scan results and save / skip Host Services. New Inventory Scan remove current scan result and start scanner from beginning. 79

Chapter 3: Hosts & Metrics Administration 80 DUPLICATE A HOST Centerity Monitor provides an easy way to create a new host from an existing host using the Duplicate Host action. This will create an exact copy of a specific host and change only the unique identifiers, such as: Host name, Description and IP Address. The steps for duplicating host in the admin menu are: 1. Go to the Hosts interface and check the checkbox of the host you want to duplicate 2. Select Duplicate from the drop-down menu on the right bottom and click Submit 3. Enter the new Host Name, Description, and IP Address 4. Click Save Admin Menu Host Duplicate Submit Save Note: In case of host name duplication, Remove or disable one of the hosts before running Policy Manager. ADDING AHOST PROFILE TO AN EXISTING HOST Centerity Monitor allows adding an additional Host profile to an existing host. For example, creating a standard host, using the Windows Server profile and applying the Microsoft Exchange Monitoring profile: 1. Go to the Hosts interface and check the checkbox on the right, for the host you want to update. 2. Select Profile from the drop-down menu on the right bottom and click Submit 3. Select the Host profile you created 4. Click Change to apply the new host profile Admin Menu Host Profile Submit Change 80

Chapter 3: Hosts & Metrics Administration 81 Click Preview button In order to explore which metrics are available in the specific profile. 81

Chapter 3: Hosts & Metrics Administration 82 ADDING A METRIC TO AN EXISTING HOST Centerity Monitor allows adding new definitions, expand metric monitoring & add new applicable metric metrics for existing host. New metrics can be added from the admin menu under the Host administration 1. Go to the Hosts interface and choose a Host from the List by clicking on it 2. Select Metric Tab 3. Choose from Metric Category or All Metric Profile List 4. Click Add to add new metric to the host profile Admin Menu Host Metric Add Save 82

Chapter 4: Policy Manager 83 Chapter 4: Policy Manager OVERVIEW Centerity Monitor Policy Manager is used to execute various procedures after some changes are made to the product configuration. For example, configure hosts and metrics, define new check commands, re-draw the map, etc. EXPORTING POLICY VIA POLICY MANAGER Admin Menu Policy Manager Verfity Policy Install 1. Choose Policy Manager from the Admin Menu 2. Click the Remote Policy Install button on the top right corner of the page. Centerity Monitor requires that all changes will be validated and verified before execution. The Verify and Install process examines all the newly created and changed data. When a problem occurs Policy Manager will provide a specific alert describing the configuration issues with related data to assist on fixing the problem 83

Chapter 4: Policy Manager 84 84

Chapter 5: Business Service Management (BSM) 85 Chapter 5: Business Service Management (BSM) OVERVIEW Business Services are an effective approach for managing Information Technology (IT) from the perspective of the business. They can increase business value through better management of IT and processes. Centerity Monitor can build a logical map containing layers of components such as network, web services, databases, storage, etc. Then, Centerity Monitor calculates the metric utilization overall and for every component layer. Business Service Management leaves no stone unturned. Business services, activities, processes, transactions, etc., are understood from the business user's perspective, internally and externally, in their terms, their language, and their performance expectations, while understanding the impact on their jobs, productivity, goals and objectives, etc. CONFIGURATION 1. Under the management tab in the admin section of the system click on "Business Services": 85 2. In the Business Services screen click on the "+" button. 3. In the General screen complete all the fields in the following order:

Chapter 5: Business Service Management (BSM) 86 BSM Name: The name that you want to give to your new BSM process. Description: The description that you want to give to your new BSM process. Enable / Disable View: Leave the enable checkbox always marked. Category: Select the new BSM category (Windows, Linux, Application etc.) Host Group: Select the host group that the new BSM process will be associated to. Sub Group: Select the sub group that the new BSM process will be associated to (if you have defined sub groups in the system). Contact Groups: Select the contact groups that will be associated to the BSM process. Weight Calculation: Recommended to select the checkbox to enable weight calculation for layers and metrics. Map: Select the map you want associated with this BSM process. 4. After filling in all the relevant fields go to the "advanced" tab. 86

Chapter 5: Business Service Management (BSM) 87 5. Fill in the warning and critical thresholds for the BSM availability, and fill in the "OK Range", "Warning Range", and "Critical Range" according to the thresholds you gave to main BSM availability, for example: 6. After you have defined the thresholds of the BSM availability, go to the "Levels" tab. 7. Inside the levels tab you will need to add levels into your BSM process, by adding levels you will be able to set the amount of percentage that each level will consume for the hole BSM process, also you will be able to pinpoint the exact cause of a mission critical problem in the organization. Inside the level tab add the levels that are relevant to your BSM process (like "DB", "Networking", and "Application", "Storage" etc.), give them a description and set the amount of weight that each level will take from the hole BSM process, for example: 87

Chapter 5: Business Service Management (BSM) 88 All the levels must sum up to 100%. You can also define a certain level to be a breakdown level (breakdown level is a level that will breakdown the hole BMS process if that specific level will be in a critical state critical state is defined by the percentage you choose next to the breakdown check box). 8. After finishing with the entire levels configuration go to the "Members" tab. 9. Inside the members tab, add all the relevant checks to the BSM process from all of the monitored checks. You will need to assign each check to the relevant level that you have already defined and give each check the weight of that check from the level (or, the system will balance weight automatically). 10. Under the "Add Members" block click on the "Select Host" drop down menu button and choose the host that you want to add checks from, then all the checks that are associated to the host will appear and you will need to mark the checks that you want to add and click on the "Add" button on the right side like so: 88

Chapter 5: Business Service Management (BSM) 89 You can also select checks from a metric list or a host group list of metrics. Additionally, previously available BSMs are available to add and creation of levels-within-levels. 11. Continue to add all the relevant checks from all the relevant hosts that you want to associate to your BSM process. 12. Click on the "save" button in the lower right side of the screen. 13. After saving the new BSM process, inside the monitor menu click on the "Business Services" button, and a screen that contains all the BSM processes in the system will appear. In that screen, see the new BSM process and its currently availability status in %: 14. You can drill down to a specific BSM view by clicking on it. 89

Chapter 5: Business Service Management (BSM) 90 15. Inside the BSM process, see all the levels availability that were defined, and the checks that the level contains to pin point a problem and get an exact idea on what is causing the problem: 90

Chapter 6: Metrics 91 Chapter 6: Metrics OVERVIEW A metric definition is used to identify a "metric" that runs on a specific host. The term "metric" can be used in several meanings. It can mean an actual metric that runs on the host (POP, SMTP, HTTP, etc.) or some other type of metric (KPI) associated with the host (response to a ping, number of logged in users, free disk space, etc.). Metric profiles are templates containing information such as: What is monitored: CPU, Memory, Disk Usage, Network Traffic Thresholds Contact group, related to the metric Monitoring schedule Metric notification settings Centerity Monitor provides hundreds of best practice Metric Profiles that are suitable for major standard applications. The metric settings and thresholds can also be modified to fit requirements. CREATING A NEW METRIC PROFILE Admin Menu Management Metrics To create a new Metric Profile, Choose the main Admin screen and click on Metrics to access the Metric Management screen. Click + on the top right corner of the Metrics Management view. 91 The following window will be opened:

Chapter 6: Metrics 92 GENERAL SETTINGS 1. Metric Name - The name of the metric which will be displayed in the monitor under the host configuration. Metrics are uniquely identified with their Template Name and Metric Descriptions. 2. Metric Description Clear description for the specific metric. 3. Metric Type - Catalog the metric under a metric type. This is useful information for creating Business Services which allows creating statistics and subbing level trees. 4. Enable / Disable Metric - Enable or disable the metric. 5. Metric Template - This is the template that can be found under Templates Metric Templates which allows saving time by using general template settings for multiple metrics. Any unique settings should be defined under each host. 6. Contact Groups - Contact groups that should be notified whenever there are problems (or recoveries) with this metric. 7. Host & Host Groups Members Assign the Metric Profile to Hosts and/or Host Groups. 7.1. Host Members Select multiple hosts to add this metric. 7.2. Host Groups Select multiple host groups to add this metric. 92

Chapter 6: Metrics 93 COMMAND PROPERTIES In the command tab, to activate an option the checkbox on the far right must be selected. Otherwise, the defaults based on the metric template are applied. The line should turn blue and the option you selected will override the one from the template. 1. Metric Check Command: The specific command the system runs to check the status of the metric. 2. Arguments: Command-line arguments that should be passed to the check command. 3. Checks Period - The time-period during which active checks of this metric can be made. Time and Scheduler Periods can be defined using Templates Time Periods. 3.1. Time-Period A fixed time-frame in which the metric check will be execute. 3.2. Scheduler Period A specific date and time-period in which the metric check will be executed. Note: Scheduler Period will change the metric from active to passive settings 93

Chapter 6: Metrics 94 4. Normal Check Interval - Defines the number of "time units" to wait before scheduling the next "regular" check of the metric. "Regular" checks occur when the metric is in OK state. 5. Retry Check Interval The number of "time units" to wait before scheduling a re-check of the metric. Metrics are rescheduled at the retry interval when they have changed to a non-ok state. 6. Max Check Attempts - The number of times the system will retry the metric check command if it returns any state other than an OK state before sending a notification. Setting this value to 1 will cause a notification to generate immediately without retrying the metric check again. Note: The default interval unit is 1 minute, meaning interval value of 5 = 5 minutes. NOTIFICATION SETTINGS 1. Notification Enabled Enables or disables notifications for this metric. 2. Notification Period - Time period during which notifications of events for this metric can be sent out to contacts. If a metric event occurs during a time frame which is not covered by the time-period, no notifications will be sent out. 3. Notification Interval - Number of "time units" to wait before re-notifying a contact that this metric is still down or unreachable. Unless you have changed the interval length from the default value of 60, this number will represent minutes. If you set this value to Once, Centerity Monitor will not renotify contacts about problems for this metric - only one notification will be sent out. 4. Notification Options - This determines which notifications for the metric should be sent out. Valid options are a combination of one or more of the following: Recovered, Critical, Warning, and Unknown 94

Chapter 6: Metrics 95 STATUS SETTINGS 1. Active Check - Determines if active checks of this metric are enabled. 2. Passive Check - Determines if passive checks of this metric are enabled. 3. Is volatile A volatile metric is one that changes its status too often. This option detects those kinds of metrics. 4. Parallelize check - Determines if a metric check can be parallelized. By default, all metric checks are parallelized. 5. Obsess over metric - Determines if the system will obsess over metric checks results and run the obsessive-compulsive metric processor commands. MISC. SETTINGS 6. Freshness checks Determines if freshness checks are enabled for this metric. These settings useful when passively monitoring a metric while the remote host does not report at a regular interval (heartbeat). For more information on passive monitoring refer to Centerity Website support section "Centerity Windows Passive Monitoring Guide". 7. Freshness threshold - Specifies the freshness threshold (in seconds) for this metric. Centerity Monitor will determine a freshness threshold to use automatically when setting this value to 0, 8. Event Handler Run action because of change events. Can trigger actions on remote metrics such as restart service, reboot computer, delete temp file, run scripts, etc. 9. Enable / Disable Event Handler Determines if event handler for this metric is enabled. 10. Event Handler Command - The command defined in the Event Handler section 11. Flap Detection Determines if flap detection is enabled for this metric. Centerity Monitor supports the detection of hosts and metrics that are "flapping". Flapping occurs when a metric or host 95

Chapter 6: Metrics 96 changes state too frequently, resulting in a many problem and recovery notifications. Flapping can be indicative of configuration problems (i.e. thresholds set too low) or real network problems. 12. Flap Threshold Defines low and High Thresholds for Flap Detection Mechanism. 12.1. Low flap threshold - Specifies the low state change threshold used in flap detection for this service. 12.2. High flap threshold Specifies the high state change threshold used in flap detection for this metric. 13. Process performance data Determines whether processing of performance data is enabled for this metric. Note: If you disable Data performance for specific metric graph information will not be created 14. Retain status information Determines whatever status-related information about the metric is retained across program restarts. 15. Retain non-status information - Determines whether non-status information about the host is retained across program restarts. 16. Stalking Enabled - When enabled, this allows to log changes in metric and host checks even if the state of the host or metric does not change. When stalking is enabled for a particular host or metric, Centerity Monitor will watch that metric very carefully and log any changes occur. This can be very helpful for later analysis of the log files. 17. Stalking options - Determines which host states stalking is enabled. Valid options are a combination of one or more of the followings: OK, Critical, Warning, or Unknown. 96

Chapter 6: Metrics 97 METRIC EXTENDED INFORMATION Extended metric information entries effect on how information is displayed and has no effect on monitoring. 1. Graph Enabled: Enable / Disable graphing for this metric. 2. Graph Template: Select Customized graph or a pre-defined graph from the drop-down list. If no graph is selected, the system will automatically graph metrics. 3. External URL: Link to an external URL for the metric. Will appear in the status tab when viewed in the monitor. 4. Notes URL: Link to an external URL, such as a CRM application or any other application. 5. Icon Image & Alternate text: Set icon and text for when the mouse hovers over icon. 97

Chapter 6: Metrics 98 METRIC DETAILS Metric details screen display custom information related to this metric. None of the defined in the details tab affects the metric execution. 98

Chapter 6: Metrics 99 EDIT A METRIC PROFILE Admin Menu Management Metrics To edit a Metric Template, go to the Admin menu and click Metrics from the left management menu to display all the metric profiles available. You can search for a specific metric from the search box on the page. After finding the desired template, click the edit link the Metric Properties column UPDATE METRIC MEMBERS Available on the general tab of metric templates, is the Update Options section: Update template only: Changes to the metric template alone will only apply to hosts added in the future. Update selected hosts Update any changes made to the metric template on all selected hosts. Update all hosts Update any changes made to the metric template on all hosts that are currently being monitored. Note: The metric name will stay unique on every host. 99

Chapter 6: Metrics 100 DISPLAYING A LIST OF HOSTS WITH A SPECIFIC METRIC To view all hosts that are associated with a Metric Profile, either click on the name of the metric in the metrics page, or click on the number in the Number of Hosts column. METRIC SEARCH OPTIONS To locate a specific Metric Profile, you can use the Search Box at the top of the page, or display by Metric Type from the drop-down menu. 1. Search Metric - Search for a Metric Profile name. You may enter partial keywords to find your desired metric. Search also be used by using the Metric Type drop down menu to locate a specific metric by category. 2. Search Member - Search for metrics which has been assigned to Hosts. Selecting Member and entering a partial name of the metric, will display the associated metrics and Hosts. From those search results, you can perform tasks such as Enable, Disable, or Delete. 100

Chapter 6: Metrics 101 EDIT A HOST-ASSOCIATED METRIC There are 2 methods to access a Metric that is assigned to a host: 1. Directly from Host From the Hosts menu, choose the desired host and scroll to the Associated Metrics table and click on the Metric name. 2. Metric Profile host list From the Metric Profile, click on the Metric name to display all hosts that are using this metric. Click Edit and you will be taken to the Metric Definition screen for this Metric on the Host. Note: you cannot change the Host name from this screen. Save as a Template - Before saving this Metric you can create a Metric Profile from the specified settings and then associate the template with new or existing hosts. At the bottom left of page, across from the Save button, you will see Save as template. Mark the checkbox and click Save. This will create a new Template with the name of the Metric. 101

Chapter 6: Metrics 102 APPLYING A METRIC PROFILE TO MULTIPLE HOSTS OR HOSTS GROUPS Adding a Metric to a host was covered in Chapter 2: Administering Hosts. Follow these directions to add a Metric to one host, several hosts, or to host groups. Admin Menu Management Metrics From the Metric Definition screen, select the Host(s) in the Host Members list. Additionally, you may apply the metric to Host Groups by selecting the groups from the Host Groups list. 102

Chapter 7: Contacts and Contact Groups 104 Chapter 7: Contacts and Contact Groups CREATING A NEW CONTACT A contact definition is used to identify persons who should be contacted when a problem occur. 1. Contact Name Short name used to identify the contact. It is referenced in contact group definitions. 2. Contact Alias long name or description for the contact. The $CONTACTALIAS$ macro will contain this value. 3. Enable / Disable Contact Define the active state of a contact. 4. Contact Groups Assigned contact groups for the specific contact 5. Email Contact email address. Mandatory to receive email notifications. 6. Phone Number Contact phone number. Mandatory to receive text-message notifications. 7. User password Contact password. Also, can be automatically generated by pressing the "Generate" button. 104

Chapter 7: Contacts and Contact Groups 105 HOST NOTIFICATIONS 1. Host Notification Period Time-period during which the contact can be notified about host problems or recoveries. 2. Host Notification Options - Host states for which notifications can be sent out to this contact. Valid options are a combination of one or more of the following: Recovered, Unreachable, and Down. 3. Host notification commands: List of commands used to notify the contact of a host problem or recovery. Multiple notification commands can be selected by holding down the Ctrl or Shift key while selecting the commands. All notification commands are executed when the contact needs to be notified. METRIC NOTIFICATIONS 1. Metric Notification Period Time-period during which the contact can be notified about metric problems or recoveries. 2. Metric notification options States the notifications to be sent out to this contact. Valid options are a combination of one or more of the following: Recovered, Critical, Warning, and Unknown 3. Metric notification commands - List of commands used to notify the contact of a metric problem or recovery. Multiple notification commands can be selected by holding down the Ctrl or Shift key 105

Chapter 7: Contacts and Contact Groups 106 while selecting the commands. All notification commands are executed when the contact needs to be notified. USER SETTINGS 1. Email - The email address for the contact. Depending on how you configure your notification commands, it can be used to send out an alert email to the contact. The $CONTACTEMAIL$ macro will contain this value. 2. Phone - Phone number for the contact. Depending on how you configure your notification commands, it can be used to send out an alert page to the contact. The $CONTACTPAGER$ macro will contain this value. 3. User Password - Password for the user to login to Centerity Monitor. The password is encrypted by default but you can generate a password for the user by clicking the Generate button. The password will be displayed until you click Save. Note: After you save the contact, the password is encrypted and not available for viewing in Centerity Monitor web. CONTACT PERMISSIONS Centerity Monitor allows to manage user permissions and control which information and commands users can access. User permissions can be set to view only a specific metrics or hosts by removing all permissions listed below (only allowing the user Web Login). 106

Chapter 7: Contacts and Contact Groups 107 1. Web Login Determines if user can access the Monitor Console, Dashboard, reports, etc. 2. Web administration: 2.1. Administration: Grant user permissions to be administrator and have full access to system configuration, management and resources. 2.2. Limited: Grant user limited permissions. 2.3. Group Admin: Grant user permissions to manage all hosts relevant to their contact group. Note: If you disable user permissions for all host / system information, the user will not be able to view the dashboard, and this feature will be removed from the menu. 3. Authorized for all hosts - Set user permissions to view status and configuration information for all hosts. Users in this list are also automatically authorized to view information for all metrics. 4. Authorized for all host commands - Set user permissions to issue commands for all hosts via the command. Users in this list are also automatically authorized to issue commands for all metrics. 5. Authorized for system information - Set user permissions to view system/process information in the extended information. 6. Authorized for configuration information - Set user permissions to view configuration information in the configuration. Users in this list can view information on all configured hosts, host groups, metrics, contacts, contact groups, time periods, and commands. 7. Authorized for API: Allow contact to execute API commands. API token is listed below. 8. Authorized for topology commands: Allow user to execute topology discoveries. 9. Authorized for all metrics - Set user permissions to view status and configuration information for all metrics. Users in this list are not automatically authorized to view information for all hosts, but only the hosts under their contact group. 107

Chapter 7: Contacts and Contact Groups 108 10. Authorized for all metric commands - Set user permissions to issue commands for all metrics via the command. Users in this list are not automatically authorized to issue commands for all hosts and not automatically authorized to view status or configuration information for all hosts. 11. Authorized for system commands - Set user permissions to issue system/process commands via the command. 12. Hide sensitive information - Remove Check command data and arguments from this user. If you are storing clear text passwords in the Arguments field in Metric Profiles this will encrypt the data in the standard Monitor views. Note: Sensitive information will not be hidden in the admin menu. 13. Can view topology maps: Allow user to view Topology map results. CREATING A NEW CONTACT GROUP Admin Menu Management Users Contact Groups A contact group definition is used to group one or more contacts together for the purpose of sending out alert/recovery notifications. When a host or metric has a problem or recovers, Centerity Monitor will find the appropriate contact groups to send notifications to, and notify all contacts in those groups. 1. Contact group name - Short name used to identify the contact group. 2. Alias - long name or description used to identify the contact group. 108

Chapter 7: Contacts and Contact Groups 109 3. Contact Members - List of the short names of contacts that should be included in this group. Hold down the Shift or Ctrl key to select more than one name. 4. Add to all host groups Add the Contact Group to all Host Groups. 5. Add to all metrics - Add the Contact Group to all Metrics. Note: This does not add the contact group to a Metric Profile. You need to assign the group manually to the Metric Profile as described in Chapter 3 Metric Profiles. ADDING A CONTACT GROUP TO A HOST GROUP To get alerts for a host a contact group that should be notified need to be set. To add new contact group to a specific host group, go to the Host Group section from the main Admin screen and choose the desired Host Group. Then select the new contact group and click the Save button. 1. To give the contact group permissions check the Add Contact groups to all Hosts and metrics under the selected Host group. 2. To remove permissions from the selected host groups, check Remove Contact groups from all Metrics. The host group permissions affect Monitor view for the users in the selected contact group. Note: This only affects users who are not administrators. Administrators can see all the hosts. 109

Chapter 7: Contacts and Contact Groups 110 ADD A CONTACT GROUP TO A BUSINESS SERVICE ADD A CONTACT GROUP TO A METRIC MEMBER 110

Chapter 8: Plug-ins, Templates and Metric Profiles 111 Chapter 8: Plug-ins, Templates and Metric Profiles OVERVIEW Centerity Monitor provides a flexible way to add new monitoring metrics (KPI) using the Plug-ins and Templates mechanism. By harnessing external APIs such as WMI, SNMP, Web services etc., you can query the status, performance, and availability of almost all hardware devices, operating systems, and applications. Centerity Monitor relies on external programs - called plug-ins, to check a metric or host that is being monitored. This method delivers very high performance and more flexibility on user side. The plug-in generate action to perform the check and then simply returns the results to Centerity Monitor. Centerity Monitor will process the received results from the Plug-in and generate any necessary actions (running event handlers, sending out notifications, etc.). The correlation between plug-ins and Metric checks is simple. When Centerity Monitor needs to check the status of a defined metric, it will execute the plug-in specified in the Metric Check Command, and use the arguments of the Metric Definition. The plug-in will check the status of the metric or resource specify and return the results to Centerity Monitor. Plug-ins are compiled executable or scripts (Perl, shell, etc.) that can be run from a command line to check the status of a host or metric. Centerity Monitor uses the results from plug-ins to determine the status of hosts and metrics on your infrastructure. 111

Chapter 8: Plug-ins, Templates and Metric Profiles 112 MANAGING PLUG-INS Admin Menu Utilities Plug-ins Add Centerity Monitor allows managing plug-ins from a simple web interface. It is simple to view and edit plug-in information, execute the checks online, view plug-in help, and much more. From the Admin menu, under the Utilities section, choose Plug-ins. The page will display the Plug-ins installed and available on the system. ADDING A NEW PLUG-IN Click the Add button in the top right of the page. New Plug In page will be displayed. There are three ways to upload new plug-ins: 1. Scan Directory Upload via FTP or sftp the new plug-in and click the Scan Directory button. This will detect new plug-ins available in the directory. For new plug-ins, the checkbox on the right is clickable. Mark new plug-in and click Save in order to save the new Plug-ins to the database. 2. Upload Local Plug-in Select a plug-in from your local computer and click Upload to send the plugin to Centerity Monitor and update the database. 3. Remote server file browser Upload the plug-in to your home directory and use this option to browse the file system remotely to find the new plug-in. 112

Chapter 8: Plug-ins, Templates and Metric Profiles 113 PLUG-IN INFORMATION SCREEN 1. Scan Directory Scans the /nagios/libexec directory and allows plugin addition directly from that folder. 2. Plug-in Name - Short name of the plug-in. If it was chosen to upload the file and not use the automatic directory scan, this will become the plug-in name. 3. Plug-in Description - A long description of the plug-in. 4. Plug-in Type Select category for the selected plug-in. This is informational data only, but it allows you to be more efficient in your Plug-ins management. 5. File Location Click on the link to open or save the plug-in to your local computer for editing. 6. Comments any other relevant information related to the Plug-in. A command definition defines commands for Metric checks, Metric notifications, Metric event handlers, host checks, host notifications, and host event handlers. Command definitions can contain macros, but it is most important to make sure that it includes only those macros that are "valid" for the circumstances when the command will be used in Centerity Monitor. 113

Chapter 8: Plug-ins, Templates and Metric Profiles 114 COMMAND TEMPLATES Command Templates are accessed from the Admin Menu, under Templates Commands. Admin Menu Templates Commands There are three different Command Templates used in standard operations: 1. Host Check Command These are instructions for Centerity Monitor to run on every host check occurs. Usually host checks are not run in regular intervals, only when one or more problems or state changes from OK to any other state. This Host command is bound to the host itself and can be defined in the Host Template or in the Host settings. 2. Metric Check Command Metric check command is used in every Metric Profile assigned to a host, and it performs operations as defined. The information returned by the check command to Centerity Monitor is interpreted and analyzed, and spawns different actions which are eventually displayed in the Monitor Console. 3. Notification Commands Notification commands are used to notify the contact of a problem or recovery. All notification commands are executed when the contact needs to be notified, per definitions. The maximum amount of time that a notification command can run is controlled by the notification timeout option. 114

Chapter 8: Plug-ins, Templates and Metric Profiles 115 CREATING HOST /METRIC CHECK COMMANDS Admin Menu Templates Commands Host / Metric Add To create Metric command definition to use in Host definition or in the Metric Profile choose Commands under Templates in the Admin menu and choose either Host Command or Metric Command. A list of all available commands for Hosts and Metrics will appear. It is possible to either locate a command and duplicate it, or create a new command definitions. To create a new Command, click the Add button at the top right corner of the page. 115

Chapter 8: Plug-ins, Templates and Metric Profiles 116 1. Host / Metric Command Name Short command name that will be used by the monitor. It will also be displayed under the Metric Profile. Choose a short name that will enable you to locate the command quickly. 2. Description A Long meaningful description. This is informational data only and does not affect the monitoring process. 3. Metric Type Choose a category that fits the command to aid in batch operations or to display the commands by categories. 4. Select Plug-ins The plug-in used by the Host or Metric command which will be executed with the arguments passed by the monitor server. 5. Command Definitions - Arguments that will be passed to the plug-in. For example, if the plug-in gets parameters such as H <ipaddress> -w <warning> -c <critical> you can specify here the exact settings such as H 192.168.1.1 w 80% -c 90%, and these settings will be passed to the plug-in by default. It is also recommended to use macros (see Appendix A: Macros), and not hard-coded parameters. For example, in order use the host address, use $HOSTADDRESS$, for warning $ARG1$, and for critical $ARG2$.This will be taken from the arguments of the Metric. 6. Command Example Informational data only which does not affect the monitor. 7. Command Default Values Informational settings that will be applied to the Metric Profile Arguments and will provide a display on how the command should be defined with a macro separator. 8. Comments Any other relevant information. When using macros in the Command Definitions field such as: $ARG1$ and $ARG2$ note that the separator between them is the! sign. Note: Click the Plug-in Help button to find out which command switches available for the current plug-in 116

Chapter 8: Plug-ins, Templates and Metric Profiles 117 WORKING WITH COMMANDS There are three types of commands: 1. Vanilla Command - The command name is the name of a command that was previously defined. 2. Command w/ Arguments Same as "vanilla" command style, but with command options separated by a! character. Arguments are separated from the command name (and other arguments) with the! character. The command should be defined to make use of the $ARGx$ macros. Note: Centerity Monitor will handle a maximum of sixteen command line arguments ($ARG1$ through $ARG16$). 3. "Raw" Command Line - An actual command line to be executed. To do so the syntax must enclose the entire command line in double quotes. CREATING NOTIFICATION TEMPLATES Notification commands are very similar to the Standard Check commands but due to flexible enhancements, the notification field allows to enter a raw command in the definition. Example Send Mail alert for user: /usr/local/nagios/tools/centerity _sendemail -f Centerity @mailhost.net -t $CONTACTEMAIL$ -u "$HOSTALIAS$ - $HOSTNAME$" -s 64.202.165.58 -m "Notification: $NOTIFICATIONTYPE$\r\n--------------- ------------------\r\nhost: $HOSTALIAS$\r\nAddress: $HOSTADDRESS$\r\nAddress: $HOSTADDRESS$\r\nState: $$HOSTSTATE$\r\nAdditional Info: $OUTPUT$\r\nDate/Time: $DATETIME$\r\n\n*** Message generated by Centerity Monitor ***\r\n\n" -cr host -ch $HOSTNAME$ 117

Chapter 8: Plug-ins, Templates and Metric Profiles 118 Notification commands are assigned directly to contacts and used to notify the contact of a problem or recovery. Multiple notification commands should be separated by commas. All notification commands are executed when the contact needs to be notified. ASSIGNING A CHECK COMMAND TO A METRIC PROFILE Once defining a Metric command, it needs to be assigned to a new Metric Profile or to an existing host. Add or edit the template as described in Chapter 3: Metric Profiles. Open the Command Properties section and select the Metric Check Command for your newly added template. Apply the new arguments as necessary. This option is also available to an existing Associated Metric under Host in the Hosts Menu. Note: For convenience purposes, selecting a new check command replaces the content of the Arguments to fit the current argument format for the Check Command Template. 118

Chapter 9: Maps 119 Chapter 9: Maps OVERVIEW A network diagram is always important to visualize problems in your network. Centerity Monitor provides 4 types of maps 1. Hyper Map 2. Topology map 3. Live Network map The Hyper Map, Air View and Topology map will be created automatically based on hierarchy definition ant parent-child relationship. VISUAL LAYOUTS - HYPERMAP The Hyper map provides dynamic and interactive network layout. Each Host-Group automatically creates a Hyper-Map. The hyper map provides real-time indication about problems with the metrics in every host or host group. In case of new event, the host background color in the hyper map will present the status (yellow - warning, orange - unknown, red - critical). 119

Chapter 9: Maps 120 VISUAL LAYOUTS - TOPOLOGY MAP The Topology Map represents the result of the Topology scan. 120

Chapter 9: Maps 121 VISUAL REAL-TIME LAYOUTS Centerity Visual Live Layouts Module provide fast and easy way to create verity of live layout such as geographical maps, business processes (BPM), Network chart etc. The live layout presents the status of each component including hosts, metrics (services), host groups and business services. Creating New Layout Admin Menu Maps press "+" to add new layout 1. From the admin menu bar select Map Map Designer Build Layout Save Enable Map 2. Press on the Add button (right top corner) to open a new map builder. Fill in the new layout name and Click "OK" 121

Chapter 9: Maps 122 3. Layout designing Centerity allows easy drag & drop process with verity of built-in icons and options to design advanced layouts. Each icon can represent one of the following objects in the system: 3.1. Host The system will present the host status as following: 3.1.1. Host up with no warning only the icon 3.1.2. Host Down Red Halo around the icon 3.1.3. Host with one or more metrics in critical state red Halo with a Metric icon 3.1.4. Host with one or more metrics in warning state Yellow Halo 3.1.5. Host with one or more metrics in Unknown state Orange Halo 3.2. Host Group The system will present the host Group status as following: 3.2.1. Host Group with no warning Clear icon with no halo 3.2.2. Host Group with one or more hosts in down Red Halo around the icon 3.2.3. Host Group with one or more metrics in critical state red Halo with a Metric icon 122

Chapter 9: Maps 123 3.2.4. Host Group with one or more metrics in warning state Yellow Halo 3.2.5. Host Group with one or more metrics in Unknown state Orange Halo 3.3. Metric - The system will present the host status as following: 3.3.1. Metric in OK state only icon or green led 3.3.1.1.1.1.1. 3.3.2. Metric in critical state red Halo / Red led 3.3.3. Metric in warning state Yellow Halo / Yellow Led 3.3.4. Metric in Unknown state Orange Halo / Orange Led 3.4. Business Service The system will present the BSM percentage availability. 4. To add a new object to the layout, drag the selected icon from the left menu pane to the stencil and drop it. Double clicking on the icon will open the object properties window: 123

Chapter 9: Maps 124 5. To add line-connection between two objects use the connector button drag the curser from one object to the other. Double clicking on the line will open advanced properties for the line status. 6. Saving new layout Click on the disk icon to save the new layout. 7. Enabling new layout - To enable / disable map, mark the checkbox and press the enable button on the screen top right corner. ADVANCED DESIGNER SETTINGS Centerity live layout module allows advanced designing settings. 124 1. Click on the "designer settings" button on the top right of the screen.

Chapter 9: Maps 125 The designer settings screen includes several options as follows: 1.1. Map Resolution - Define the layout resolution. 1.2. Background Selected background for the layout (any PNG / GIF file from the media manager can be selected as background) 1.3. Grid enable / disable grid lines. 1.4. Auto save define auto save. Note: Auto save will save automatically the latest version with no Redo option. 125

Chapter 9: Maps 126 VISUAL LIVE LAYOUTS MODULE VIEWS & SLIDE SHOWS The live layouts module allows defining automatic slide show of multiple selected layouts. Admin Menu - Maps Maps View "+" (Add New) Insert view properties Select members (2nd tab) Click OK to save 1. Select "Map Views" tab in the admin section 2. Click the Add-View button on the top right corner 3. On that screen, there are 2 tabs: "Views Settings" and "Views Members" 3.1. in the views settings tab fill in the information as following: 3.1.1. View Name slide show name. 3.1.2. View description slide show description 3.1.3. Slides Interval the time intervals between layouts 3.1.4. Refresh Interval the refresh time intervals. 3.1.5. Map Title display the map title. 126

Chapter 9: Maps 127 3.2. In the "Views Members" tab: 3.2.1. Select the layouts that will appear in the slide show by checking the checkbox near the selected layout. 3.2.2. Click ok to save. 127

Chapter 10: Host & Metrics Dependencies 128 Chapter 10: Host & Metrics Dependencies HOST DEPENDENCIES Configuring New Host Dependencies: Admin Menu - Host Dependencies Tab Press "+" icon Select Dependencies Select Failure Criteria & Save Install Policy Click on the + icon. 1. Select Dependent hosts from the left column showing all available hosts. 2. Select their failure criteria up/down/unreachable. 3. Click "Ok". 128

Chapter 10: Host & Metrics Dependencies 129 Removing Host Dependencies: 1. Select the host you want to remove in the checkbox. 2. Click on the X button and click "Ok" to confirm. METRIC DEPENDENCIES Admin Menu - Hosts MetricsTab - Select Metric Dependencies Tab - Click "+" Select Dependencies Select Failure Criteria & Save Install Policy 129

Chapter 10: Host & Metrics Dependencies 130 Adding New Metric Dependencies: Adding Metric Dependencies: Click on the + icon. 1. Click on the + icon 2. Select Dependent metric from the left column showing all available metrics. 3. Select their execution failure criteria Ok/Warning/Unknown/Critical. 4. Select their notification failure criteria Ok/Warning/Unknown/Critical. 5. Click "Ok". Removing Metric Dependencies: 1. Select the metric you want to remove in the checkbox. 2. Click on the X button and click "Ok" to confirm. 130

Chapter 10: Host & Metrics Dependencies 131 Viewing and managing all dependent hosts and metrics from settings menu. Managing host dependencies: Description: The host dependency description. Host Name: The host name. Dependent Host Name: The dependent host name. Notifications failure criteria: The host status on which the dependent host will fail, and will not send 131

Chapter 10: Host & Metrics Dependencies 132 notifications to users. Comments: Admin comments. Managing metric dependencies: Description: The Metric dependency description. Host Name: The host name of the service. Metric Description: The dependency description. Dependent Host Name: The dependent host name. Dependent Metric Description: The dependent metric name and description. Execution Failure Criteria: The host status, on which the dependent Metric will fail, will not continue checking the dependent Metric and will not send notifications about the Metric status. Notifications failure criteria: The host status on which the dependent Metric will fail, and will not send notifications to users. Comments: Admin comments. 132

Chapter 11: Escalation 133 Chapter 11: Escalation Centerity Monitor provides powerful solution for host and Metric notifications. 1. Host escalations - escalate host events (up, unknown and down states.) 2. Host group escalations - handle multiple host escalations. 3. Metric escalations - escalate all Metric events ok, warning, critical and unknown states. HOST ESCALATIONS 1. Under the Users tab in the admin section of the system click on "Escalations" and then click Hosts : 2. In the host escalations screen click on the "+" button. 3. Complete all fields in the following order: 133 1.1. Description: The escalation description.

Chapter 11: Escalation 134 1.2. Host Name: The escalated host. 1.3. First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification. 1.4. Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone. 1.5. Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). Note: In the screenshot above, the notification will be escalate after 3 notifications to the first level escalations. The escalation will be sent 5 times to the escalation group every 10 minutes. If by then, the event isn t solved it ll send notifications to the first group again, etc. 4. Go to the escalated host, click the Advanced tab: 5. Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). 134

Chapter 11: Escalation 135 METRIC ESCALATIONS 1. Under the Users tab in the admin section of the system click on "Escalations" and then click Metrics : 2. In the metric escalations screen click on the "+" button. 3. In the following screen fill in all the fields in the following order: 135

Chapter 11: Escalation 136 3.1. Description: The escalation description. 3.2. Host Name: The host to choose the escalated Metric from. 3.3. Dependent Metric: The escalated Metric. 3.4. First Notification: The number of times a notification will occur to the first notification level before it s escalated. 1 Will send a notification to the escalation group from the first notification. 3.5. Last Notification: The number of times the escalation group will receive notifications before the notification will go back to notifying the first group again. Notification Interval: The Interval from notification to notification (in minutes). If 0 It will only send one notification to the escalation group, and then stop sending notifications to everyone. 3.6. Contact Groups: The contact group of the escalation. (Note: if you wish, after the escalation is reached to keep notifying the first level of notifications add them to the selected contact groups). Note: In the screenshot above, the notification will be escalate after 3 notifications are sent to the first level escalations, the escalation will be sent once to the escalation group and will stop after that. 4. Go to the escalated metric, click the commands tab: 5. Under Notification Settings make sure the Notification Interval section is enabled (the checkbox on the right should be marked, and the section colored blue). In this section, change the number of the intervals to the number of minutes between each notification for the first level of notifications (Note: if set to Once, there will not be an escalation). 136

Chapter 12: Settings 137 Chapter 12: Settings OVERVIEW Centerity s Settings menu provides wide range of general settings for different personal preferences and maximum, performance. GENERAL TAB General Setting 1. Admin Email - This is the email address for the administrator of the local machine. 2. Admin Pager - This is the pager number (or pager email gateway) for the administrator of the local machine. 3. Date Format - This option allows you to specify what kind of date/time format Centerity should use in the web interface and date/time macros. 4. Select Timezone This option allows you to change timezone. 5. Passive Metric Check Acceptance - This option determines whether Monitor Server will accept passive metric checks when it initially (re)starts. 6. Notifications Option - This option determines whether Centerity will send out notifications when it initially (re)starts. 7. Top Menu Logo - Select which logo you want to display on top menu. 137

Chapter 12: Settings 138 Event Handlers 1. Enable Event Handlers - This option determines whether Centerity will enable event handlers. 2. Global Host Event Handler - This option allows you to specify a host event handler command that is to be run for every host state change. 3. Global Metric Event Handler - This option allows you to specify a metric event handler command that is to be run for every metric state change. Data Handling 1. Soft State Dependencies - This option determines whether Centerity will use soft Metric state information when checking Metric dependencies. 2. Process Performance Data - This value determines whether Centerity will process host and Metric check performance data. Status Note: Disabling this option eliminates graph creation 1. Retain State Information - This option determines whether Centerity Monitor will retain state information for hosts and metrics between program restarts. 2. Retention Update Interval - This setting determines how often (in minutes) that Centerity Monitor will automatically save retention data during normal operation. 3. Use Retained Program State - This setting determines whether Centerity Monitor will set various program-wide state variables based on the values saved in the retention file. 4. Use Retained Scheduling Info - This setting determines whether Centerity Monitor will retain scheduling info (next check times) for hosts and metrics when it restarts. 5. Aggressive Host Checking - Centerity Monitor tries to be smart about how and when it checks the status of hosts. 6. Parent-Child mode: Enable/Disable parent child relationships between two separate nodes. WEB SETTINGS TAB 1. Screen Refresh Rate - This option allows you to specify the number of seconds between page refreshes for the status, status map, and extinfo CGIs. 2. Dashboard Refresh Rate - This option allows you to specify the number of seconds to refresh the Dashboard. 3. Password Complexity: Enable/Disable password complexity and define all the required settings. 4. Online Command Remote Mode: Enable/Disable the ability to execute test commands directly from the node. Map Settings 1. Dashboard Map A - This option allows you to specify the default dashboard map A. 2. Dashboard Map B - This option allows you to specify the default dashboard map B. 138

Chapter 12: Settings 139 Sound Settings 1. Host Unreachable Sound - Play audio file when Host is unreachable. 2. Host Down Sound - Play audio file when Host is down. 3. Metric Critical Sound - Play audio file when Metric is in critical state. 4. Metric Warning Sound - Play audio file when Metric is in warning state. 5. Metric Unknown Sound - Play audio file when metric is in unknown state. 6. Normal Sound - Play audio file when state is ok. Web Admin Settings Rows per Admin Page - The number of rows to display on a single page in admin tab. Rows per Monitor Page - The number of rows to display on a single page in monitor tab. Persistent Tabs - Remember Last tab selected. Hyper Map Mode Choose between a full map view and a view of Host groups & Subgroups. Group Admin Node Access: Enables/Disables group admin node accessibility. When disabled the group admin will be able to access all nodes. When enabled the access will be limited according to permissions. STATUS SETTINGS TAB Host & Metric Checks 1. Check External Commands - This option determines whether or not Centerity Monitor will check the command file for internal commands it should execute. 2. External Command Check Interval - Determines how often Centerity Monitor checks commands submitted. (I.e. from web, Passive Checks) 3. Check for Orphaned Metrics - This option allows you to enable or disable checks for orphaned metric checks. Timing 1. Inter Check Sleep Time - Number of seconds that Centerity Monitor will sleep before checking to see if the next Metric check in the scheduling queue should be executed. 2. Inter Check Delay Method - This option allows you to control how Metric checks are initially "spread out" in the event queue. 3. Metric Interleave Factor - This variable determines how Metric checks are interleaved. Interleaving allows for a more even distribution of Metric checks, reduced load on remote hosts, and faster overall detection of host problems. 4. Maximum Concurrent Checks - This option allows you to specify the maximum number of Metric checks that can be run in parallel at any given time. Specifying a value of 1 for this variable essentially prevents any metric checks from being parallelized. 5. Metric Reaper Frequency - This option allows you to control the frequency in seconds of metric "reaper" events. "Reaper" events process the results from parallelized metric checks that have finished executing. 139

Chapter 12: Settings 140 Timeouts 1. Interval Length - This is the number of seconds per "unit interval" used for timing in the scheduling queue, re-notifications, etc. "Units intervals" are used in the host configuration file to determine how often to run a metric check, how often of re-notify a contact, etc. 2. Metric Check Timeout - This is the maximum number of seconds that Centerity Monitor will allow metric checks to run. If checks exceed this limit, they are killed and a CRITICAL state is returned. A timeout error will also be logged. 3. Host Check Timeout - This is the maximum number of seconds that Centerity Monitor will allow host checks to run. If checks exceed this limit, they are killed and a CRITICAL state is returned and the host will be assumed to be DOWN 4. Event Handler Timeout - This is the maximum number of seconds that Centerity Monitor will allow event handlers to be run. If an event handler exceeds this time limit it will be killed and a warning will be logged. 5. Notification Timeout - This is the maximum number of seconds that Centerity Monitor will allow notification commands to be run. If a notification command exceeds this time limit it will be killed and a warning will be logged. 6. Aggregate Status Updates - This option determines whether or not Centerity Monitor will aggregate updates of host, metric, and program status data. If you do not enable this option, status data is updated every time a host or metric checks occurs. 7. Aggregated Status Update Interval - This setting determines how often (in seconds) that Centerity Monitor will update status data in the status file. The minimum update interval is five seconds. LOGGING TAB General Settings 1. Log Rotation Method - This is the rotation method that you would like Centerity Monitor to use for your log file. 2. Use SYSLOG - This variable determines whether messages are logged to the SYSLOG facility on your local host. Retry Loggings 1. Log Notifications - This variable determines whether or not notification messages are logged. 2. Log Host Retries - This variable determines whether or not host check retries are logged. 3. Log Metric Retries - This variable determines whether or not metric check retries are logged. Metric check retries occur when a metric check results in a non-ok state. 4. Log Event Handlers - This variable determines whether or not metric and host event handlers are logged. Event handlers are optional commands that can be run whenever a metric or hosts changes state. State Logging 1. Log Initial States This variable determines whether or not Centerity Monitor will force all initial host and metric states to be logged. 140

Chapter 12: Settings 141 2. Log External Commands - This variable determines whether or not Centerity Monitor will log external commands that it receives from the external command file. 3. Log Passive Metric Checks - This variable determines whether or not Centerity Monitor will log passive host and metric checks that it receives from the external command file. Mail Settings These are the mail settings used to send out reports. 1. SMTP User Name: Represent email s username account, 2. SMTP User Password: Represent email s password account. 3. SMTP Server: Represents email server address. 4. SMTP Alias Name: The e-mail that the email will appear to be sent from. 5. SMTP TLS: Represents the use of TLS protocol. The following are optional parameters: o o SMTP Alias Name SMTP TLS OTHER SETTINGS TAB OSCP Commands 1. Obsess Over Metrics - This value determines whether or not Centerity Monitor will "obsess" over metric checks results and run the obsessive compulsive metric processor command you define. 2. Obsessive Compulsive Metric Processor Command - This option allows you to specify a command to be run after every metric check, which can be useful in distributed monitoring. This command is executed after any event handler or notification commands. 3. Obsessive Compulsive Metric Processor Timeout - This is the maximum number of seconds that Centerity Monitor will allow an obsessive compulsive metric processor command to be run. 4. Performance Data Processor Command Timeout - This is the maximum number of seconds that Centerity Monitor will allow a host performance data processor command or metric performance data processor command to be run. Flap Detection 1. Enable Flap Detection - This option determines whether or not Centerity Monitor will try and detect hosts and metrics that are "flapping". Flapping occurs when a host or metric changes between states too frequently, resulting in a barrage of notifications being sent out. 141

Chapter 12: Settings 142 2. Low Metric Flap Threshold - This option is used to set the low threshold for detection of metric flapping. 3. High Metric Flap Threshold - This option is used to set the high threshold for detection of metric flapping. 4. Low Host Flap Threshold - This option is used to set the low threshold for detection of host flapping. 5. High Host Flap Threshold - This option is used to set the high threshold for detection of host flapping. Freshness 1. Check Metric Freshness - This option determines whether or not Centerity Monitor will periodically check the "freshness" of metric checks. 2. Metric Freshness Check Interval - This setting determines how often (in seconds) Centerity Monitor will periodically check the "freshness" of metric check results. SNMP Settings 1. Reset SNMP State - This option determines whether or not Policy Manager will reset all SNMP TRAPS metrics to status ok. Enable this function if you don't use retention state. SYSLOG Settings 1. Reset SYSLOG State - This option determines whether or not Policy Manager will reset all syslog metrics to status ok. Enable this function if you don't use retention state. 2. Syslog Database: Defines whether syslog is written to the database or not. Data Settings 1. Remove RRD data files - This option determines whether or not rrd data file will be removed upon metric deletion. Note: If you choose not to enable file deletion and you add the metric again, new data will be appended to the file. 2. History Data - This option determines whether or not history stored data will be removed. Select a period of time to keep historical data RESOURCE SETTINGS TAB This setting screen allows adding user-names and passwords for monitored hosts and metrics. All fields from $USER6$ are available. For secured credentials use fields $USER14$ - $USER$32 which hide the credentials text. 142

Chapter 12: Settings 143 CENTRAL TAB General Settings 1. Server name - Centerity Monitor distributed node name. 2. Enable cluster mode - Activate Centerity Monitor enterprise edition in cluster mode. Note: Requires proper license Note: This feature require valid license in order to activate the monitor server in distributed environment with Centerity Monitor Enterprise edition. Please contact support team support@centerity.com for additional information. 3. Centerity Monitor Central Servers - Enter IP address or fully qualified domain name of Centerity Monitor enterprise console. Note: Multiple IPs can be specified and separated by comma. 4. Customized Logo: Upload a logo via media manager. Security Settings 1. User Name: Enter username variable determines whether or not notification messages are logged. 2. Password: This variable determines whether or not Centerity Monitor will log passive host and metric checks that it receives from the external command file. 3. Shared Secret: This variable determines whether or not Centerity Monitor will log passive host and metric checks that it receives from the external command file. 4. SSL Mode: Enable/Disable SSL mode. Note: Consult Centerity support before change. 5. Type: Activate Centerity Monitor Push / Pull distributed mode enviroment. Note: Consult Centerity support before change. Administration Settings 1. Limit Node Host and Metrics Global Count: Globally limit all nodes to a certain amount of hosts / metrics. 2. Add / Wizard distributed node selection: Prioritize default node to add new hosts to. 3. Use Central Monitoring Server: 4. Use Local Graphs: 5. Use Local Information: Install Policy Settings 1. Parallel Install Policy: Run Install policy on several nodes Simultaneously. 143

Chapter 12: Settings 144 AUTHENTICATION SETTINGS TAB Local Authentication: Authentication via MySQL database. Active Directory Authentication: Authentication via Active Directory server, requires filling out active directory configuration settings. SYSTEM SETTINGS TAB Centerity Monitor allows you to manage the system without the need of any prior Linux knowledge. The system tab allows you to perform actions to the Centerity Server. 1. Start Monitor Server: Restarts the monitor server and the associated processes. 2. Stop Monitor Server: Stop the monitor server entirely. 3. Restart Monitor Server: Restarts the monitor server. 144

Chapter 12: Settings 145 CATEGORIES Manage the host categories for your monitor. 1. Name The category name. 2. Description The category description. 3. Comments Category comments. 4. Image A logo for the category. 5. Inventory Adds the category to a type of inventory scan. 6. Applet How to connect to the server in the monitor mode. 145

Chapter 12: Settings 146 IMPORT / EXPORT Through this tab you can import and export settings such as host profiles, database settings etc. Export: 146

Chapter 12: Settings 147 1. Analyzers: Exports Graph analyzers: a. Single Analyzer: Allows export of a single analyzer. b. Multiple Analyzers: Allows selection of preferred analyzers. c. Output XML to Browser: Exports an XML output: d. Save file locally: exports a CSP file to local computer. 147 2. Graphs: Exports graphs + attached analyzers.

Chapter 12: Settings 148 a. Single Graph: Allows export of a single analyzer. b. Multiple Graphs: Allows selection of preferred analyzers. c. Output XML to Browser: Exports an XML output: d. Save file locally: exports a CSP file to local computer. 3. Host Information: Allows export of all host information on the Monitor: host name, alias, address, host template, parents. 148

Chapter 12: Settings 149 a. Output to the Browser: Exports a table of hosts: b. Save file locally: exports an EXCEL file to local computer. 4. Host Profile: Allows export of a host profile, including metrics and plugins. a. Output to the Browser: Exports an XML output: 149

Chapter 12: Settings 150 b. Save file locally: exports a CSP file to local computer. 5. Centerity Solution Pack: Allows export of metrics including plugins. a. Output to the Browser: Exports an XML output: 150

Chapter 12: Settings 151 b. Save file locally: exports a CSP file to local computer. 6. Complete Database: Allows export of complete database settings. a. Output to the Browser: Exports an XML output. b. Save file locally: exports a DB file to local computer. 151

Chapter 12: Settings 152 Import: 1. Analyzers: Import Graph analyzers. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 2. Graphs: Import graphs + attached analyzers. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 3. Host Information: Import Host Information. a. Upload File: Allows import from EXCEL file. b. Paste data into browser: Allows pasting of Host Lists. 4. Host Profile: Allows import of a host profile, including metrics and plugins. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 5. Centerity Solution Pack: Allows import of metrics including plugins. a. Upload File: Allows import from CSP file. b. Paste data into browser: Allows pasting of XML data. 6. Complete Database: Allows import of complete database settings. a. Upload File: Allows import from DB file. b. Paste data into browser: Allows pasting of XML data. Note: Complete Database import will erase your current configuration! 152

Chapter 12: Settings 153 MEDIA MANAGER Through this tab you can add images and sounds to be used in the system. Adding an Image file: Admin Menu Settings - Media Manager press "+" to add new image Fill out name, description and select file Select proper category Save 1. Host: Used as host icons (Recommended: 40x40 resolutions). 2. Metric: Used as metric icons (Recommended: 40x40 resolutions). 3. Background Map: Can be used as map background. 4. Misc. images: Can be added to maps as an icon (Recommended: 40x40 resolutions). 5. Logos: A logo that can be displayed along with the Centerity logo on top of the system. Adding Audio file: Audio files can be used as alert sounds. 153 Admin Menu Settings - Media Manager Select "Sounds" as media type press "+" to add new sound Fill out name, description and select file Save

Chapter 12: Settings 154 154

Chapter 13: System 155 Chapter 13: System OVERVIEW Centerity s System menu provides insight into system logs, a user audit log, the status of monitor servers and a task scheduler. MONITOR SERVERS The Monitor Servers view is available for Enterprise License users. This section provides the status of all monitoring nodes attached to the Enterprise manager. 1. Server Name: The given name of the node. 2. IP Address: The node IP-address. 3. Instance: The instance number of the node. When node is not an instance, this will be blank. 4. Start Time: Last recorded start time of the monitoring engine. 5. Running Time: Consistent running time of the monitoring engine. 6. Last Updated: Last recorder time of completed monitoring cycle. 7. Hosts: Number of hosts on the node. 8. Metrics: Number of metrics on the node. 9. Status: The node status, based on monitoring engine running time and state. LOGS All available logs for monitor servers. 155

Chapter 13: System 156 AUDIT LOG The audit log provides the ability to keep track of user activities and actions within the Centerity Monitor. 1. Username: User name that executed the action. 2. IP Address: IP Address from which the action was executed. 3. Interface: The name of the accessed page in the system. 4. Entity Name: The changed entity. For example: a user, a metric, a command, etc. 5. Entity ID: The ID of the entity that has been changed. For example: user id, command id, etc. 6. Action: The executed action. 7. Page Name: Represents the real page name (CGI) that was accessed / changed. 8. Time: Time range to display the logs for. 9. Parameters: This field is a free text search field. The system can match any partial word with a wildcard sign ( * ). For example, if a user is searching all entries that have the value WIN- in it, he will search for WIN*. 156

Chapter 13: System 157 TASK SCHEDULER The task scheduler can be used to schedule any action it can be an inventory scan, a script or a plugin that needs to be run on the monitor server without using crontab. Scheduling new event: 1. Click on the + sign to add a new schedule, and fill out the information on the general tab. 2.1. Name: Scheduler name. 2.2. Description: Scheduler description. 2.3. Category: Scheduler category. 2.4. Status: Enabled/Disabled. 2.5. Comments: Scheduler comments. 2.6. Task Details: Filled out automatically. 157

Chapter 13: System 158 3. Settings: 3.1. Task run type: Select the desired task. 3.2. Select Task: 3.2.1. Select from database: default, saved tasks. 3.2.2. Upload file: upload a script file. 3.3. Arguments: Additional arguments to the script/plugin. 3.4. Selected hosts: Host to execute the inventory/script/plugin on. 4. Triggers: 4.1. Time settings: Select time period hourly, daily, weekly, and monthly. 4.1.1. Select start time. 4.1.2. Select end time. 4.1.3. Select Timezone. 4.2. Task timeout: Select this option only if the task has to finish in a certain amount of time. 4.3. Scheduler settings: Choose how a task should be executed: wait for previous task to finish, run simultaneously etc. 158

Chapter 14: Graphs Configurations 159 Chapter 14: Graphs Configurations OVERVIEW Centerity Monitor provides powerful engine to produce verity of trends and time series data graphs. The value in these graphs differs from metric to metric and reflects the metric performance. For example: CPU Usage in percentage Interface Traffic in Megabytes Disk Space in Gigabytes Metrics availability by returned value 0 or 1 such as power supplies and fans. Performance and Availability graphs will be automatically generated by Centerity collector which runs the following tasks: 1. Analyzer - engine which captures the metric check output information and analyzing the output according to predefined regular expressions disassemble the string to numerical values. 2. DB controller push the information to RRD files which are later can be viewed as graphs and if specified also to create raw data in Database datastore. 3. Graph Creator- building specific graph from the data sources that were captured and pushed to database and assigning it to the metric. Mathematical functions and algorithms can be applied to specific graph such as calculation, division, summary and more. The mathematical functions uses HP RPN calculation format which all also described in appendix A. 159

Chapter 14: Graphs Configurations 160 GRAPH BUILDER METHODOLOGY In order to generate graph it is mandatory to define a metric. For this example the Metric Profile PING will be used (ping usually assigned to each host in order to measure Packet loss, Latency and availability). Monitor procedure 1. Centerity Monitor executes metric checks to remote host either using Agent or Agent less methods. 2. The Plugin return data to the server and the data is being displayed in the web console. Several rules may execute according to the system settings such as Notifications, Event Handlers, Retry checks etc. 3. The Centerity Analyzer receives the data from the metric check and match the regular expression database for the metric PING. In the example below there is a regular expression of two (2) values - Packet loss and RTA : PING.*?(\d+)%.+?([.\d]+)\sms Explanation: If the output of the metric is PING, than the first value will be applied to $1 is the first brackets and the second value applied to $2 will be the second bracket. The system allows to define any regular expression which available in programming languages such as C, PERL and more. 4. Graph settings allow you to visualize the data in your preferred display. Example Graph Result for metric: PING 160

Chapter 14: Graphs Configurations 161 Creating Analyzer Rules Analyzer settings allow flexible capture of data from the plugin output. To create or edit rules follow these steps: Admin Menu > Reports> Analyzer "+" (Add New) Insert template properties Save Install Policy 1. From the Admin menu Reports Graphs Analyzers 2. On the top right click + to add new analyzer 3. Set Template name and Template description.* 4. Select Template type in order to create search sorting more quickly from the main analyzer screen. 5. Paste the plugin output. For the PING Example paste the following data: PING OK - Packet loss = 0%, RTA = 0.05 ms 6. Presses analyze output to generate proper pattern match. NOTE: The analyzer produce pattern to match the rule of the plugin output. However, sometimes it requires some modifications such as removing characters like : or other nonalphanumeric special signs that can interfere the regular expression. For integer numbers the regular expression set the value (\d+) which mean capture complete number for number with fractions the regular expression is set to (\d+.?\d{0,}) which capture both numbers. Create Datasources depeding on how much (\d+) or (\d+.?\d{0,}) were found. 161

Chapter 14: Graphs Configurations 162 7. Assign the capture entry while $1 represents the first entry, $2 the second etc. 8. Select the data source type. There are 4 available data sources: 8.1. GAUGE - Gauge data source represent values such as temperature, number of people in a room, CPU usage in percentage etc. 8.2. COUNTER - Counter is a data source that suitable for continuous incrementing counters such as the ifinoctets counter in a router. The COUNTER data source assumes that the counter never decreases, except when a counter overflows. The update function takes the overflow into account. The counter is stored as a per-second rate. When the counter overflows, RRDTool checks if the overflow happened at the 32bit or 64bit border and acts accordingly by adding an appropriate value to the result. 8.3. DERIVE - Derive data source used to store the derivative of the line sorting from the last to the current value of the data source. This can be useful for gauges. For example - to measure the number of people entering or leaving a room. Internally, derive works exactly like COUNTER but without overflow checks. So if your counter does not reset at 32 or 64 bit you might want to use DERIVE and combine it with a MIN value of 0. 8.4. ABSOLUTE - Absolute data source is suitable for counters which should be "reset" after the last value reading. This data-source should be used for fast counters which tend to overflow. Another usage is for counters such as number of messages since the last update. Note: It is recommended not to use special non-alphanumeric characters since the analyzer uses the name for internal usage. Paste the data whiteout white spaces in the start of the line or in the end of the line. 9. Data source Values It is not mandatory to create data sources for all entries. For example in the PING example if only the first value is required, than only one data source will be created and will be assigned to value "$1" An advanced option is to create a data source which executes mathematical calculation such as: "$1" * "$2" Other examples for optional mathetical functions: Memory value in Bytes can to be multiply by 1,000,000 (data source value should be $1 * 1000,0000) in order to be presented in Mega bytes Total memory used and memory free can be presented in data source ($1 + $2 ) * 1,000,000 162

Chapter 14: Graphs Configurations 163 DISABLE GENERIC GRAPH CREATION By default Centerity Monitor uses 3 analyzer rules to capture unknown data and produce matched graphs. In some cases these rules does not apply to RRD files. It is recommended to disable Generic graph creation by going to the analyzer page selecting the 3 entries: DEFAULT 1 GUAGE DATA applies to 1 value in the plug-in output. DEFAULT 2 GUAGE DATA applies to 2 values in the plug-in output. DEFAULT 32 GUAGE DATA applies to 3 values in the plug-in output. And setting them to disable from the right bottom actions menu Creating Graph By default Centerity Monitor will display a basic graph with the time-frame of hourly, daily, weekly, monthly & yearly. Admin Menu > Reports> Graphs "+" (Add New) Insert Graphs General Setting Insert Graphs properties Setting Save To add a new graph or modify existing graph follow the instructions below: 1. From the Admin Menu Reports Graphs Graphs Add ("+" Button) 2. General Graph Settings - Insert the graphs information 2.1. Garph name 2.2. Graph Description 2.3. Graph type - 2.4. Graph title 2.5. Vertical lables 163

Chapter 14: Graphs Configurations 164 2.6. Enable / Disable Graph 2.7. Comments 3. Using Macros - You can change the Graph title and the Vertical Label to to your needs using macros: $HOSTNAME$ - The hostname. $HOSTADDRESS$ - The host address. $HOSTALIAS$ - The host description. $METRICNAME$ - The metric name. $METRICDESC$ - The metric description. $METRICTEMPLATE$ - The metric Porfile. For Example: 4. Properties Tab 4.1. Graph Height the height of the graph. 4.2. Graph Width the width of the graph. 4.3. Units Value - With this option y-axis values on logarithmic graphs will be scaled to the appropriate units (k, M, etc.) instead of using exponential notation. Note that for linear graphs, SI notation is used by default. Note: in order to set a graph to start at "0" set the value: l=0 1. Positiioning the graph Datasources 164 After saving the general and properties settings a new tab will be generated. Thid tab contains the data sources that applied to the graph.

Chapter 14: Graphs Configurations 165 The datasource order is layered the first one (1) will be the background bottom value, and the last ones will be on top. Example - Memory Usage graph with three values: (1) Total Memory (2) Used Memory and percentage value that will be displayed at the bottom of the graph. The output of this graph: 165

Chapter 14: Graphs Configurations 166 2. Adding Data sources to Graph Data source contains all the information that was pushed from the analyzer function and can papulates the graph with data. There are several data source and advanced functunallity: 2.1. Data Source select the data source to appear in the graph and that has been defined in the analyzer settings. 2.2. Color select the color of the Data source in the graph. Only applies if the data source is not legend or comment or any other none graphical element specifed in graph type. 2.3. Graph Type 2.3.1. AREA draw line and the area between the x-axis and the line will be filled 2.3.2. COMMENT general text to add to the legend 2.3.3. GPRINT print the values of the specfieid data source in the legend. 2.3.4. HRULE - Draw a horizontal line at value. HRULE acts much like LINE except that will have no effect on the scale of the graph 2.3.5. LEGEND prints legend of the current data source 2.3.6. LINE1 - Draw a line of the specified width onto the graph 2.3.7. LINE2 - Draw a line of the specified width onto the graph Ticker line 2.3.8. LINE3 - Draw a line of the specified width onto the graph the tickets line 2.3.9. PRINT similar to GPRINT. 2.3.10. SHIFT shift the graph time frame. you can specify an offset of ( 7*24*60*60 = ) 604'800 seconds to "look back" one week 2.3.11. STACK - STACK modifier is used, this line is stacked on top of the previous element which can be a LINE or an AREA. 2.3.12. TICK - Plot a tick mark (a vertical line) for each value of vname that is non-zero and not *UNKNOWN*. 2.3.13. VRULE - Draw a vertical line at time. 2.3.14. Consilidation Function- general function to apply to the data source 2.3.14.1. AVERAGE average value of the data source. 2.3.14.2. MIN - the minium value in the time range specified of the data source. 2.3.14.3. MAX - - the maximum value in the time range specified of the data source. 2.3.14.4. CURRENT the last value that was pushed to the RRD database. In addition to the aggregate functions, there are a set of specialized functions that enable RRDtool to provide data smoothing (via the Holt-Winters forecasting algorithm), confidence bands, and the flagging aberrant behavior in the data source time series data source types HWPREDICT,SEASONAL,DEVPREDICT,DEVSEASONAL,FAILURES applied to this function. Additional information can be found on Centerity Support website. 166 2.4. CDEF / VDEF Function the mathematical function to apply to the data source:

Chapter 14: Graphs Configurations 167 2.4.1. Gprint 2.4.2. Exact Numbers print the exact numbers from the Database. 2.5. Load Average- compute load average ( usually non integer numbers) of the data source. 2.6. Insert New Line insert new line in the legend 2.7. HRULE / VRULE Value sets the HRULE / VRULE value to print in the graph. 2.8. Text Format the text format that will appear in the legend for example if your data source is called load1min. you can use this settting to set the Legend Called: Load Average 1 Min. 2.9. RRA Name this sets the Data source name when computing mathemitical funtions. 2.10. Opacity control the opacity of the AREA, LINE1, LINE2, LINE3 it is usefull if you want to make a data source semi transparent. Note: default RRA name are abc1, abc2, abcn for every data source available in the graph. Note: if specified none value in the HRULE / Vrule Value and in the Text Format it will remove the current data source print from the legend it is usefull if you want to add additional lines surrounding specific area. Note: Cannot generate Graph error message means that the graph contains unavailable data sources. 167

Chapter 14: Graphs Configurations 168 Mathematical RPN Functions Centerity provides the powerful ability to perform all sorts of calculations on the data retrieved from its databases 1. Name: Describe the function 2. Function Type: Sets the function to use on the mathematical algorithm 2.1. CDEF -When retrieving data from an RRD, you are using a "DEF" to work with that data. Think of it as a variable that changes over time (where time is the x-axis). The value of this variable is what is found in the database at that particular time and you can't do any modifications on it. This is what CDEFs are for: they takes values from DEFs and perform calculations on them. For CDEF instructions, the stack is processed for each data point on the graph 2.2. VDEF - VDEF are just like CDEF but the instructions work on an entire data set in one run. Note, that currently VDEF instructions only support a limited list of functions 3. Function Name - if you use more than one CDEF / CDEF function on the same graph. Or using nested functions for example one function calls other multiplication. 4. Function -RPN calculator that uses a stack and push your data onto this stack. Whenever you execute an operation, it takes as many elements from the stack as needed. Pushing is done implicitly, so whenever you specify a number or a variable, it gets pushed onto the stack automatically. 168

Chapter 14: Graphs Configurations 169 ASSIGNING GRAPH TO METRIC To assign new graph template to metric follow these steps: 1. From the admin menu choose a Host and edit the metric. 2. Enter the tab "Extended". 3. Select graph from the list of graphs. 4. Save the metric. The new graph can be displayed from this menu by pressing the graph Icon or by editing the metric and pressing Preview Graph button. The preview button only applies to metrics that already exist and have RRD files created and you only want to change the graph type. In order to preview the graph you need to save the metric first and re edit. In order to apply the new settings to Metric Template follow the steps above but apply them to Metric template and when adding the metric to new host it will inherit the graph settings from the template. Note: Changing graph to metric does not require install policy and it is being applied immediately. 169

Chapter 15: Reports and Report Scheduler 170 Chapter 15: Reports and Report Scheduler REPORTS OPTION Centerity Monitor provides wide range of professional built-in reports. Each report can be saved as excel, pdf or generated in HTML format. 170

Chapter 15: Reports and Report Scheduler 171 1. SLA Report Display the total availability of the selected object/s over a selected time frame. The report wizard includes the following options: 1.1. Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 1.1.1. Host / Metric / Group: 1.1.1.1. Host/Hosts availability 1.1.1.2. Metric / Metrics availability 1.1.1.3. Host group availability 1.1.1.4. Business Service availability (BSM) 1.1.2. Profile Perspective: Allows availability by selected metric profile: 1.1.2.1. Metric: Displays the metric profile within hosts. 1.1.2.2. BSM: Displays the metric profile within business services. 171

Chapter 15: Reports and Report Scheduler 172 1.2. Display Raw Log information: Displays event history log. 1.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 1.4. Display Selected List: Display/Don t display the host list in a PDF export. 1.5. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 1.5.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above. 1.5.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 1.6. Report Time-Period: What Schedule Time-period the report is created for. 1.7. Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/metric. 1.8. Calculate Metric Uptime: The report will display current uptime for this host. 1.9. Assumed Initial Host State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State. 1.10. Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State. 1.11. State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications. 172

Chapter 15: Reports and Report Scheduler 173 1.12. Assume States During Program Downtime: If Centerity Monitor is not running for some time during a report period this will assume states for hosts and metrics during the downtime. Example of Last 7 Days BSM report: 2. Event Level Report The event level report shows period averages and host events in calendric view. 2.1. Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 2.1.1. Host / Metric /Group: 2.1.1.1. Host/Hosts averages 2.1.1.2. Metric/Metrics averages 2.1.1.3. Host group averages 2.1.1.4. Business Service averages (BSM) 173

Chapter 15: Reports and Report Scheduler 174 2.1.2. Profile Perspective: Allows averages by selected metric profile: 2.1.2.1. Metric: Displays the metric profile within hosts. 2.1.2.2. BSM: Displays the metric profile within business services. 2.1. Display Raw Log information: Displays event history log. 2.2. Display Extended Report: Displays time duration of downtime as well as availability percentage. 2.3. Display Selected List: Display/Don t display the host list in a PDF export. 2.4. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 2.4.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above. 2.4.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 2.5. Report Time-Period: What Schedule Time Period the report is created for. 2.6. Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/metric. 2.7. Calculate Metric Uptime: The report will display current uptime for this host. 2.8. Assumed Initial Host State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State. 2.9. Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/ metric. Default value is Current State. 174

Chapter 15: Reports and Report Scheduler 175 3. History Report The history report presents detailed information about historical states of any element in the system with several of options. This report can be saved as PDF and to be sent automatically by email. 3.1. Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 3.1.1. Host / Metric /Group: 3.1.1.1. Host/Hosts event history 3.1.1.2. Metric/Metrics event history 3.1.1.3. Host group event history 3.1.1.4. Business Service event history (BSM) 3.1.2. Profile Perspective: Allows history report by selected Metric profile: 3.1.2.1. Metric: Displays the metric profile within hosts. 3.1.2.2. BSM: Displays the metric profile within business services. 175

Chapter 15: Reports and Report Scheduler 176 3.2. Display Raw Log information: Displays event history log. 3.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 3.4. Display Selected List: Display/Don t display the host list in a PDF export. 3.5. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 3.5.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above. 3.5.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 3.6. State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications. 3.7. Alerts: Host alert/metric alerts. 3.8. Host Alert Types: The host alert types that will be displayed in the report. 3.9. Metric Alert Types: The metric alert types that will be displayed in the report. 3.10. Hide Process Messages: Hides all process messages. 176

Chapter 15: Reports and Report Scheduler 177 4. Inventory Report Inventory report shows all available inventory information on hosts such as OS information, hardware information, software details and more. This report depends on inventory scan, hosts that were not scanned properly will appear blank. 177

Chapter 15: Reports and Report Scheduler 178 4.1. Report type - there are 2 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 4.1.1. Host/Hosts inventory 4.1.2. Host group inventory 4.2. Display Raw Log information: Displays event history log. 4.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 4.4. Display Selected List: Display/Don t display the host list in a PDF export. 4.5. Report Categories: 4.5.1. General Information: IP address, host type, group and alias. 4.5.2. Administrative Information: All general information, topology, OS information, monitoring information, hardware supplier information and any user defined information. 4.5.3. Metrics Information: All metrics on the host and their state. 4.5.4. Software Information: All programs installed on this host. 4.5.5. System Information: System, domain, hardware, OS and location details. 4.5.6. Hardware Information: Bios, processor, memory, disks and network details. 4.5.7. Process Information: Running processes on the host. 4.6. Custom Report: Allows you to select specific information you want from the host such as: OS Name, Domain, Host ID, etc. 4.7. Search Report: Allows you to define a search for a specific detail such as software, serial number, etc. 178

Chapter 15: Reports and Report Scheduler 179 5. Inventory Summary Report Summary inventory report can display how much of a certain software is installed on the environment, operating system etc. This report depends on inventory scan, hosts that weren't scanned properly will appear blank. 179

Chapter 15: Reports and Report Scheduler 180 5.1. Report type - there are 2 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 5.1.1. Host/Hosts inventory 5.1.2. Host group inventory 5.2. Display Raw Log information: Displays event history log. 5.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 5.4. Display Selected List: Display/Don t display the host list in a PDF export. 5.5. Select various settings for your report. 5.5.1. Custom Report: Allows you to select specific information you want from the host such as: OS Name, Domain, Host ID, etc. 5.5.2. Search Report: Allows you to search for a specific detail within all hosts, such as software, serial number, etc. 180

Chapter 15: Reports and Report Scheduler 181 6. SNMP Traps Report SNMP Traps Report will display all SNMP trap history. It allows searching within the trap history and time-period selection. 6.1. Search: Allows searching within the SNMP traps history, by this criterion: 6.1.1. Search by hosts, metrics, MIB name, output and severity. 6.1.2. Search by status Ok/Warning/Critical/Unknown. 6.1.3. Search by keywords 6.2. Report Time-Period: What Schedule Time-Period the report is created for. Click "Search" to display the report. 181

Chapter 15: Reports and Report Scheduler 182 7. Syslog Report Syslog Report Displays all syslog history, and allows search and log filtering within the history. 7.1. Search: Allows searching within the syslog history, by this criterion: 7.1.1. Search by hosts, metrics and output. 7.1.2. Search by status Ok/Warning/Critical/Unknown. 7.1.3. Search by keywords 7.1.4. Search by syslog facility. 7.1.5. Search by severities critical/alert/debug etc. 7.2. Report Time-Period: What Schedule Time Period the report is created for. Click "Search" to display the report. 182

Chapter 15: Reports and Report Scheduler 183 8. Summary Report Generic reports about host and metric alert data, including alert totals, top alert producers, etc. s 8.1. Report Types: 8.1.1. Standard report - Uses all hosts. 8.1.2. Custom report Customize hosts. 8.2. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 8.2.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected. 8.2.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected. 8.3. Top Alerters: Choose the report: 8.3.1. Top alert producers Displays top 10 alert producers. 8.3.2. Less alert producers Displays bottom 10 alert producers. 8.3.3. Most recent alerts Displays most recent alerts. 183

Chapter 15: Reports and Report Scheduler 184 8.4. Report Type: Display host alerts or metric alerts. 8.5. Number of alerts: The limit of alerts to display. 9. Charts Report Charts report can display graph history in a selected time-period. 184

Chapter 15: Reports and Report Scheduler 185 9.1 Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 9.1.1. Host / Metric /Group: 9.1.1.1. Host/Hosts graphs 9.1.1.2. Metric/Metrics graphs 9.1.1.3. Host group graphs 9.1.1.4. Business Service graphs (BSM) 9.1.2. Profile Perspective: Allows availability by selected metric profile: 9.1.2.1. Metric: Displays the metric profile within hosts. 9.1.2.2. BSM: Displays the metric profile within business services. 9.2. Display Raw Log information: Displays event history log. 9.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 9.4. Display Selected List: Display/Don t display the host list in a PDF export. 9.5. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 9.5.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected. 9.5.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected. 185

Chapter 15: Reports and Report Scheduler 186 10. Trends Report Trends report displays a top 10 list of metric alerts, and a graph that compares the same metric profile on different hosts. 186

Chapter 15: Reports and Report Scheduler 187 10.1. Select which Metric profile you wish to compare. 10.2. Select the hosts that monitor this metric profile. 10.3. Select various settings for your report: 10.3.1. Select Data Sources: This depends on the report analyzers for the metric, if there isn't an analyzer that fits this metric check, no data sources will appear and you will not be able to generate a report. 10.3.2. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 10.3.2.1. Start Date: Specify Start Date if CUSTOM REPORT PERIOD was selected above. 10.3.2.2. End Date: Specify End Date if CUSTOM REPORT PERIOD was selected above. 187

Chapter 15: Reports and Report Scheduler 188 11. Uptime Report Shows the uptime of host groups, metric groups, hosts and metrics during a selected period. 188

Chapter 15: Reports and Report Scheduler 189 11.1. Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 11.1.1. Host / Metric /Group: 11.1.1.1. Host/Hosts uptime 11.1.1.2. Metric / Metrics uptime 11.1.1.3. Host group uptime 11.1.1.4. Business Services uptime (BSM) 11.1.2. Profile Perspective: Allows uptime by selected Metric profile: 11.1.2.1. Metric: Displays the Metric profile within hosts. 11.1.2.2. BSM: Displays the Metric profile within business services. 11.2. Display Raw Log information: Displays event history log. 11.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 11.4. Display Selected List: Display/Don t display the host list in a PDF export. 10.1 Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 10.1.1 Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected. 10.1.2 End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected. 10.2 Report Time Period: What Schedule Time Period the report is created for. 10.3 Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/ metric. 10.4 Calculate Metric Uptime: The report will display current uptime for this host. 10.5 Assumed Initial Host State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host. Default value is UP. 10.6 Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the metric. Default value is OK. 189

Chapter 15: Reports and Report Scheduler 190 190

Chapter 15: Reports and Report Scheduler 191 12. Usage Summary Report This report is recommended for Metric groups (BSMs), it displays all usage summary for each Metric group divided to Level, and it displays all level failures and their effect on the other levels in the Metric group. 12.1. Perspective type - there are 4 options for this report. In each one - select the object from the left box and use the arrow to move into the right box. 12.1.1. Host / Metric /Group: 12.1.1.1. Metric / Metrics summary 12.1.1.2. Business Service summary (BSM) 12.1.2. Profile Perspective: Allows availability by selected Metric profile: 12.1.2.1. Metric: Displays the metric profile within hosts. 12.1.2.2. Metric Group: Displays the metric profile within business services. 12.2. Display Raw Log information: Displays event history log. 12.3. Display Extended Report: Displays time duration of downtime as well as availability percentage. 12.4. Display Selected List: Display/Don t display the host list in a PDF export. 12.5. Select the Metric or Metric Group for the report. 12.6. Select various settings for your report. 191

Chapter 15: Reports and Report Scheduler 192 12.7. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 12.7.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above. 12.7.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 12.8. Report Time Period: What Schedule Time Period the report is created for. 12.9. Ignore Scheduled Downtime: The report will ignore any scheduled downtime on the host/ metric. 12.10. Show Extended Information: Gives a more detailed report, with smaller time period statistics. 12.11. Show Stack Graph: Displays a stack for each part of the chosen business services (available only for business services). 12.12. Use State Value as [Ok]: Choose thresholds to be stated ok in the report. The defaults are: Warning 50 (Treat soft warning events as Ok). Critical - 0 (treat all critical events as critical). Unknown 100 (Treat all unknown events as Ok). 12.3 Assume Metric State: If there is no information about the host or metric in the current log file, Centerity Monitor can assume status of the host/metric. Default value is Current State. 12.4 State Type: A problem is classified as a SOFT problem until the number of checks has reached the configured max check attempts value (Default: 3). When max check attempts is reached, the problem is reclassified as HARD and Centerity Monitor will send out a notification about the problem. SOFT problems do not result in notifications. 192

Chapter 15: Reports and Report Scheduler 193 13. Utilization Report Shows top 10 highest/lowest alerts producers. 12.1. Select the metric template for the report. 12.2. Select if highest or lowest values, and how many hosts to display 5, 10, 15, etc. 12.3. Select various settings for your report: 12.3.1. Select Data Sources: This depends on the report analyzers for the metric, if there isn't an analyzer that fits this metric check, no data sources will appear, but you can still generate the report. 193

Chapter 15: Reports and Report Scheduler 194 12.3.2. Report Period: Choose from a set of predefined report periods or choose CUSTOM REPORT PERIOD and specify Start and End date. 12.3.2.1. Start Date (Inclusive): Specify Start Date if CUSTOM REPORT PERIOD was selected above. 12.3.2.2. End Date (Inclusive): Specify End Date if CUSTOM REPORT PERIOD was selected above. 194

Chapter 15: Reports and Report Scheduler 195 CREATING A NEW REPORT TEMPLATE 1. Select from the main menu Monitor Reports view, and select the desired report. 2. Fill the required parameters for the report. 3. Click the Save report Button at the bottom-right pan 4. A popup window will be opened at the center of the screen. Fill the required parameters: 4.1. Report-Name 4.2. Description 5. All reports can be found under Saved Reports section: 195

Chapter 15: Reports and Report Scheduler 196 CREATING A NEW SCHEDULED REPORT 1. Select from the main menu Admin->Reports view, and select Scheduled Reports Note: This window enables you to manage scheduled reports, and will be described in details in the next section. 2. Click on Add label, placed in the top-right of the screen. 3. New schedule window will be displayed, containing 2 tabs: General & Schedule 3.1. In the General Tab fill the required parameters and select the desired Template to be scheduled. 3.2. In the Schedule Tab define the required schedule and timing for the report to be sent. Note: These parameters represent the period that the scheduled-reports will be execute and attendees. 196

Chapter 15: Reports and Report Scheduler 197 4. Click the Save Button at the bottom-right EDITING REPORT TEMPLATE 1. Select from the main menu Monitor->Reports->Saved Reports 2. Select the desired report-template to be edited by clicking on the report name. 3. A new window will open containing 2 tabs: General & Template tabs: 3.1. In General tab edit the Name and Description of the template 197

Chapter 15: Reports and Report Scheduler 198 3.2. Also, you can edit the template permissions: - Admin members can view and edit the report. - View members can view the report only. 198

Chapter 15: Reports and Report Scheduler 199 3.3. In Template tab- Edit the reports parameters 4. After editing, click on Save button. REMOVE REPORT TEMPLATE 1. Select from the main menu Admin->Reports view, and select Saved Reports 2. Click on the checkbox attached to the selected report-templates 3. Click on the garbage trash icon and confirm that you sure you want to delete the selected icons. MANAGING REPORT TEMPLATES 1. Select from the main menu Admin->Reports->Saved Report. 2. Select the desired report-templates by clicking on the checkbox attached to them. 3. Choose the desired operation from the boxes: Status (Enable/Disable), Preview or Delete. 199