Professional Documents
Culture Documents
PATROL Knowledge Module For Event Management User Guide - 2.7 PDF
PATROL Knowledge Module For Event Management User Guide - 2.7 PDF
Management
User Guide
Supporting
PATROL KM for Event Management 2.7
PATROL Configuration Manager 1.6
January 2005
Telephone
Fax
Fax
Copyright March 8, 2005 BMC Software, Inc., as an unpublished work. All rights reserved.
BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered trademarks
or trademarks of BMC Software, Inc.
IBM is a registered trademark of International Business Machines Corporation.
DB2 is a registered trademark of International Business Machines Corporation.
Oracle is a registered trademark, and the Oracle product names are registered trademarks or trademarks of Oracle
Corporation.
All other trademarks belong to their respective companies.
BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this
information is subject to the terms and conditions of the applicable End User License Agreement for the product and the
proprietary and restricted rights notices included in this documentation.
Customer support
You can obtain technical support by using the Support page on the BMC Software website or by contacting Customer
Support by telephone or e-mail. To expedite your inquiry, please see Before Contacting BMC Software.
Support website
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at
http://www.bmc.com/support_home. From this website, you can
read overviews about support services and programs that BMC Software offers
find the most current information about BMC Software products
search a database for problems similar to yours and possible solutions
order or download product documentation
report a problem or ask a question
subscribe to receive e-mail notices when new product versions are released
find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax
numbers, and telephone numbers
product information
product name
product version (release number)
license number and password (trial or permanent)
machine type
operating system type, version, and service pack or other maintenance level such as PUT or PTF
system hardware configuration
serial numbers
related software (database, application, and communication) including type, version, and service pack or
maintenance level
messages received (and the time and date that you received them)
Contents
Chapter 1
15
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Typical Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Notification Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rules Stored as Pconfig Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Notification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sending Notification: Process Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sending Alerts to an Enterprise Console: Process Flow . . . . . . . . . . . . . . . . . . . . .
Sending Pages using AlarmPoint: Process Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the PATROL Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PATROL Configuration Manager Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Usage Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tasks that Must be Completed Using PATROL KM for Event Management . . .
Application Classes and Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application Class Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16
16
17
17
17
18
19
20
21
22
22
22
22
23
23
24
Chapter 2
25
Installation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Virtual Machine Support Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Backing up the Notification Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking for Product Patches or Fixes Before Installing. . . . . . . . . . . . . . . . . . . . .
Determining How to Install Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining Where to Install the PATROL Agent. . . . . . . . . . . . . . . . . . . . . . . . . .
Determining Where to Install KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PATROL Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking Security Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assessing and Implementing a Different Security Level . . . . . . . . . . . . . . . . . . . .
Typical and Custom Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing into a PATROL 3.3.x or 3.4.x Unix Environment . . . . . . . . . . . . . . . . . .
First-Time Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing For the First Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing on AS/400 (iSeries) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Upgrading from an Earlier Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
26
26
27
29
30
30
30
31
31
32
32
34
34
34
35
36
37
37
42
43
5
49
Configuring Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Testing Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Managing Parameter Thresholds and Poll Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Benefits of Using the PATROL KM for Event Management. . . . . . . . . . . . . . . . . 104
Setting Collector Poll times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Using Wildcards to Represent PATROL Instance Names. . . . . . . . . . . . . . . . . . . 107
Activating and Deactivating Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Applying Thresholds and Poll Time Changes to the Agent . . . . . . . . . . . . . . . . . 111
Disabling the use of PATROL KM for Event Management Thresholds and Poll
Times. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Specifying What to Monitor or Exclude from Monitoring . . . . . . . . . . . . . . . . . . . . . 112
Selecting Application Instances to Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Excluding Application Instances from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . 114
Configuring Blackout Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
About Notification Blackout Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Configuring Notification Blackouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Configuring Availability Blackouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Configuring Recovery Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
About Recovery Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Enabling PATROL KM for Event Management Recovery Actions . . . . . . . . . . . 121
Specifying a Recovery Action Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Specifying a Recovery Action Command Type . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Using PSL Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Chapter 4
Usage Scenarios
127
128
128
129
130
130
130
132
135
136
138
140
140
141
141
141
142
143
143
144
144
145
145
146
146
7
151
178
178
180
180
181
181
181
182
182
182
183
183
183
184
184
185
185
185
186
186
186
188
188
189
190
190
190
Chapter 6
191
Parameters
Configuration Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cannot Send E-mail Notifications to Multiple Targets . . . . . . . . . . . . . . . . . . . . .
Parameters are Unavailable or are Not Being Updated. . . . . . . . . . . . . . . . . . . . .
Too Many E-mail Alerts Are Being Generated . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Parameters Show a Negative Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Parameter Annotations Show Incorrect Targets or Other Errors . . . . . . . . . . . . .
AgentLoginDenied Parameter is in Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Availability Monitor is Not Pinging Frequently Enough . . . . . . . . . . . . . . .
NOTIFY_EVENTS not Generated when Parameter is in Alarm . . . . . . . . . . . . .
Parameters Setting Lost After Agent Restart. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Notification Message not Sent from OpenVMS Server . . . . . . . . . . . . . . . . . . . . .
AS_AVAILABILITY Application Not Displayed . . . . . . . . . . . . . . . . . . . . . . . . . .
When Using event_trigger2() Statements, Notifications Sent to Wrong Target
Gathering Diagnostic Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Where to Find Diagnostic Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
197
198
198
200
201
202
203
203
205
205
206
207
207
207
208
208
9
211
10
215
Figures
Typical PATROL KM for Event Management Architecture . . . . . . . . . . . . . . . . . . . . . 17
Select Products and Components to Install - Typical Install . . . . . . . . . . . . . . . . . . . . 39
Quick Config - Notification Server Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Notification Server Settings Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Primary Notification Server Settings Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Selecting / to Represent all PATROL Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Set Event Management Alert Variables/Rules Dialog Box . . . . . . . . . . . . . . . . . . . . . 81
Selecting Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Selecting Application Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Selecting Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Set Event Management Alert Variables/Rules Dialog Box . . . . . . . . . . . . . . . . . . . . . 83
What If Results Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Availability Monitor Add Target Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Choose Primary Monitor Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Rules to Apply to the Availability Checker Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Java Client Status Displayed in Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
SET EVENT MANAGEMENT VARIABLE:arsAction Dialog Box . . . . . . . . . . . . . . 101
SET EVENT MANAGEMENT ALERT VARIABLES/RULES Dialog Box . . . . . . . . 102
Configure Thresholds Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Choose the target classes Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Set Event Management Blackout Variables/Rules Dialog Box . . . . . . . . . . . . . . . . . 117
Set Event Management Blackout Variables/Rules Dialog Box . . . . . . . . . . . . . . . . . 119
Availability Monitor Add Target Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
QUICK CONFIG - NOTIFICATION SERVER Dialog Box . . . . . . . . . . . . . . . . . . . . . 131
NOTIFICATION SERVER SETTINGS Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
EVENT MANAGEMENT ALERT VARIABLE:emailTargetsRemoteALARM Dialog
Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Message Rewording Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
SET EVENT MANAGEMENT VARIABLE: alertLocalCommand dialog box . . . . . 200
11
12
Tables
E-mail Notification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Sending Alerts to Enterprise Console Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Sending Pages using AlarmPoint Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Application Classes and KM File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
AS_EVENTSPRING InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
AS_AVAILABILITY InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
System Requirements for Installing and Using PATROL KM for Event Management
26
System Role Packages Available for Product Components . . . . . . . . . . . . . . . . . . . . . 38
EVENT_MANAGEMENT.kml File and Associated KM Files) . . . . . . . . . . . . . . . . . . 53
Notification Target Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Recommended Rule Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Recommended Configuration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Notification Script Location on Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Requirements for Using Scripts on Unix Notification Server . . . . . . . . . . . . . . . . . . . . 65
Notification Script Location on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Requirements for Notification Server When Using Windows e-mail Clients . . . . . . 66
Editing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Notification Script Arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Quick Config - Notification Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Notification Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
REMOTE AGENT COMMUNICATION SETTINGS dialog box . . . . . . . . . . . . . . . . . 79
Message Length Limitations by Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Availability Target Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Threshold Setting Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Wildcard Usage in Threshold Rules: Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Blackout Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
PATROL KM for Event Management Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Sending E-mail Notification for Low Disk Space: Configuration Overview . . . . . . 129
Sending E-mail Notification for Low Disk Space: Configuration Overview . . . . . . 145
Rules Created: Oracle Recovery Action Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
PATROL Objects Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Example: PATROL Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Example: Rule Inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
PATROL KM for Event Management Variable Definition . . . . . . . . . . . . . . . . . . . . . 155
NOTIFY_EVENT Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Notification Server Message Replacement Variables . . . . . . . . . . . . . . . . . . . . . . . . . 160
Notification Server Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
arsAction Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
alertSystem Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
13
14
Chapter
This chapter provides an overview of the PATROL Knowledge Module for Event
Management (also referred to as PATROL KM for Event Management).
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Typical Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Notification Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rules Stored as Pconfig Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Notification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sending Notification: Process Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sending Alerts to an Enterprise Console: Process Flow . . . . . . . . . . . . . . . . . . . . .
Sending Pages using AlarmPoint: Process Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the PATROL Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PATROL Configuration Manager Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Usage Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tasks that Must be Completed Using PATROL KM for Event Management . . .
Application Classes and Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application Class Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 1
16
16
17
17
17
18
19
20
21
22
22
22
22
23
23
24
15
Features
Features
PATROL KM for Event Management provides event notification, message
rewording, and centralized alert management features. With the PATROL KM for
Event Management, you can:
integrate with any command line e-mail client, paging solution, compiled
executable, or script. Sample scripts are provided.
Architecture
The PATROL KM for Event Management architecture consists of monitored hosts
(remote agents) and notification servers. Notification servers collect and process
events from monitored systems according to notification rules that you define.
Notification rules specify:
Both the monitored hosts and the notification servers require a PATROL Agent and
the PATROL KM for Event Management. Figure 1 on page 17 shows an PATROL KM
for Event Management environment with several monitored hosts and two
notifications servers (a primary and a backup).
16
Architecture
Typical Configuration
In the typical configuration, monitored hosts forward events to a primary notification
server. The backup notification server is used only when the primary notification
server is unavailable. Failover is automatic. If the primary and the backup notification
servers are unavailable, the monitored host queues its events. When communication
is restored, the monitored host forwards queued events to the notification servers.
Figure 1
Primary
Backup
Notification Server 1
Notification Server 2
Agent 1
Agent 2
Agent 3
Notification Servers
BMC Software recommends the use of notification servers. The PATROL KM for
Event Management architecture does not require a notification server to perform
notifications. Any monitored host running the PATROL KM for Event Management
can be configured to perform its own notifications, event filtering, and alert control.
However, there are advantages to using a notification server. For more information,
see Why use a Notification Server? on page 58.
17
Notification Process
Notification Process
The following diagrams show how notification occurs in the following configuration:
The PATROL KM for Event Management rules that apply at each step are shown. For
detailed rule descriptions, see Chapter 5, Rules and Configuration Variables.
18
Notification Process
Rule or Variable
msgText
msgBody
blackoutPeriod
alertResetOnInit
alertResend
emailTargets
NA
19
Notification Process
Rule
arsAction
arsCommand
blackoutPeriod
alertSystem
NA
NA
6. The PET processes the
REMOTE_NOTIFY_EVENT and
sends it to the PATROL Enterprise
Manager.
You can also send events to
third-party enterprise consoles,
such as Tivoli.
7. The event is received by the
PATROL Enterprise Manager.
20
NA
Notification Process
Rule
arsAction
arsCommand
msgText
blackoutPeriod
alertResetOnInit
alertResend
alertSystem
customTargets
arsAction
arsCommand
blackoutPeriod
alertSystem
customTargets
Chapter 1
21
Usage Examples
For a brief example of how to use the PATROL Configuration Manager to copy
settings, see Sending E-mail Notification When Disk Space is Low on page 128.
For detailed instructions on using PATROL Configuration Manager, see the PATROL
Configuration Manager User Guide.
22
AS_EVENTSPRING
AS_AVAILABILITY
Table 4 describes the PATROL KM for Event Management application classes, icons
and KM files.
Table 4
Description
AS_EVENTSPRING.km
AS_AVAILABILITY.km
NOTE
The AS_AVAILABILITY application class icon is not displayed in the PATROL
Console until availability targets are added.
Chapter 1
23
Item
Description
Table 6 shows the InfoBox items for the AS_AVAILABILITY application instances.
Table 6
Item
Description
Primary Monitor
Ping Command
Ping
PATROLAgent?
Ping SNMP Agent? whether the SNMP agent is being monitoring for availability
24
Blacked Out?
KM Version
Chapter
This chapter provides the information that you need to install PATROL KM for Event
Management. For additional information about the PATROL installation process, see
the PATROL Installation Reference Manual or the PATROL for Microsoft Windows Servers
Getting Started. The following topics are discussed in this chapter:
Installation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Virtual Machine Support Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Backing up the Notification Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking for Product Patches or Fixes Before Installing. . . . . . . . . . . . . . . . . . . . .
Determining How to Install Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining Where to Install the PATROL Agent. . . . . . . . . . . . . . . . . . . . . . . . . .
Determining Where to Install KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PATROL Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking Security Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assessing and Implementing a Different Security Level . . . . . . . . . . . . . . . . . . . .
Typical and Custom Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing into a PATROL 3.3.x or 3.4.x Unix Environment . . . . . . . . . . . . . . . . . .
First-Time Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing For the First Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing on AS/400 (iSeries) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Upgrading from an Earlier Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remove Customized KM Files From the PATROL_CACHE . . . . . . . . . . . . . . . . .
Remove Existing Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Considerations for Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browser Version Required for Viewing PATROL Console for Unix Help . . . . . .
Additional Considerations for Using Online Help for Unix. . . . . . . . . . . . . . . . . .
Uninstalling PATROL KM for Event Management . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . .
Uninstalling PATROL KM for Event Management on Windows . . . . . . . . . . . . .
Chapter 2
26
26
27
29
30
30
30
31
31
32
32
34
34
34
35
36
37
37
42
43
43
43
44
44
44
47
47
47
25
Installation Overview
Installation Overview
This chapter contains instructions for installing PATROL KM for Event Management.
For additional installation instructions, see the following documents:
Information
Document
System Requirements
Before installing the PATROL KM for Event Management, verify
the target computer meets the system requirements noted in Table 7 on page 26,
including supported OS platforms and PATROL product versions.
NOTE
For a current list of the supported operating systems, see the release notes for the
PATROL solution. For example, the PATROL for Microsoft Windows Servers Release
Notes.
Table 7
the account that you use to install the product has sufficient privileges
System Requirements for Installing and Using PATROL KM for Event Management
(Part 1 of 2)
Resource
Requirements
operating
systems
PATROL
products
26
Comments
Installation Overview
Table 7
System Requirements for Installing and Using PATROL KM for Event Management
(Part 2 of 2)
Resource
Requirements
Comments
security levels For information on security, see PATROL Security Levels On iSeries, only
security levels 0 and
on page 34.
1 are supported.
The PATROL Security Level is set during the installation of
the PATROL infrastructure components. If your product
contains the PATROL Agent, you have an opportunity to
select the security level. Make sure that the level that you
select/accept is compatible with the rest of your enterprises
PATROL installation.
license
ports
Accounts
This section describes how to set up a PATROL installation account for Windows and
Unix platforms.
Windows Environment
PATROL requires a dedicated user account, known as the PATROL default account,
in the Windows environment. The PATROL default account must be created before
you install PATROL. The PATROL default account can be either a local or a domain
account:
Chapter 2
27
Installation Overview
Stand-alone workgroup servers must use a local user account as a PATROL default
account.
Servers that are trusted members of a domain may use either a local or domain
account.
Administrative Rights
BMC Software recommends that you make the PATROL default account a member of
the local Administrators group of the computer where the agent will reside. On a
domain controller, BMC Software recommends that you make the account a member
of the domain Administrators group. However, you can choose to remove the
PATROL default account from the Administrators group. If you do so, the PATROL
Agent may not be able to perform all of its administrative tasks. For example, the
PATROL Agent may not be able to execute recovery actions or perform other
activities that requires administrative rights on the monitored machine.
WARNING
Do not use a built-in Windows domain or local Administrator account as the
PATROL default account. Such account usage causes files created by PATROL to be
owned by the Administrator, which could result in security or file access problems.
Unix Environments
BMC Software recommends that if you require a Unix account, the account that you
create should meet the following conditions:
28
Installation Overview
The account .login, .profile, .cshrc, and .kshrc files should contain as little user
customization as possible. Specifically, be sure that the account has no aliases and
that no commands in these files can change the unmask setting. The recommended
umask setting for the installation account is 022. In addition, verify that the prompt
is set to the default.
Do not use the root account to install PATROL products because this may create
security risks.
Ensure that the account has permission to create directories in the directory where
you will install PATROL products.
Ensure that the computers on which you want to install PATROL have ftp and
telnet enabled.
Chapter 2
29
30
Local Installation
If you install locally, you must install PATROL KM for Event Management and a
PATROL Agent on each computer that you want to monitor, and PATROL KM for
Event Management and a PATROL Console for Windows or Unix on each computer
from which you want to view results. If you install locally in a PATROL 7.x
environment, you must install PATROL KM for Event Management on the computer
that hosts the PATROL Console Server.
Details for installing products locally are contained in this chapter.
Remote Installation
If you create an installable image, the product configuration information that you
enter, such as the BMC Software products installation directory, account names,
passwords, PATROL Agent port number, and security options, must be the same for
all computers on which the image is to be installed. To specify different settings for
different computers, you must either create a separate image for each set of values
that you want to implement or edit the variables in the images control file by using
the ctltool.
For more information about creating, distributing, and installing installable images,
and about using the ctltool, see the PATROL Installation Reference Manual.
Installation Utility
The installation instructions contained in this book pertain to version 7.5.20 of the
installation utility. This version of the installation utility might be different from the
version included on another product CD or from a version that you downloaded
from the BMC Software Electronic Product Download (EPD) site. If you use a version
of the installation utility other than version 7.5.20, the instructions in this book may
not accurately describe what you see on your screen.
Chapter 2
31
PATROL 3.x
In a PATROL 3.x environment, you must install KMs on the following computers:
Computers hosting the PATROL Console for Windows or PATROL Console for
UnixSelect Console Systems as the System Role in the installation utility when
installing KMs on computers hosting the PATROL Console for Windows or
PATROL Console for Unix. This selection installs KM files for use by the console.
PATROL 7.x
In a PATROL 7.x environment, you must install KMs on the following computers:
NOTE
If you do not install each KM on the computer hosting the PATROL Console Server
and select Common Services Systems as the System Role in the installation utility, no
KM icons or KM Help files will be available in either PATROL Central
Operator Microsoft Windows Edition or PATROL Central Operator Web Edition.
32
When using PATROL Central Operator Web Edition, install KMs on computers
hosting the PATROL Console Server using the Common Services Systems role and
computers hosting the PATROL Agent using the Managed Systems role.
If you are using older versions of the following components:
You must also install KMs on the computer hosting the PATROL Central
Operator Web Edition web server using the Common Services Systems role.
For more information about the PATROL 7.x architecture, see the PATROL
Infrastructure Planning Guide.
Additional Information
For more information about the PATROL consoles and PATROL Console Server or
RTserver, see the products respective online help systems and the following
documents:
Chapter 2
33
WARNING
The PATROL Agent, console server, and consoles must operate at the same security
level to communicate with each other. When you install agents, console servers, or
consoles that need to communicate with previously installed versions of these
components, check the security level of the previously installed components and be
sure to install the new ones at the same level.
1 From the command line switch to the path on the computer that you want to check:
%BMC_ROOT\..\common\security\bin\OS
2 Run the following command to display the security policy of the current machine:
esstool policy -a
The security level is displayed in the security level field of the output.
34
The Typical installation type uses defaults values for all optional configuration
information. It prompts you only for mandatory configuration information. This
type is for any or all of the following situations:
You are new to the PATROL product that you are installing and you have an
agent or console already installed in the default directories.
You are performing a first-time installation (you are not upgrading), and you
are installing into the default product installation directories.
NOTE
If you are installing PATROL KM for Event Management to an existing PATROL
Agent or Console environment that is not in the default installation directory, use
Custom. Do not use Typical. Typical will automatically install the agent or console with
PATROL KM for Event Management and overwrite your existing installation.
With the Custom installation type, you can install individual components of the
product. It requires that you specify all configuration information. This type is for
any or all of the following situations:
You want to install individual components rather than the entire product.
You want to specify
the port numbers that components use to communicate with each other
a security level greater than basic security
any other product settings that a user might want to change
You are upgrading PATROL KM for Event Management from a previously
installed version.
You are installing into an existing PATROL environment that is not in the
default installation directory.
The Custom installation type installs the KMs that you select.
With each installation type, you can deselect any components that you dont want
to install.
NOTE
If you choose the typical installation type, the PATROL KM for Event Management is
automatically installed when you select the operating system KM. For example, if you
select the PATROL KM for Windows Operating System, the PATROL KM for Event
Management is automatically installed.
Chapter 2
35
36
First-Time Installation
First-Time Installation
The installation utility offers two types of installations: Typical and Custom. For a
description of the two types of installations, see Typical and Custom Installation
Types on page 35.
If you are installing on AS/400 (iSeries), see Installing on AS/400 (iSeries) on
page 42.
NOTE
By default, the Typical installation type configures the PATROL Agent to connect
through port 3181. To connect the agent from a different port, you must use the
Custom installation type.
You first should install on a limited number of computers in the test environment,
test the installation thoroughly, and then install in your production environment.
3 In the Welcome to the Installation Utility window, click Next to begin your
installation.
4 Review the license agreement, select Accept, and click Next to continue.
Chapter 2
37
First-Time Installation
5 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
6 In the Select Type of Installation window, select Typical and click Next to continue.
7 In the Specify Installation Directory window, accept the default directory and click
Next to continue.
8 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
Table 8
If you are installing to a computer that hosts or will host a (Windows only)
PATROL Console for Window (Unix only) PATROL Console for Unix, select
Console Systems.
If you are installing to a computer that hosts or will host a PATROL Agent,
select Managed Systems.
If you are installing to a computer that hosts or will host the PATROL Central
Operator Web Edition (PATROL 7.x architecture) Web server, the PATROL
Console Servers, or the RTservers, select Common Services.
PCO-Winb
PATROL 3c
Managed
System
Common
Servicesa
no
yes
yes
yes
PATROL Central Operator Web Edition. This console is available when you select the common services
role.
b
PATROL Central Operator Microsoft Windows Edition. This console is available when you select the
console system role.
c
PATROL Console for Windows and PATROL Console for Unix are PATROL 3 console systems. They are
available when you select the console system role.
Fore more information, see Determining Where to Install the PATROL Agent on
page 32.
38
First-Time Installation
9 From the Select Products and Components to Install window, select components
that you want to install (see Figure 2 on page 39) and click Next.
NOTE
If you choose the typical installation type, the PATROL KM for Event Management is
automatically installed when you select the operating system KM. For example, if you
select the PATROL KM for Windows Operating System, the PATROL KM for Event
Management is automatically installed.
Figure 2
NOTE
The actual selectable components may be different that what is shown in Figure 2.
For example, components that you are installing with the PATROL KM for Event
Management will also be shown.
10 In the PATROL Default Account Properties window, enter the user name and
password that you want to use for your PATROL default account and click Next.
You should have created this account manually before you began to install
PATROL. (For more information about the PATROL account, see Accounts on
page 27.) This window is displayed only when you are installing a product that
requires a PATROL logon.
Chapter 2
39
First-Time Installation
12 In the Review Selections and Install window, review the selections carefully to
ensure that they are correct:
A status window opens that contains current messages, current milestones, and
percentage complete.
13 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100%
complete.)
3 In the Welcome to the Installation Utility window, click Next to begin your
installation.
4 In the Review License Agreement window, review the license agreement, select
Accept, and click Next to continue.
5 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
6 From the Select Type of Installation Window, select Custom and click Next.
7 In the Specify Installation Directory window, enter the directory where the
products you select will be installed and click Next.
The PATROL product directory is appended to the path that you enter in this step.
You will specify the PATROL product directory in step 10 on page 41.
8 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
40
If you are installing to a computer that hosts or will host a PATROL Console,
select Console System.
First-Time Installation
If you are installing to a computer that hosts or will host a PATROL Agent,
select Managed System.
If you are installing to a computer that hosts or will host the PATROL Central
Operator Web Edition (PATROL 7.x architecture) Web server, the PATROL
Console Servers, or the RTservers, select Common Services.
For more information, see Determining Where to Install the PATROL Agent on
page 32.
For more information about the PATROL consoles and PATROL Console Server or
RTserver, see the following documents:
9 From the Select Products and Components to Install window, select the items that
you want to install and click Next.
10 In the Provide the PATROL 3.x Product Directory window, enter in the PATROL
3.x Product Directory field the directory in which you want to install PATROL KM
for Event Management as appropriate for your installation scenario. For more
information, see the instructions displayed on the PATROL 3.x Product Directory
window.
This directory is appended to the base directory path that is shown in the BMC
Products Installation Directory field. The installation directory was entered in
step 7 on page 40.
11 If the PATROL Default Account Properties window appears, enter the user name
and password that you want to use for your PATROL default account and click
Next. You should have created this account manually before you began to install
PATROL. (For more information about the PATROL Account, see Accounts on
page 27.) This window is displayed only when you are installing a product that
requires a PATROL logon.
12 If the Complete the Confirm BMC Startup Information window appears, perform
the following steps:
A In the Specify the Current Agent Port Number field, enter the port number that
you want the PATROL Agent to use. The default is 3181.
NOTE
If your previous installation used a different port number, change the default to
the current port number for the PATROL Agent.
Chapter 2
41
First-Time Installation
B In the Restart the PATROL agent automatically? field, select the appropriate
option:
If you want the installation utility to restart the PATROL Agent after the
installation is complete, select Yes.
This window may not be displayed if you are not installing into a managed
system.
13 In the Review Selections and Start Install window, review the selections carefully
to ensure that they are correct:
A status window opens that contains current messages, current milestones, and
percentage complete.
14 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100%
complete.)
42
Windows Consoles
1 From the PATROL Classic Developer Console main window, select the KM tab.
2 Expand the following folders in the KM tree view:
Knowledge Module => Computer Classes => ALL_COMPUTERS => Global => Menu
Commands
43
Installation Requirement
You must install Netscape Navigator on the computer where the PATROL console
resides. You can install Netscape anywhere on your Unix computer as long as the
binary is in the path.
Download Location
Netscape Navigator is supplied by Netscape Communications Corp. You can locate
the browser at http://home.netscape.com/download.
44
LANG Variable
The Unix LANG environment variable must be set to C so that Netscape Navigator
will work properly. Otherwise, you might experience product failures.
Type of Shell
Bourne
LANG=C
export LANG
Korn
export LANG=C
setenv LANG=C
PATH Variable
The PATROL user account PATH variable must contain the location of the directory
containing the Netscape files. If the directory containing the Netscape files is not in
the path, add the directory to the PATROL user account path.
This requirement applies only to the PATROL user account on the PATROL console
computer.
Chapter 2
45
Type of Shell
Bourne
PATH=$PATH:/netscape_location
export PATH
Korn
export PATH=$PATH:/netscape_location
setenv PATH=$PATH:/netscape_location
PATROL_BROWSER Variable
When PATROL starts the Help browser, it uses the command in the
PATROL_BROWSER environment variable. As a default, the PATROL_BROWSER
environment variable contains the following command:
Type of Shell
Bourne
Korn
Example
For a Korn shell, use the following command:
export PATROL_BROWSER=/usr/local/bin/netscape -raise
46
WARNING
If you use a different version of the installation program to uninstall, you might
remove files needed to perform uninstallation of other BMC Software products.
Chapter 2
47
NOTE
As an option, you can launch the installation utility in uninstall mode by choosing
Start => Settings => Control Panel => Add/Remove Programs and double-clicking
BMC Software Tools in the Add/Remove Programs Properties dialog box.
2 Select the installation directory from which you want to remove a product, and
click Next.
3 Select the product or products that you want to uninstall, and click Next.
4 Review your selections and click Uninstall.
After the uninstallation is complete, a window is displayed that tells you whether the
uninstallation was successful.
For more information about advanced uninstallation options, such as uninstalling the
KM but retaining log files, which contain history for future analysis and
configuration files for redeployment, see the PATROL Installation Reference Manual.
Source of Information
48
parameter descriptions
Chapter 6, Parameters.
troubleshooting information
Chapter
This chapter provides information on using the PATROL KM for Event Management
to perform notification, availability checking, and parameter threshold management.
Preparing to Use the PATROL KM for Event Management . . . . . . . . . . . . . . . . . . . . .
Loading and Preloading KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining Which KMs to Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
KM Files Preloaded on Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Loading and Unloading KMs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Loading Knowledge Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verifying that PATROL KM for Event Management KM is Loaded. . . . . . . . . . .
Unloading Knowledge Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration Planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Defining Notification Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Defining Notification Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Defining Availability Monitors and Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deciding Where to Place Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Recommended Configuration Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Notification Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Testing Notification Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Notification Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Remote Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Alert Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rewording Notification Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting Notification Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Testing Notification Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Disabling Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Availability Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring an Availability Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring a Backup Availability Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the Availability Monitor Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifying an Availability Monitoring Account . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the Ping Command Used for Availability Monitoring . . . . . . . . . . . . .
Chapter 3
51
51
51
52
52
52
55
55
58
58
60
60
61
63
63
64
70
71
73
76
79
82
84
85
87
87
89
91
92
93
49
50
The PATROL console version 3.4.x or later and the PATROL KM for Event
Management are installed on the computer that you want to use for the PATROL
console.
The PATROL Agent version 3.4.x or later and the PATROL KM for Event
Management are installed on the computer that you want to monitor and manage.
Chapter 3
51
AS_EVENTSPRING.km
AS_AVAILABILITY.km
AS_EVENTSPRING_ALL_COMPUTERS.km
Preloaded KMs collect data as long as the PATROL Agent runs, even when no
PATROL console is connected. When you view a preloaded KMs data collection
history, you do not see any gaps that would otherwise occur (because of the consoles
absence).
1 On the Common Tasks tab of the taskpad, click the Load Knowledge Modules icon.
PATROL Central - Windows Edition displays the wizard.
The wizard lists each computer on which a PATROL Agent has been installed.
3 Select the check boxes for the computers on which you want to load KMs, and click
Next.
The wizard displays a list of available .kml files for each computer selected in the
previous step. Each .kml file is listed once for each computer. You can display .km
files by changing the filter.
The KMs available in this product are listed in Table 9.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
Table 9
Description
EVENT_MANAGEMENT.kml AS_AVAILABILITY
The AS_AVAILABILITY
application class icon is not
displayed in the PATROL
Console until availability
targets are added.
AS_EVENTSPRING
4 Select the check boxes for the KM and computer pair that you want to load.
5 Click Next and click Finish.
PATROL loads the selected KMs on the selected computers.
Chapter 3
53
1 From the Monitored Systems page, click the Load/Unload KMs button.
The Load KMs page opens, listing each computer on which a PATROL Agent has
been installed.
2 Select the computers on which you want to load KMs, and click Next.
The Load KMs page displays a list of available .km and .kml files.
If you selected more than one computer, the only .km and .kml files that are listed
are the ones that have been installed on all of the selected computers. If a particular
.km or .kml file was installed only on one computer, you must choose that
computer by itself to load the file.
The KMs available in this product are listed in Table 9 on page 53.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
NOTE
To load a .km or .kml file that was not listed in Step 2, ensure that the KM is
installed on the appropriate computer and select only that computer in Step 2.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
PATROL loads the selected KMs on all of the computers listed under
PATROLMainMap.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
NOTE
The AS_AVAILABILITY application class icon is not displayed in the PATROL
Console until availability targets are added.
Chapter 3
55
1 On the Common Tasks tab of the taskpad, click the Unload Knowledge Modules icon.
PATROL Central - Windows Edition displays the wizard.
3 Select the check boxes for the computers from which you want to unload .km files,
and click Next.
The wizard displays a list of application class names (that correspond to .km file
names) for each computer selected. Each application class name is listed once for
each computer.
4 Select the check boxes for the .km and computer pair that you want to unload, and
click Next.
5 Click Finish.
The console removes the selected .km files from the current management profile.
2 Select the computers from which you want to unload .km files, and click Next.
The Load KMs page displays a list of .km files. Currently loaded .km files are
highlighted in the list.
3 Select the .km files that you want to unload and click Next.
4 Click Finish.
The console removes the .km files that you specified. These .km files are no longer in
the current management profile.
56
1 From the KM tab of the tree view, right-click the application class name that you
want to delete and choose Delete from the pop-up menu.
The console displays a dialog box that asks if you want to delete the selected
application.
3 Repeat Step 1 and Step 2 until you have deleted all of the application classes
associated with the KM that you want to delete.
4 From the console menu bar, choose File => Save KM to save your changes.
To Unload KMs with the PATROL Console for Unix
Unloading a KM is also referred to as deleting a KM in the PATROL Console for
Unix.
1 From the PATROL Main window, choose Attributes => Application Classes.
2 Click the name of the application class that you want to delete.
The console highlights the application class name.
3 From the List of Application Classes menu bar, choose Edit => Delete.
The application class is removed from your cache Directory and your console
session file. The PATROL Console for Unix removes the application class name
from the List of Application Classes.
4 Repeat Step 2 and Step 3 until you have deleted all of the application classes
associated with the KM that you want to delete.
5 From the List of Application Classes menu bar, choose File => Save KM to save
your changes.
Chapter 3
57
Configuration Planning
Configuration Planning
Before you can use PATROL KM for Event Management, you must gather
information and plan your configuration. You should gather the following
information:
58
Configuration Planning
Providing Security
To improve security, create an operating system account on the notification server
systems to be used specifically for remote notification. This configuration enables you
to avoid using the more commonly used PATROL account. You can configure the
notification server so that it is unable to fully login to the notification server system by
using the operating system. For example, on Unix, give the notification server login
an invalid login shell, such as /bin/false.
NOTE
You must install the PATROL Agent and the PATROL KM for Event Management on
the notification server system.
Chapter 3
59
Configuration Planning
PATROL Object
E--mail Target
Paging Target
patrol@any.co.com
none
/CPU
unixadmin@any.co.com
unixadmin
/NT_CPU
ntadmin@any.co.com
ntadmin
Providing Redundancy
You should configure both a primary and a backup availability monitor. The backup
availability monitor monitors only the availability of the primary availability
monitor. If the primary availability monitor becomes unavailable, the backup
availability monitor assumes monitoring until the primary availability monitor is
available.
60
Configuration Planning
Improving Performance
To improve the availability monitor performance, you should apply certain agent
rules to the availability monitor. For more information, seeConfiguring the
Availability Monitor Agent on page 91.
TIP
Availability checkers perform best on Unix machines and allow easier management
of multiple agents running availability checkers on one machine.
Chapter 3
61
Configuration Planning
Table 11
Rule Type
Recommended
Location
Targets (notification
recipients)
notification
server
Alert Messages
(wording and content
of notification
messages)
Blackouts
remote agent
remote agent
Advantage
Easier to manage
Less processing at
managed nodes reduces
PATROL resource
consumption
Reduces processing at
the notification server
Disadvantage
More processing is
performed at the
notification server
remote agent
only
Parameter Settings
(thresholds and poll
times)
remote agent
only
remote agent
only
62
remote agent
only
Configuring Notification
Table 11
Advantage
Custom Identifiers
remote agent
only
Recovery Actions
remote agent
only
Rule Type
Disadvantage
Configuring Notification
This sections describes how to configure the PATROL KM for Event Management to
perform notification.
Topic(s)
Page
64
70
71
79
Use PATROL Configuration Manager For an example of how to use the PATROL 134
to copy the notification server settings Configuration Manager, see To Assign
(rules) to the other notification servers. Notification Servers for NT2 and NT3. For
more detailed instructions on using the
PATROL Configuration Manager, see the
PATROL Configuration Manager User Guide.
73
Chapter 3
63
Configuring Notification
Table 12
Topic(s)
Page
82
104
76
Use PATROL Configuration Manager For an example of how to use the PATROL 134
to copy agent notification rules and
Configuration Manager, see To Assign
parameter settings to other like agents. Notification Servers for NT2 and NT3 on
page 134. For more detailed instructions on
For example, you may want to set up a using the PATROL Configuration Manager,
notification rule for a parameter related see the PATROL Configuration Manager User
Guide.
to Oracle. You would then copy that
rule to all other agents that are
monitoring Oracle.
87
a Unix shell script that sends e-mail notification using mailx (Unix) or mail (Linux)
a Perl script that sends e-mail notification using mailx (Unix) or mail (Linux)
NOTE
The PATROL KM for Event Management Perl script has been tested with Perl 5.
64
Configuring Notification
Table 13
Script
Name
Unix Script
AS_EVSLocalAlertNotify.sh
Perl Script
AS_EVSLocalAlertNotify.pl
Unix Requirements
To use the Unix scripts, the server sending the notification must meet the
requirements shown in Table 14.
Table 14
Script
Requirements
Unix
Perl
Associate the .pl extension with Perl. Otherwise, you must call the script
using the syntax shown below:
perl PATROL3-4/lib/psl/AS_EVSLocalAlertNotify.pl
On Linux, you must edit the script and change any mailx references to mail.
Windows Scripts
On Windows, the following script options are available:
a Windows batch file that you must edit before use, which can send any of the
following types of notification:
SMTP e-mail message by means of a Visual Basic (VB) script (provided)
MAPI e-mail message by means of a VB script (provided)
SMTP e-mail message by means of Blat (not provided)
Blat is a free command-line e-mail client, that you can download from the Web.
You can also use any other SMTP-based, command-line e-mail client if you edit the
batch file accordingly. For more information, see Editing Scripts on page 67.
65
Configuring Notification
NOTE
The PATROL KM for Event Management has been tested with Blat version 1.7.
Script
Name
AS_EVSLocalAlertNotify.bat
SMTP VB Script
sendmail.vbs
This VB script is called from AS_EVSLocalAlertNotify.bat.
This script uses an ActiveX control.
MAPI VB Script
send_mapi.vbs
This VB script is called from AS_EVSLocalAlertNotify.bat.
This script uses an ActiveX control.
Perl Script
AS_EVSLocalAlertNotify.pl
Windows Requirements
To use these Windows scripts, the server sending the notification must meet the
requirements shown in Table 16.
Table 16
Script
Requirement
Perl Script
66
Configuring Notification
Table 16
Script
Requirement
SMTP VB Script
MAPI VB Script
OpenVMS Scripts
On OpenVMS, the script AS_EVSLocalAlertNotify.com is provided. By default, this
script sends e-mail notifications using the native OpenVMS utility MAIL. If you use
this mail utility, no script modifications are required.
Editing Scripts
Before using the sample scripts, you may have to edit them, as described in Table 17
on page 68.
Chapter 3
67
Configuring Notification
Table 17
Editing Scripts
If you use Linux, you must change any mailx references to mail.
If you use mailx and mailx is not installed in the /usr/bin/mailx
directory, you must edit the script to indicate the appropriate path.
Windows
AS/400
(iSeries)
OpenVMS
68
Configuring Notification
If you use a third-party command-line e-mail client or if you want to use the script to
perform other types of notification, such as paging or trouble tickets, you must add
the code to the script that calls the e-mail client or appropriate notification utility.
pages
trouble tickets
custom notifications
Chapter 3
69
Configuring Notification
The PATROL KM for Event Management notification scripts have clearly marked
sections where you can add scripting to support these notification types.
NOTE
You must supply the notification software. For example, you can use the notification
script to issue a trouble ticket notification, but to actually create a trouble ticket, you
must have a trouble ticket application, such as Remedy.
NOTE
Replace ext with the file extension of your notification script (bat, sh, or pl).
Argument Description
type
The notification type that you are testing. The following notification
types are supported:
If you use the page, tt, and custom notification types, you must
customize the notification script.
70
targets
message
Configuring Notification
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
configure one notification server, you can use the PATROL Configuration Manager to
copy your configuration to other notification servers.
The Quick Config - Notification Server dialog box opens as shown in Figure 3.
Figure 3
Chapter 3
71
Configuring Notification
Use the Quick Config - Notification Server dialog box to specify the notification
server properties. The notification server properties are described in Table 19:
Table 19
Property
Description
Default Email Account the default e-mail address (notification target) that receives e-mails when
an object goes into an alarm or warning state
All events for PATROL objects that do not have defined notification
targets are sent to this e-mail address. See Configuring Recovery
Actions on page 120 for information on setting notification targets.
If you dont want any notifications sent until you configure notification for
specific PATROL applications or parameters, enter NONE as your default
e-mail account or leave this field empty.
Notification Command the complete path and filename of the notification script or command used
to send notifications
Perform Alert Test
specifies whether you want to perform an alert test after the changes are
accepted
If this is your first time using the PATROL KM for Event Management,
you should perform an alert test and verify that the notifications are
received.
2 Choose the KM menu command Event Management => Alert Settings => Notification
System.
72
Configuring Notification
3 Select the PATROL object (application, class, and parameter) that you want to
configure. To configure all PATROL objects, select Set For Classes and then select /.
NOTE
Notification servers are not required. Remote agents can send their own notifications.
However, there are considerable benefits to using notification servers. For more
information, see Why use a Notification Server? on page 58.
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
configure one notification server, you can use the PATROL Configuration Manager to
copy your configuration to other notification servers. The configuration settings are
stored in the following variables:
AS/EVENTSPRING/NOTIFICATION_SERVER1.defaultAccount (primary)
AS/EVENTSPRING/NOTIFICATION_SERVER2.defaultAccount (backup)
AS/EVENTSPRING/NOTIFICATION_SERVER1 (primary)
AS/EVENTSPRING/NOTIFICATION_SERVER2 (backup)
2 Choose the KM menu command Event Management => Quick Config => Remote
Agent.
The Notification Server Settings dialog box opens as shown in Figure 4 on page 74.
Chapter 3
73
Configuring Notification
Figure 4
74
Configuring Notification
Use the Primary Notification Server Settings dialog box to specify the properties of
the primary notification server for the managed system. The properties are
described in Table 20:
Table 20
Property
Description
Notification Server
Hostname
Notification Server
Password
Verify Password
Make Connection
Persistent
Chapter 3
75
Configuring Notification
Page
76
77
78
79
2 Choose the KM menu command Event Management => Alert Settings => Notification
System.
3 Select the PATROL object (application, class, and parameter) that you want to
configure. To configure all PATROL objects, select the menu command Set For
Classes and then select / as shown in Figure 6 on page 77.
76
Configuring Notification
Figure 6
4 From the SET EVENT MANAGEMENT VARIABLE: alertSystem dialog box, select
the appropriate alert option, described in Table 40 on page 163.
Chapter 3
77
Configuring Notification
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Send Reset on Init.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Alert Resend.
3 Select the PATROL object (application, instance, or parameter) that you want to
configure.
The SET EVENT MANAGEMENT VARIABLE: alertResend dialog is displayed.
4 In the ALARM Resends and WARN Resends fields, enter the number of times alarm
alerts and warning alerts are resent.
To resend alerts continuously until the PATROL object is no longer in a warning or
alarm state, enter 1.
78
Configuring Notification
2 Choose the KM menu command Event Management =>Alert Settings => Remote
Alert Settings => Remote Comm Settings.
3 From the REMOTE AGENT COMMUNICATION SETTINGS dialog box, select the
appropriate protocol settings, described in Table 21.
Table 21
Setting
Explanation
Chapter 3
79
Configuring Notification
Platform
Unix
Windows
AS/400
(iSeries)
When using the native SNDDST mail utility, the subject line is limited
to 44 characters and the message body is limited to 5000 characters.
OpenVMS
80
Configuring Notification
2 Choose the KM menu command Event Management => Alert Settings => Alert
Messages => Default Message Format.
The Set Event Management Alert Variables/Rules dialog box opens as shown in
Figure 7:
Figure 7
3 Enter your reworded message subject line and message body and then click Accept.
You can use a mix of variables and text to create a reworded message. For a
description of the available message replacement variables, click MESSAGE
REWORDING OPTIONS. For a complete description of the message replacement
variables that are provided, see NOTIFY_EVENT Fields on page 157
If a Problem Occurs
If you dont specify message body text, the message text that you enter for the
message subject is also used for the message body.
Back slashes may be replaced with a front slash or a space on some platforms.
Chapter 3
81
Configuring Notification
Selecting Applications
82
Configuring Notification
Figure 9
Selecting Parameters
6 Enter the e-mail address of the target for this alert and click Accept.
Chapter 3
83
Configuring Notification
You can set other notification targets using the same procedure, but you choose a
different menu command in Step 2. For example, you may choose Paging instead of
Email.
If a Problem Occurs
If you specify multiple targets but only the first target receives the e-mail message,
see Cannot Send E-mail Notifications to Multiple Targets on page 198.
For other problems, see Chapter 7, Troubleshooting PATROL KM for Event
Management.
2 From the What If dialog box, click Browse and then select the parameter that you
want to test.
3 In the Status field, select the event that you want to test (INFORMATION, WARN,
or ALARM).
4 If necessary, specify the day of the week and the time. This may be necessary if you
have configured blackout periods when notification is disabled.
84
Configuring Notification
The What If Results dialog box is displayed as shown in Figure 12. It shows the rules
that would be triggered and their associated values.
Figure 12
Disabling Notification
You can disable, turn off, or limit notification using the instructions provided below.
To disable notification for a finite period only and then enable it, use the blackout
feature. For more information, see Configuring Blackout Periods on page 115.
Chapter 3
85
Configuring Notification
Overriding Rules
You can also limit notification by overriding a rule. For example, if you dont want a
remote agents to generate notify events, you can disable the arsAction rule on that
remote agent.
To Override Rules
1 Access the host KM menu commands as described in Accessing KM Commands
and InfoBoxes on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Overrides.
3 From the Rule Override dialog box, select the PATROL KM for Event Management
rule that you want to override.
The rules listed are the rules that are currently configured on the agent. For more
information about the PATROL KM for Event Management rules, see Chapter 5,
Rules and Configuration Variables.
4 Click Accept.
86
2 Choose the KM menu command Event Management => Availability => Add Target.
The Availability Monitor Add Target dialog box opens as shown in Figure 13 on
page 88:
Chapter 3
87
Figure 13
Use the Availability Monitor - Add Target dialog box to specify the properties of
the agent that you want to monitor for availability. Table 23 describes the
availability target properties.
Table 23
Property
Description
Hostname
PATROL Agent Port the port number of the PATROL Agent on the managed
system that you are monitoring
SNMP Port
SNMP Community
88
Table 23
Property
Description
SNMP Timeout
SNMP Retries
SNMP Object ID
Chapter 3
89
each pair of machines that you want to configure as primary and backup
availability monitors has the same availability targets.
To configure failover, you must access the machine that you want to use as the backup
availability monitor, run the Identify Primary menu command, and then select the
primary availability monitor. For more details, see the following procedure.
To Configure Failover
1 From the PATROL console, access the KM menu commands, as described in
Accessing KM Commands and InfoBoxes on page 212, for the managed system
that you want to use as the backup availability monitor.
2 Choose the KM menu command Event Management => Availability => Failover
Settings => Identify Primary.
The Choose Primary Monitor dialog box opens as shown in Figure 14.
Figure 14
90
the managed system you selected in Step 3 is set as the primary availability
monitor
the managed system that you executed the Identify Primary command from in Step
2 is set as the backup availability monitor
Figure 15
2 Apply the rules to the agent by clicking the apply configuration icon
Chapter 3
91
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
specify the account information for one availability checker, you can use the PATROL
Configuration Manager to copy your configuration to other availability checkers.
2 Choose the KM menu command Event Management => Availability => Checker
Account.
3 From the CONFIGURE CHECKER ACCOUNT dialog box, enter the account used
by the availability monitor. The account you enter is used for all availability
targets.
4 To test whether the account is valid, enter the hostname and PATROL Agent port
of one of the availability targets.
5 Click Accept.
PATROL displays a message in the console system output window indicating
whether the test was successful.
92
If a Problem Occurs
If you receive invalid login events at the PATROL Agent machine, see
AgentLoginDenied Parameter is in Alarm on page 203.
2 Choose the KM menu command Event Management => Availability => Ping
Command.
3 From the Set Ping Command dialog box, enter the absolute path to the ping
command executable on the availability monitor machine.
Example
To use the following ping command, use the configuration variables described below:
ping host -n 2 -|32
Chapter 3
93
Comments
pingCmd
ping
pingArgs
-n 2 -| 32 None
Example
ping abc.bmc.com -n 2 -l 32
Example
To use the following ping command, set the configuration variables described below:
ping -c 2 -s 99 host
Configuration
Variable
Value
Comments
pingCmd
ping
None
pingArgs
94
AlarmPoint Benefits
AlarmPoint selects the notification option based on the personal preferences of the
recipients. For example, a user can configure AlarmPoint to send an e-mail message
during normal working hours but send a voice notification during nights and
weekends. By allowing AlarmPoint users to maintain their own contact and schedule
information, AlarmPoint administrators are freed from maintaining this information.
Notification Process
To use AlarmPoint for notification, you configure the notification server to execute a
script that calls the AlarmPoint java client. The java client then sends the notification
request to the AlarmPoint server. For an overview of the notification process when
using the PATROL KM for Event Management and AlarmPoint, see Sending Pages
using AlarmPoint: Process Flow on page 21.
Configuration Overview
To integrate the PATROL KM for Event Management with AlarmPoint, you must
complete the following steps:
Step Configuration Task
Topic(s)
Page
96
96
96
96
97
98
Configure notification.
Configuring Notification
99
Test notification.
Testing Notification
103
Chapter 3
95
2 Enter the IP address or host name of the primary AlarmPoint server in the address
variable as show below in bold.
<?xml version="1.0" encoding="UTF-8" ?>
- <alarmpoint-agent version="1.0">
- <!-- daemon configuration -->
<server type="primary" address="172.23.0.26" />
96
The browser indicates the status of the connection to the AlarmPoint server. A
successful connection appears as shown in Figure 16 on page 97.
Figure 16
Chapter 3
97
If a Problem Occurs
If the AlarmPoint java client is unable to connect with the AlarmPoint server, verify
that you entered the correct IP address or host name of the AlarmPoint server. Next,
verify that you can ping the AlarmPoint server from the notification server.
If you are using AlarmPoint 5.2.02 or later, you dont need to download these action
scripts.
You can download the action scripts required for AlarmPoint 5.2.01 from the
following locations:
Unix
ftp://ftp.bmc.com/pub/patrol/patches/PKM_Event_Management/2.5.00/UNIX/p
kmforem_alarmpointv521.tar
Windows
ftp://ftp.bmc.com/pub/patrol/patches/PKM_Event_Management/2.5.00/NT/pk
mforem_alarmpointv521.exe
98
Configuring Notification
The following section describes how to configure the notification server to issue
notifications that are sent through the AlarmPoint server.
NOTE
You should backup and rename these scripts prior to configuring the notification
server to use them. For more information about managing notification scripts, see
Using Notification Scripts on page 64.
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocalALARM
use this rule to specify the ID of the AlarmPoint user or user group. This rule is a
local target rule, rather than a remote target rule, because the rule is located on the
notification server and the notification server is performing the notification. Thus,
notification is performed locally.
Chapter 3
99
In these rules, object refers to a PATROL object, which can be an application class, an
application instance, or a parameter. For example, a PATROL object could be the
NT_CPU\CPU_0\CPUprcrProcessorTimePercent parameter.
You can set these rules using the PATROL KM for Event Management or the
PATROL Configuration Manager. The following topics describe how to set the rules
using the PATROL KM for Event Management. For more information on using the
PATROL Configuration Manager, see the PATROL Configuration Manager User Guide.
2 Choose the KM menu command Event Management => Alert Settings => Alert
Actions => Set For Parameters.
3 From the next series of dialog boxes, choose the application class, instance, and
parameter. For example, NT_CPU\CPU_0\CPUprcrProcessorTimePercent. After
you choose the desired parameter, the dialog box shown in Figure 17 on page 101
is displayed.
100
Figure 17
4 From the SET EVENT MANAGEMENT VARIABLE: arsAction dialog box, verify
that the following options are selected:
Make persistent (update config db) this option ensures that any changes you
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Actions => Notification Command => Set For Parameters.
3 From the next series of dialog boxes, choose the same parameter selected in the
previous task: NT_CPU\CPU_0\CPUprcrProcessorTimePercent.
Chapter 3
101
2 Choose the KM menu command Event Management => Alert Settings => Notification
Targets => Custom => Local TargetsALARM=> Set For Parameters.
3 From the next series of dialog boxes, choose the same parameter selected in the
previous task: NT_CPU\CPU_0\CPUprcrProcessorTimePercent.
Testing Notification
To verify that the notification rules are working correctly, you can set the PATROL
object into an alarm state and verify that the notification is sent.
2 Use the PATROL Configuration Manager to apply this rule to the agents that you
want to test.
When you apply this rule to an agent, the rule assigns the parameter a value that is
within the specified alarm range. This action causes an alarm condition and generates
an alert.
If a Problem Occurs
If the notification is not sent when the parameter enters an alarm state, see Chapter 7,
Troubleshooting PATROL KM for Event Management.
Chapter 3
103
NOTE
When you make thresholds changes using the PATROL KM for Event Management,
these changes are not reflected in the console display because the changes are made at
the agent, not in the console KM files.
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter. After you choose the desired parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
104
Figure 19
4 Use the Configure Thresholds dialog box, described in Table 24, to specify the
properties of the selected objects threshold settings and then click Accept.
Table 24
Property
Description
Active
indicates that the parameter is active and the settings in the dialog box represent
the current parameter settings
Border Range
To enable the border range, click Enable. If you enable the border range, you must
also specify border action properties on the Border Actions tab.
Enable the border range if it is possible for the parameter to return a value outside
of the other alarm range limits. You can use this for information only or as a
third-level alert condition representing either a warning or an alarm state.
Chapter 3
105
Table 24
Property
Description
Alarm Range 1 To enable Alarm1, click Enable and then specify a minimum and maximum range.
Use Alarm1 as a first-level alert condition representing either a warning state or an
alarm state. Alarm1 values:
Alarm Range 2 To enable Alarm2, click Enable and then specify a minimum and maximum range.
Use Alarm2 as a second-level alert condition representing either a warning state or
an alarm state. Alarm2 values:
Enable
Alert State
Click OK when the result of the range breach is informational for users or
non-critical (for example, back up a file when it exceeds a certain size).
Click Warning or Alarm to have the parameter undergo a state change when the
range is breached.
Min
Max
Trigger Alarm determines when an alarm is triggered and can be one of the following values:
After an alarm has occurred n times Use this value to discount random
spikes in the return values. You must also specify how many consecutive times
the alarm range can be breached before the parameter alarms.
Immediately on alarm Use this value if the value returned is of concern.
After all recovery actions fail Use this value if you want to be alerted after all
recovery actions fail and the returned value remains within the warning or
alarm range.
If you selected After an alarm has occurred n times for the trigger alarm, specify
how many consecutive times you want the alarm value returned during parameter
execution before the parameter actually alarms.
Apply to
makes the selected parameter thresholds apply to the current session
current session
Make
persistent
makes the selected parameter thresholds persist after the console is disconnected
If a Problem Occurs
If a problems occurs, see Parameters Setting Lost After Agent Restart on page 206.
106
Before you set collector poll times, determine which application class the standard
or collector parameters reside in.
The collector must be active. If the collector is not active, it is not shown in the list
of selectable collectors.
3 Choose the application class and instance for the standard or collector parameter.
4 From the SET EVENT MANAGEMENT VARIABLE: interval dialog box, enter the
new poll time and then click Accept.
Matches
No Match
CPU_{re:*}
CPU_03
CPU_13
HoustonCPU_03
CP_1
CPU14
Chapter 3
107
You can use a wilcard only to represent PATROL instance names. You cannot use
wildcards to represent host names, parameter names, or any other PATROL object.
You can use wildcards only in threshold and poll time rules. You cannot use
wildcards in notification rules.
You cannot use wildcards to specify the beginning or ending of an instance name.
For example, CPU_{re:*} matches both HoustonCPU_03 and CPU_03.
Rules that use explicit instance names take precedence over rules that contain
wildcard matches.
Rules that contain wildcard matches take precedence over rules that use the
__ANYINST__ variable to represent any instance name.
Processes Running
on the Host
Rules
108
msdtc
svchost
msv
Rule # 1:
msdtc
svchost
msv
Rule# 1:
Result
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter.
After you choose the desired application, instance, and parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 From the Configure Thresholds dialog box, deselect the Active checkbox.
5 To save the threshold properties, click Accept.
To Deactivate all Instances of a Parameter
1 From the PATROL console, access the host KM menu commands as described in
Accessing KM Commands and InfoBoxes on page 212.
Chapter 3
109
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter. To deactivate all instances of a parameter, select <all
instances> from the instances dialog box. When you select <all instances>, the
__ANYINST__ variable is used to represent any instance of the parameter.
After you choose the desired application, instance, and parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 From the Configure Thresholds dialog box, deselect the Active checkbox.
5 To save the threshold properties, click Accept.
The following agent configuration variable is created:
AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/application
class/__ANYINST__/parameter
where application class and parameter represent the application class and parameter
that you chose to deactivate.
To apply this rule to other servers in your enterprise, use the PATROL Configuration
Manager. For more information, see the PATROL Configuration Manager User Guide.
If a Problem Occurs
If a problems occurs, see Parameters Setting Lost After Agent Restart on page 206.
110
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter.
After you choose the desired application, instance, and parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 From the Configure Thresholds dialog box, select the Active checkbox.
5 To save the threshold properties, click Accept.
To Activate all Instances of a Parameter
1 From the PATROL Configuration Manager or the Wpconfig utility, set the agent
configuration variable AS/EVENTSPRING/processWildcards to a value of 1.
2 Create the following rule, using a wildcard symbol, {re:*}, to represent the instance
name.
AS/EVENTSPRING/PARAM_SETTING/THRESHOLDS/application
class/{re:*}/parameter name
3 Assign the rule the desired value. For more information on the syntax of the
THRESHOLDS rule, see THRESHOLDS on page 186.
To apply this rule to other servers in your enterprise, use the PATROL Configuration
Manager. For more information, see the PATROL Configuration Manager User Guide.
If a Problem Occurs
If a problems occurs, see Parameters Setting Lost After Agent Restart on page 206.
Chapter 3
111
1 From the PATROL console, access the host KM menu commands as described in
Accessing KM Commands and InfoBoxes on page 212.
2 Choose the KM menu command Event Management => Parameter Settings => Status
Flags.
2 Choose the KM menu command Event Management => Instance Filtering => Edit
Filter List.
2 Choose the KM menu command Event Management => Instance Filtering => Change
Filter Type.
3 Choose the application class you previously configured in To Add Instances You
Want to Monitor to an Exclude List (Temporarily) on page 113.
4 From the CHANGE FILTER TYPE dialog box, for the option Change Filter Type to
include, select Yes and then click OK.
Chapter 3
113
NOTE
PATROL monitors only the instances in the include filter. It does not monitor
instances that are discovered after you create the filter. To monitor a new instance,
you must add it to the include filter.
1 From the PATROL console, access the host KM menu commands as described in
Accessing KM Commands and InfoBoxes on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Filtered
Instance Report.
PATROL displays a report in the console system output window that shows the
following information:
2 Choose the KM menu command Event Management => Instance Filtering => Edit
Filter List.
114
3 Choose the application class whose instances you want to exclude from
monitoring.
4 From the EDIT INSTANCE FILTER LIST dialog box, select Remove and click OK.
5 From the Instance Filter List dialog box, select the application instances that you
want to exclude from monitoring and then click OK.
PATROL adds the selected instance to the exclude filter. It is no longer monitored.
1 From the PATROL console, access the host KM menu commands as described in
Accessing KM Commands and InfoBoxes on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Filtered
Instance Report.
PATROL displays a report in the console system output window that shows the
following information:
TIP
To monitor only a few instances and exclude most instances from monitoring, you
can add those instances that you want to monitor to an exclude list and then change
the exclude list to an include list. This method may be faster than adding all of the
instances that you dont want to monitor to an exclude list. For more information, see
Selecting Application Instances to Monitor on page 112.
Chapter 3
115
2 Choose the KM menu command Event Management => Alert Settings => Blackout
Periods => Set For Classes.
The Choose the Target Classes dialog box opens as shown in Figure 20 on
page 117.
116
Figure 20
Chapter 3
117
Use the Set Event Management Blackout Variables/Rules dialog box to specify the
blackout properties for the selected application class. The blackout properties are
described in Table 26.
Table 26
Blackout Properties
Property
Description
Blackout Days
Replace Existing Blackout Periods with replaces all existing blackout periods with
Current Selection
the defined blackout period
Example
To set a blackout from Friday at 19:00 pm until Sunday at 9:00 requires you to create
three blackout periods and merge them as you create each one:
1. Blackout Start Time -->19:00:00
Blackout Stop Time --> 23:59:59
Blackout Days-->Fri
2. Blackout Start Time -->00:00:00
Blackout Stop Time --> 23:59:59
Blackout Days-->Sat
3. Blackout Start Time -->00:00:00
Blackout Stop Time --> 09:00:00
Blackout Days-->Sun
118
2 Choose the KM menu command Event Management => Availability => Blackout
Periods.
The Set Event Management Blackout Variables/Rules dialog box opens as shown
in Figure 22.
Figure 22
Chapter 3
119
Figure 23
Use the Set Event Management Blackout Variables/Rules dialog box to specify the
blackout properties for the selected application class. The blackout properties are
described in Table 26 on page 118.
NOTE
The availability blackout options do not include the option to merge the blackout
periods.
120
Chapter 3
121
2 Choose the KM menu command Event Management => Alert Settings => Alert
Actions.
3 Select the PATROL object (application, instance, or parameter) that you want to
configure.
The SET EVENT MANAGEMENT VARIABLE: arsAction dialog box is displayed.
4 To allow recovery actions to be associated with this PATROL object, select Allow
Recovery Actions.
122
Configured the PATROL KM for Event Management to allow recovery actions. For
more information, see Enabling PATROL KM for Event Management Recovery
Actions on page 121.
Created and tested a recovery action script. For more information, see Using PSL
Recovery Actions on page 124.
On the PATROL Console, open the agent system output window so that you can
view any status messages generated during this procedure.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Recovery Action Commands.
3 Choose the application class, instance, or parameter that you want to associate
with the recovery action.
The SET EVENT MANAGEMENT VARIABLE: arsCommand dialog box is
displayed.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Recovery Action Command Type.
Chapter 3
123
3 Choose the application class, instance, or parameter that you want to associate
with the recovery action. To select all PATROL objects, select Set For Classes and
then choose the forward slash /.
Variable
Description
__appl_class__
__param__
parameter name
instance name
__src_event_id__ Source event id. This is the event ID of the event that began the
notification process, typically a threshold exceeded event
(Standard Event 9, 11 or 39).
__nfile__
124
A generated file that a PSL recovery action can write output to.
The file name appears as the AS_NOTIFICATION_FILE
environment variable in your notification script. You do not need
to write to this file directly. You can also use the __output__
variable, described below.
Table 27
Variable
Description
__output__
__udefvar__
Chapter 3
125
126
Chapter
Usage Scenarios
The following section contains typical scenarios for using the PATROL KM for Event
Management and the PATROL Configuration Manager. Detailed instructions are
included. The following scenarios are described.
Sending E-mail Notification When Disk Space is Low . . . . . . . . . . . . . . . . . . . . . . . .
Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting a Mail Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Loading the PATROL KM for Event Management . . . . . . . . . . . . . . . . . . . . . . . .
Defining the Notification Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the Remote Agent NT1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifying an E-mail Target for Low Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . .
Rewording the Notification Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Testing Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview of Annotated Data Points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling Recovery Actions and Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating Recovery Action Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating Notification Command Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Testing Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring a Recovery Action that Runs Under a Specified Account . . . . . . . . . . .
Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Testing Recovery Action Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling Recovery Actions for ArchFreeSpace on Agent Computer . . . . . . . . .
Defining the Recovery Action Type for Agent Computer . . . . . . . . . . . . . . . . . .
Storing the Encrypted Password as a Pconfig Variable. . . . . . . . . . . . . . . . . . . . .
Configuring the PSL Recovery Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of Rules Created . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Testing the Recovery Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 4
128
128
129
130
130
130
132
135
136
138
140
140
141
141
141
142
143
143
144
144
145
145
146
146
147
148
149
149
127
Network Configuration
Primary
Notification Server
NS1
NT1
Backup
Notification Server
NS2
NT2
NT3
Assumptions
For this scenario, assume the following:
128
The PATROL KM for Event Management and the PATROL KM for Windows OS
are installed on all of the remote agent and notification server computers.
There is a dedicated PATROL agent for each notification server. This is the BMC
Software recommended configuration.
All PATROL Agents used for monitoring are running on port 3181.
Except where otherwise noted, you will use the PATROL KM for Event
Management to create and configure the notification rules. For some tasks, you
could also choose to use the PATROL Configuration Manager to create and
configure rules. For more information, see Table 28 on page 129.
Configuration Overview
To configure e-mail notification for low disk space, you complete the following tasks.
The table below shows the location in which step is completed. An alternative
location is also noted. For example, many of the configuration tasks can be completed
within either the PATROL KM for Event Management or the PATROL Configuration
Manager.
Table 28
Step Task
PATROL Product
Alternative PATROL
Product
NA
NA
PATROL console
None
PATROL Configuration
Manager
PATROL Configuration
Manager
None
10
Testing Notification
None
None
None
Chapter 4
129
130
3 Enter the default e-mail account that receives notifications for all events that go
into an alarm or warning state. For this example, use admin@abc.com as the default
e-mail account. Later, you will define the e-mail target for our specific event: low
disk space.
The default e-mail account acts as a catch-all for events that dont have a specific
e-mail target associated with them. Typically, when e-mail notifications are sent to
the default e-mail account, you determine whether the event is valid and requires
notification. If it is valid, you would associate the appropriate e-mail target to that
event. For example, if the event was related to Microsoft Exchange, you would
assign the e-mail target to the Microsoft Exchange administrator. If the event is not
valid or is not important, you would adjust the alarm thresholds or possibly
deactivate the parameter that spawned the event.
4 Enter the file name of the script that is run for event notification.
To prevent the notification script from being overwritten during upgrades or new
installations, make sure you have copied the notification script from the directory
in which it is installed to another directory outside of the BMC Software directory
structure. For more information, see Using Notification Scripts on page 64.
5 Click Accept.
6 Repeat Steps 1 to 6 for NS2, the backup notification server.
In this example, NS1 is the primary notification server for all of the monitored agents.
However, you could configure NS1 as the primary notification sever for some of the
remote agents and as the backup notification server for the other remote agents.
Chapter 4
131
4 In the Notification Server Hostname field, type NS1, the host name of the primary
notification server.
132
5 In the Notification Server User Name field, type the user ID you want to use for
logging into the notification server. The default is the account you are currently
logged in on.
NOTE
For better security, you should create a unique operating system account that is
used only for remote notification on the notification servers. You can configure the
notification login account to make it unable to fully login to the notification Server.
For example, on Unix you can use an invalid login shell, such as /bin/false for the
notification account.
2 In the Notification Server Hostname field, enter NS2, the host name of the backup
notification server.
3 Enter the NS2 port number and account and password information and click
Accept.
4 To perform a notification test for NS1, select Yes under Perform Alert Test?
5 Click Accept.
6 Verify that the e-mail was received by the default e-mail account.
Chapter 4
133
1 To get the NT1 rulesets, from the PATROL Configuration Manager Agent folder,
right-click the NT1 agent and choose the menu command Configuration => Get.
2 When the Job Status window status changes to OK, click Accept.
A backup of the NT1 rulesets is created under Rulesets\ChangeSpring\backup.
3 To get the NT2 rulesets, right-click the NT2 agent and choose the menu command
Configuration => Get.
6 To display the rulesets that are unique to NT1, select the option First Unique. (If
NT1 was the second ruleset selected, then select the option Second Unique.)
Under the RuleSets folder, a ruleset named RemoteAgentsNS is created. When you
expand the ruleset, it shows the notification server rules.
9 Select (highlight) the RemoteAgentsNS ruleset and drag it to the NT2 and NT3
agents under the Agents folder.
10 To apply the rulesets to NT2 and NT3, click the Apply Configuration icon
134
NOTE
The advantage of creating the target rule on the remote agent is reduced
processing at the notification server. However, you could choose to create the rule
on the notification server, which has the benefit of centralizing rules. For more
information, see Deciding Where to Place Rules on page 61.
2 Choose the KM menu command Event Management => Alert Settings => Notification
Targets => Email => Remote Targets ALARM => Set For Parameters.
NOTE
Since you decided to create the e-mail target rule on the remote agent, you select
the sub-menu command Remote Targets ALARM, because the notification is
occurring on a computer that is remote from the agent. However, if you were to
create the target rules on the notification server, you would use the menu
command Local Targets ALARM, since the targets are located on the same computer
performing the notification.
3 From the Choose the target CLASS(es) dialog box, select NT_LOGICAL_DISKS and
click Accept.
Chapter 4
135
Figure 27
7 Perform Steps 1-6 for the other remote agents (NT2 and NT3) or use the PATROL
Configuration Manager to copy the configuration rules from NT1 to NT2 and NT3.
136
2 Choose the KM menu command Event Management => Alert Setting => Alert
Messages => Default Message Format.
3 Enter the message subject line and body using the message replacement variables.
For a complete list and description of the message replacement variables provided
by PATROL KM for Event Management, see NOTIFY_EVENT Fields on
page 157.
EXAMPLE
%PARAMETER_STATUS%on%HOSTNAME%forparameter%PARAMETER_NAME%=%PARAMETER_VALUE%
PATROL KM for Event Management substitutes real values at run time. The
following example shows how an actual notification message would be displayed
using the message format shown above:
ALARM on NT1 for parameter LDldFreeSpacePercent = 3.50
4 Perform Steps 1-3 for the backup notification server, NS2, or use the PATROL
Configuration Manager to copy the configuration rules from NS1 to NS2.
Chapter 4
137
Testing Notification
Next, perform the following tests to verify that notification is working correctly.
2 Use the PATROL Configuration Manager to apply this rule to the remote agents
NT1, NT2, and NT3.
When you apply this rule to an agent, this rule assigns the parameter a value that is
within the specified range. The parameter enters the desired state, ALARM, and
generates an alert.
138
If a Problem Occurs
If the e-mail notification is not sent correctly, see Configuration Problems on
page 198 for troubleshooting help.
Chapter 4
139
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Assumptions
In this scenario you make the following assumptions:
140
The PATROL KM for Event Management has been installed and the KM has been
loaded in the console.
You have already defined the notification server and notification script as
discussed in Defining Notification Servers on page 58 and the script successfully
sends notifications.
The configuration instructions assume the use of the PATROL KM for Event
Management menu commands. Except where noted, you could also use the
PATROL Configuration Manager to perform the configuration tasks.
The notification server and the managed nodes are Unix servers. The same result
can be accomplished on a Windows server using a Perl script instead of a Unix
shell script. However, you would need to edit the Perl script to achieve proper
formatting of the notification message.
The PATROL KM for Windows OS is installed on the console and on the managed
nodes.
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Configuration Overview
To create an e-mail notification for a specific parameter that includes annotated data,
you need to perform the following general tasks:
2 Select the application class CPU, instance CPU, and parameter CPUCpuUtil.
3 From the SET EVENT MANAGEMENT VARIABLE: arsAction dialog box, select
Allow Recovery Actions and Trigger NOTIFY_EVENT.
Chapter 4
141
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Since recovery actions execute at the managed node, you create these rules on the
managed node.
2 Select the application class CPU, instance CPU, and parameter CPUCpuUtil.
3 From the SET EVENT MANAGEMENT VARIABLE: arsCmdType dialog box,
enter PSL as the command type.
2 Select the application class CPU, instance CPU, and parameter CPUCpuUtil.
142
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Testing Notification
You can verify the notification test by looking at the PATROL KM for Event
Management NotifiedEvents parameter.
Chapter 4
143
Assumptions
144
The PATROL KM for Event Management and the PATROL KM for Oracle are
installed and configured on the agent computer.
This scenario will consider one agent and, thus, will not address deploying
configurations to multiple remote agents. For more information about deploying
configurations, see the scenario Sending E-mail Notification When Disk Space is
Low on page 128.
The account that you want to run this recovery action under has the proper
permissions to execute the recovery action on the agent computer.
To encrypt the account password, the PATROL DES encryption is used. However,
you could also choose to use another encryption method as long as the PSL
recovery action is able to decrypt the password. If you use PATROL DES
encryption, the password is decrypted internally.
Configuration Overview
To configure a recovery action that runs under a specified account, you would
complete the following tasks. The table below shows the location in which step is
completed. An alternative location is also noted. For example, many of the
configuration tasks can be completed within either the PATROL KM for Event
Management or the PATROL Configuration Manager.
Table 29
Step Task
PATROL Product
Alternative PATROL
Product
OS (outside of PATROL)
NA
PATROL console
None
None
Chapter 4
145
3 From the SET EVENT MANAGEMENT VARIABLE: arsAction dialog box, select
Allow Recovery Actions and Trigger NOTIFY_EVENT.
2 From the PSL Command dialog box, type the following command and click Apply.
encrypted_passwd = encrypt("oracle_password", "DES");
pconfig("REPLACE", "/MYCOMPANY/ORACLE/OSlogin", "oracle ".encrypted_passwd);
Chapter 4
147
NOTE
Before entering your own PSL recovery action code, you should test the code for
errors using the testing functionality in the PATROL console.
148
Rule
/AS/EVENTSPRING/ORACLE_AVAILABILITY/Test/ArchFreeSpace/arsAction = 6
This rule specifies that the ArchFreeSpace parameter associated with the application instance TEST
of the ORACLE_AVAILABILITY application class is enabled for recovery actions. For more
information on the arsAction rule, see arsAction on page 161.
/AS/EVENTSPRING/ORACLE_AVAILABILITY/Test/ArchFreeSpace/arsCmdType = PSL
This rule specifies that the ArchFreeSpace parameter associated with the application instance TEST
of the ORACLE_AVAILABILITY application class uses PSL recovery actions. For more information
on the arsCmdType rule, see arsCmdType on page 168.
AS/EVENTSPRING/ORACLE_AVAILABILITY/test/ArchFreeSpace/arsCommand =
oracle_os = nthlinef(pconfig("GET", "/MYCOMPANY/ORACLE/OSlogin"), 2, "");
usern = nthargf(oracle_os, 1, " ", "");
passwd = nthargf(oracle_os, 2, " ", "");
results = execute("OS", "/home/oracle/scripts/arch_backup.ksh", "", usern, passwd);
print("Results of script follows:\n", results, "\nend...");
;
This rule specifies the PSL recovery action. For more information on the arsCommand rule, see
arsCommand on page 168.
NOTE
To apply these rules to all instances of the ArchFreeSpace parameter on the agent,
replace Test with __ANYINST__.
Chapter 4
149
This PSL command sets the value of ArchFreeSpace parameter of the test instance
to 1. This action causes ArchFreeSpace to enter an ALARM state and issue an alert.
If a Problem Occurs
If the PSL editor indicates a syntax problem, see the PATROL Script Language
Reference Summary.
150
Chapter
Chapter 5
153
153
154
154
156
156
156
156
156
157
157
157
161
161
162
163
164
164
165
165
166
166
167
167
168
168
169
151
152
PATROL Objects
PATROL Objects
Before you use PATROL KM for Event Management, you should have an
understanding of PATROL objects. Table 31 lists the hierarchy and description of
PATROL objects.
Table 31
Hierarchy
(1=Highest)
Object
Description
Windows Example
Unix Example
host
ntprod1
sunprod1
application
class
NT_LOGICAL_DISKS
FILESYSTEM
application
instance
actual instance of an
application class
C:
root
parameter
FSCapacity
Object
Example
Variable
host
/NT_LOGICAL_DISKS/C:
the parameter
/NT_LOGICAL_DISKS/C:/LDldFreeMegabytes
LDldFreeMegabytes
associated with the
logical disk C:
Chapter 5
153
PATROL Objects
E-mail User1 for any parameter in alarm on this host (/) that does not have a more
specific rule assigned. User1 is the default e-mail account.
Rule 2:
E-mail User2 for any parameter in any instance of the logical disks application class
(/NT_LOGICAL_DISKS) in alarm on this host.
Rule 3:
E-mail User3 for any parameter in alarm on this host for the logical disks application
class instance C: (/NT_LOGICAL_DISKS/C:).
Rule 4:
E-mail User4 when the parameter LDldFreeMegabytes is in alarm on this host for the
logical disks application class instance C:
(/NT_LOGICAL_DISKS/C:/LDldFreeMegabytes).
Table 33
Object in Alarm
Action
/NT_LOGICAL_DISKS/C:/LDldFreeMegabytes
/NT_LOGICAL_DISKS/C:/LDldIdleTimePercent
/NT_LOGICAL_DISKS/D:/LDldFreeMegabytes
154
PATROL Objects
Variable
Definition
category
object
rule
The following example shows how to send an e-mail when an alarm condition occurs
for a PATROL object:
/AS/EVENTSPRING/ALERT/EMAIL/NT_LOGICAL_DISKS/C:/emailTargetsLocalALARM
category:
object:
rule:
/AS/EVENTSPRING/ALERT/EMAIL/NT_SERVICES/__ANYINST__/ServiceStatus/emailTargetsLocal
causes an e-mail to be sent if an alarm occurs for the ServiceStatus parameter on any
monitored service on the Windows Server.
The PATROL object name can also include the hostname when the rule exists on the
notification server but only applies to a particular host. For example, for the
configuration variable
/AS/EVENTSPRING/ALERT/EMAIL/winprod/NT_LOGICAL_DISKS/C:/emailTargetsLocalALARM
the rule only applies for alarm conditions occurring on the Windows Server winprod.
Chapter 5
155
NOTIFY_EVENT
NOTIFY_EVENT
This section describes the event details provided by the NOTIFY_EVENT and
REMOTE_NOTIFY_EVENT.
Event Details
The event details are collected prior to triggering the initial NOTIFY_EVENT event.
NOTIFY_EVENT events and REMOTE_NOTIFY_EVENT events contain identical
event details.
The alert message is provided as the first NOTIFY_EVENT argument EV_ARG1. The
event details are provided as the second argument, EV_ARG2.
The fields within the event details are comma delimited and are described in
NOTIFY_EVENT Fields on page 157.
Order of Fields
The field positioning within the event details does not change. If additional fields are
added, the existing fields remain in the order indicated.
Empty Fields
Some fields, such as custom id or parent instance, may be empty. In addition, if the
NOTIFY_EVENT is triggered from an application class object, fields that relate to the
instance or the parameter appear as __NA__ or are empty.
156
NOTIFY_EVENT
If tabs and commas are needed, you must replace them with non-problematic
characters prior to their use in the PATROL KM for Event Management. For example,
you could replace tabs replaced with -TAB- and then after the event is processed,
insert the tabs back.
NOTIFY_EVENT Fields
This topic describes the NOTIFY_EVENT fields. It also shows the following:
Table 35
the message replacement variables that you can use to reword notification
messages (rule: msgText and msgBody)
the environment variables that you can you use in your notifications script (rule:
alertLocalCommand)
Field
Message
Replacement Variable Environment Variable
Hostname
%HOSTNAME%
AS_HOSTNAME
Hostname of affected
system (e.g., glamis)
IP Address
%IPADDRESS%
AS_IPADDRESS
TCP Port
%TCP_PORT%
AS_TCP_PORT
UDP Port
%UDP_PORT%
AS_UDP_PORT
Description
Chapter 5
157
NOTIFY_EVENT
Table 35
Field
Message
Replacement Variable Environment Variable
Application Class
%APPCLASS%
Description
AS_APPCLASS
AS_APPINSTANCE
Icon Name
%ICON_NAME%
AS_ICON_NAME
Parent Instance
%PARENT_INSTAN AS_PARENT_INSTAN
CE%
CE
Parameter Name
%PARAMETER_NA
ME%
Parameter Status
Parameter Value
Alert Date
%DATE%
AS_PARAMETER
AS_DATE
Alert Time
%TIME%
AS_TIME
Time Zone
%TIMEZONE%
AS_TIMEZONE
Last10 Parameter
Values
%LAST10%
AS_LAST10
Average of Last 10
%AVE10%
AS_AVE10
158
NOTIFY_EVENT
Table 35
Field
Message
Replacement Variable Environment Variable
Last10 Timestamps
%LAST10TS%
AS_LAST10TS
%LAST10TP%
AS_LAST10TP
Event Id
%EVENT_ID%
AS_EVENT_ID
Event id on hostname,
which triggered the
notification. This is the
originating event id such as
from Standard Event 11
(e.g., 5343)
User defined
%USERDEFINED%
AS_USERDEFINED
Description
%OS_TYPE%
AS_OS_TYPE
Alarm Min
%ALARM_MIN%
AS_ALARM_MIN
Alarm Max
%ALARM_MAX%
AS_ALARM_MAX
Chapter 5
159
NOTIFY_EVENT
Table 35
Field
Message
Replacement Variable Environment Variable
Custom Id1
%CUSTOM_ID1%
AS_CUSTOM_ID1
Description
Custom identifier assigned
to object
(V2.4.02 and later)
Custom Id2
%CUSTOM_ID2%
AS_CUSTOM_ID2
PATROL Agent
version
%AGENT_VERSION AS_AGENT_VERSION
%
PATROL Home
%PATROL_HOME% AS_PATROL_HOME
Event catalog
%EVENT_CATALO
G%
Event class
%EVENT_CLASS%
AS_EVENT_CLASS
Event status
%EVENT_STATUS% AS_EVENT_STATUS
Event severity
Event type
%EVENT_TYPE%
AS_EVENT_TYPE
The following variables are not available from event details; they are provided as
message placement and environment variables only at a notification server.
Table 36
Environment Variable
Description
%NOTIFY_EVENT_ID%
AS_NOTIFY_EVENT_ID
%EVENT_TYPE%
AS_EVENT_TYPE
%EVENT_STATUS%
AS_EVENT_STATUS
160
Alert Rules
The following variables are available only as environment variables that can be used
by a notification script.
Table 37
Environment Variable
Description
Example
AS_NOTIFICATION_TYPE
notification type
e-mail, page
dave@anyco.com
AS_NOTIFICATION_MSG
reworded message
AS_NOTIFICATION_FILE
Alert Rules
Each PATROL object (computer, application class, instance, and parameter) can have
its own alert settings.
arsAction
You can use the arsAction rule to specify the actions to perform when an alert
condition occurs for a specific PATROL object.
Table 38
arsAction Rule
Rule
arsAction
Configuration Variables
Values
/AS/EVENTSPRING/object/arsAction
/AS/EVENTSPRING/object/arsActionINFORMATION
/AS/EVENTSPRING/object/arsActionWARNING
/AS/EVENTSPRING/object/arsActionALARM
3 bit mask
0 - Do nothing
2 - Allow recovery actions
4 - Trigger NOTIFY_EVENT (Perform notification)
6 - Allow recovery actions and notification
Menu Command Access Event Management => Alert Settings => Alert Actions
NOTE
To allow recovery actions for INFORMATION events, you must also set the
allowInfoRecoveryActions variable to 1.
Chapter 5
161
Alert Rules
alertSystem
You can use the alertSystem rule to specify the location of the notification server that
performs the notification for the specified PATROL object. The notification server can
be local, remote, both, or none.
Table 39
alertSystem Rule
Rule
alertSystem
Configuration Variable
Values
/AS/EVENTSPRING/ALERT/object/alertSystem
/AS/EVENTSPRING/ALERT/object/alertSystemINFORMATION
/AS/EVENTSPRING/ALERT/object/alertSystemWARNING
/AS/EVENTSPRING/ALERT/object/alertSystemALARM
Remote
Local
Local, Remote
None
For a detailed description of these options, see Table 40 on page 163.
Support
Menu Command
Access
162
Alert Rules
Table 40
Location
Description
LOCAL
Send alerts to a notification server on the same computer as the PATROL Agent that is
doing the monitoring. This configuration is sufficient for sending e-mail notification,
but most systems do not have paging capabilities. Paging usually requires the
REMOTE option.
Using the LOCAL option, notification failures have no impact on other systems. Local
notification is potentially more reliable since it requires fewer intermediate
components (for example, the network connection, the remote notification server).
Some disadvantages to using the LOCAL option are
REMOTE
Specifies that alerts are sent to a notification server that is on a different computer. The
REMOTE option allows you to centralize notification and simplifies the management
of settings and procedures. However, if the notification server fails, alerts from many
monitored machines are not sent. One way to reduce this risk is to configure a backup
notification server. If the primary notification server is unavailable, PATROL
automatically fails over to the backup notification server.
LOCAL,
REMOTE
You can choose both LOCAL and REMOTE. You may need to select this option if you
want to send an e-mail message or page from the local box, but still forward the event
to an enterprise console.
NONE
allowOverrides
You can use the allowOverrides rule to disable the use of rule overrides
(__OVERRIDE__).
Table 41
allowOverrides Rule
Rule
allowOverrides
Configuration Variable
/AS/EVENTSPRING/allowOverrides
Values
Example
Support
Chapter 5
163
Alert Rules
loginDeniedIgnoredUsers
Use the LoginDeniedIgnoredUsers configuration variable to specify the users to
ignore when a user name is denied login to the agent because of ACL restrictions or
invalid login information. When you use this variable, the specified user account does
not generate invalid login errors even if it is unable to login to the agent.
NOTE
If you use this configuration variable, you must add the built-in users EventSpring
and EventSpring_Availability_Check to the list of usernames. By default, if you dont
use the LoginDeniedIgnoredUsers configuration variable, then any login errors
caused by these built-in users are ignored. However, if you do use the
LoginDeniedIgnoredUsers configuration variable, login errors caused by these users
are not ignored unless you also add them to the comma-delimited list of usernames.
Table 42
LoginDeniedIgnoredUsers Rule
Rule
loginDeniedIgnoredUsers
Configuration
Variable
/AS/EVENTSPRING/loginDeniedIgnoredUsers
Values
Examples
patrol_checker,EventSpring,EventSpring_Availability_Check
Support
Menu Command
Access
Not available
useEnvOnlyForCmds
Use the useEnvOnlyForCmds rule to indicate whether PATROL KM for Event
Management should run all operating system commands (for example, notification
and recovery) with command-line arguments.
Table 43
useEnvOnlyForCmds Rule
Rule
useEnvOnlyForCmds
Configuration
Variable
/AS/EVENTSPRING/useEnvOnlyForCmds
Values
Example
Support
Menu Command
Access
Event Management => Alert Settings => Local Alert Settings => Notification
Command
164
Alert Rules
allowInfoRecoveryActions
Use the allowInfoRecoveryActions rule to indicate whether the PATROL KM for
Event Management can perform recovery actions for INFORMATION events. For
example, an INFORMATION event is generated when a parameter goes from an
ALARM state to an OK state.
Table 44
useEnvOnlyForCmds Rule
Rule
allowInfoRecoveryActions
Configuration
Variable
/AS/EVENTSPRING/allowInfoRecoveryActions
Values
Example
Support
Menu Command
Access
None
spoolDirectory
Use the spoolDirectory configuration variable to specify the directory where
PATROL KM for Event Management reports are stored (for example, parameter
reports and recovery action output).
Table 45
SpoolDirectory Rule
Rule
spoolDirectory
Configuration Variable
/AS/EVENTSPRING/spoolDirectory
Values
directory path
The default location is the directory specified in the PATROL_HOME
environment variable.
Example
/usr/local/patrol_reports
Support
Chapter 5
165
setParameterValue
You can use the setParameterValue rule to set the value of an active parameter.
.
Table 46
SetParameterValue Rule
Rule
setParameterValue
Configuration /AS/EVENTSPRING/setParameterValue
Variable
Format
PARAMETER=VALUE,DELAY=N,...,PARAMETER=VALUE,DELAY=N
DELAY = the time in seconds that the KM waits between each parameter set
(optional).
Example
/CPU/CPU/CPUCpuUtil=ALARM,.../CPU/CPU/CPUCpuUtil=CLEAR,DELAY
=5
Support
166
alertResend
You can use the alertResend rule to specify the number of times the agent should
resend outstanding alerts. You can configure alarm and warning alerts to have
different resend values. Alerts are resent at the interval specified by the
ResendAlertQueue parameter polling time and contain current alert information,
such as, parameter value and status. A resend value of -1 causes PATROL KM for
Event Management to resend outstanding alerts for object until the alert condition
clears.
Table 47
alertResend Rule
Rule
alertResend
Configuration Variable
/AS/EVENTSPRING/ALERT/object/alertResend
Values
Alarm_Resends,Warning_Resends
Example
2,1
Menu Command Access Event Management => Alert Settings => Local Alert Settings => Alert
Resend
alertLocalCommand
You can use the alertLocalCommand rule to specify a script or program to perform
notification, such as paging or e-mail. PATROL KM for Event Management contains
sample notification scripts located in the PATROL PSL directory. The same
notification command is typically set at the root (/) object level so that it applies to all
PATROL objects (for example, application classes, instances, and parameters) with an
ALERT status.
Table 48
alertLocalCommand Rule
Rule
alertLocalCommand
Example
/usr/patrol/my_notify.sh
Support
Menu Command
Access
Event Management => Alert Settings => Local Alert Settings =>
Notification Command
Chapter 5
167
arsCommand
You can use the arsCommand rule to specify a script or program that performs
recovery procedures pertaining to the PATROL object with an ALERT status.
PATROL KM for Event Management contains sample notification scripts located in
the PATROL PSL directory.
You can specify that the recovery action command executes only for a specific alert
status, such as INFORMATION, WARN, or ALARM by appending the status to the
variable name. However, to run recovery actions for INFORMATION events, you
must also set the variable allowInfoRecoveryActions to 1.
Table 49
arsCommand Rule
Rule
arsCommand
Example
/usr/patrol/filesystem_recovery.sh
Support
Menu Command
Access
Event Management => Alert Settings => Local Alert Settings => Recovery
Action Commands
NOTE
You must enable recovery actions using the Alert Actions menu command for the KM
to execute these actions. See arsAction on page 161.
arsCmdType
You can use the arsCmdType rule to specify the command type to use when
executing the recovery action command. This command is typically used when the
recovery action requires special KM information, such as the PATROL password
used to log into a database. The AS_EVENTSPRING application class contains a
sample PATROL command type.
168
Table 50
arsCmdType Rule
Rule
arsCmdType
Configuration Variable
/AS/EVENTSPRING/object/arsCmdType
/AS/EVENTSPRING/object/arsCmdTypeINFORMATION
/AS/EVENTSPRING/object/arsCmdTypeWARNING
/AS/EVENTSPRING/object/arsCmdTypeALARM
Values
command type
Example
PSL
Support
Menu Command
Access
Event Management => Alert Settings => Local Alert Settings => Recovery
Action Command Type
alertResetOnInit
You can use the alertResetOnInit rule to specify whether the agent should, upon an
agent restart, close outstanding events (for example, alarms or warnings) that existed
prior to the agent being shutdown. You may want to close these events because they
are no longer applicable. You cannot apply this rule to specific PATROL objects. By
default, this option is not enabled.
Table 51
alertResetOnInit Rule
Rule
alertResetOnInit
Configuration Variable
/AS/EVENTSPRING/ALERT/alertResetOnInit
Values
Menu Command Access Event Management => Alert Settings => Local Alert Settings => Send
Reset on Init
NOTE
The notification server must be running when you set up PATROL KM for Event
Management alert rules on remote agents.
Chapter 5
169
NOTIFICATION_SERVER
You can use the following notification server configuration variables to identify the
primary and backup notification servers for the remote agents.
Table 52
Configuration Variable
/AS/EVENTSPRING/NOTIFICATION_SERVER1.defaultAccount (primary)
/AS/EVENTSPRING/NOTIFICATION_SERVER2.defaultAccount (backup)
Values
user/encrypted password
Example
patrolns/FB0A195D062696
Menu Command Access Event Management => Quick Config => Remote Agent
Table 53
Configuration Variable
/AS/EVENTSPRING/NOTIFICATION_SERVER1 (primary)
/AS/EVENTSPRING/NOTIFICATION_SERVER2 (backup)
Values
Example
ns1,3181
Menu Command Access Event Management => Quick Config => Remote Agent
RemoteAgentCommSettings
You can use the RemoteAgentCommSettings configuration variable to configure the
remote communication settings for the following situations:
Table 54
170
TCP
UDP,timeout,retries
Table 54
Example
UDP,100,3
Menu Command
Event Management =>Alert Settings => Remote Alert Settings => Remote
Comm Settings
TIP
To prevent notification, use a special target name of NONE or leave the target blank.
For example, if you set a default target for an application class and set the target to
NONE for a particular instance or parameter in that application class, notifications for
that instance or parameter are not sent.
NOTE
The target type, such as page or e-mail, can be changed to any type of notification
action. For example, trouble ticket targets are not required for trouble tickets. The
target can perform any task programmed in the notification command.
emailTargets
You can use emailTargets rules to specify e-mail accounts as notification targets.
Chapter 5
171
Table 55
Rule:
emailTargets
Configuration /AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsLocalINFORMATION
Variable
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsLocalWARNING
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsLocalALARM
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsLocalESCALATED
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsLocal
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsRemoteINFORMATIO
N
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsRemoteWARNING
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsRemoteALARM
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsRemote
Values
email_target1,email_target2,mail_targetn
Example
patrol,admin@company.com
Menu
Command
Access
Event Management => Alert Settings => Notification Targets => Email
pagerTargets
You can use pagerTargets rules to specify one or more pagers as notification targets.
Table 56
Rule
pagerTargets
Configuration
Variable
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsLocalINFORMATIO
N
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsLocalWARNING
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsLocalALARM
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsLocalESCALATED
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsLocal
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsRemoteINFORMATI
ON
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsRemoteWARNING
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsRemoteALARM
/AS/EVENTSPRING/ALERT/PAGER/object/pagerTargetsRemote
Values
pager_target1,pager_target2,pager_targetn
Example
adminpg
Menu
Command
Access
Event Management => Alert Settings => Notification Targets => Pager
172
customTargets
You can use the customTargets rule to specify custom notification targets.
Table 57
Rule
customTargets
Configuration /AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocalINFORMATI
Variable
ON
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocalWARNING
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocalALARM
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocalESCALATED
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocal
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsRemoteINFORMA
TION
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsRemoteWARNIN
G
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsRemoteALARM
/AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsRemote
Values
custom_target1,custom_target2,custom_targetn
Example
glamis
Menu
Command
Event Management => Alert Settings => Notification Targets => Custom
ttTargets
You can use ttTargets rules to specify trouble ticket notification targets.
Table 58
Rule
ttTargets
Configuration
Variable
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsLocalINFORMATION
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsLocalWARNING
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsLocalALARM
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsLocalESCALATED
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsLocal
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsRemoteINFORMATION
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsRemoteWARNING
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsRemoteALARM
/AS/EVENTSPRING/ALERT/TT/object/ttTargetsRemote
Values
trouble_tix_target1,trouble_tix_target2,trouble_tix_targetn
Example
ttpatrol
Menu Command Event Management => Alert Settings => Notification Targets => Trouble Ticket
Chapter 5
173
Blackout Settings
NOTE
If the type of alert condition (INFORMATION, WARNING, ALARM, or
ESCALATED) is not specified for a notification target (for example,
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsRemote), notification
occurs for all alert conditions.
Blackout Settings
You can use the Blackout Periods menu commands to prevent notification during a
specified time period, even if an alert condition occurs. You can specify multiple
blackout times per day. Blackout periods apply to notification only and can be
applied to most PATROL objects. For more information about blackout periods, see
Configuring Blackout Periods on page 115.
blackoutPeriod
You can use the blackoutPeriod configuration variable to specify the start and stop
times of a blackout period for a specified PATROL object.
Table 59
Rule
blackoutPeriod
Configuration Variable
/AS/EVENTSPRING/BLACKOUT/object/blackoutPeriod
Values
Example
Menu Command Access Event Management => Alert Settings => Blackout Periods
__OVERRIDE__
You can use the __OVERRIDE__ configuration variable to override PATROL KM for
Event Management rules based on the time of day. Using this command, you can
establish multiple overrides per day.
174
Table 60
Configuration Variable
/AS/EVENTSPRING/__OVERRIDE__/object/rule
Values
Example
Menu Command Access Event Management => Alert Settings => Overrides
nsRemoteTargetSetting
You can use the nsRemoteTargetSetting configuration variable to specify the
handling of remote targets received by the notification server. Table 61 on page 175
lists the options you can specify for the remote target setting.
Table 61
Rule
nsRemoteTargetSetting
Configuration Variable
/AS/EVENTSPRING/NS/nsRemoteTargetSetting
Values
Example
Merge
Menu Command Access Event Management => Alert Settings => Notification Server Settings =>
Remote Target Settings
Chapter 5
175
Custom Settings
Custom Settings
You can use the following custom settings to reword notification messages and to
assign custom identifiers to an object.
msgText
You can use the msgText rule to specify the message format for the subject line of the
notification message. You can specify different formats for different types of alerts
and for specific PATROL objects (applications, instances, or parameters).
Table 62
Rule
msgText
Configuration /AS/EVENTSPRING/ALERT/MSG/object/msgText
Variable
/AS/EVENTSPRING/ALERT/MSG/object/msgTextINFORMATION
/AS/EVENTSPRING/ALERT/MSG/object/msgTextWARNING
/AS/EVENTSPRING/ALERT/MSG/object/msgTextALARM
Values
message_replacement_text
message_replacement_variables
message_replacement_text_and_variables
Example
Menu
Command
Access
Event Management => Alert Settings => Alert Messages => Default Message
Format
NOTE
If you do not specify INFORMATION, WARNING or ALARM, the same message
format is used for all events.
176
Custom Settings
msgBody
You can use the msgBody rule to specify the message format for the body of the
notification message. You can specify different formats for different types of alerts
and for specific PATROL objects (applications, instances, or parameters).
Table 63
Rule
msgText
Configuration
Variable
/AS/EVENTSPRING/ALERT/MSG/object/msgBody
/AS/EVENTSPRING/ALERT/MSG/object/msgBodyINFORMATION
/AS/EVENTSPRING/ALERT/MSG/object/msgBodyWARNING
/AS/EVENTSPRING/ALERT/MSG/object/msgBodyALARM
Values
message_replacement_text
message_replacement_variables
message_replacement_text_and_variables
Example
Menu
Command
Access
Event Management => Alert Settings => Alert Messages => Default Message
Format
NOTE
If you do not specify INFORMATION, WARNING or ALARM, the same message
format is used for all events.
Chapter 5
177
Custom Settings
NOTE
A special instance name of __ANYINST__ can be used for all instances of a
parameter. If object is not specified, then the configuration variable defines the default
message format.
Configuration
Variable
/AS/EVENTSPRING/object/CustomId1
/AS/EVENTSPRING/object/CustomId2
Values
custom_identifier
Example
financial_app
Support
Menu Command
Access
Event Management => Alert Settings => Custom Identifiers => CustomID1
Event Management => Alert Settings => Custom Identifiers => CustomID2
allowOperator
You can use the allowOperator configuration variable to control which PATROL KM
for Event Management menu commands an operator can execute from a PATROL
Operator console.
178
Custom Settings
Table 65
allowOperator Variable
Configuration
Variable
/AS/EVENTSPRING/MENU_COMMANDS/allowOperator
Values
Support
All configuration changes take affect immediately once they have been applied. The
following are exceptions:
These configuration settings are updated by restarting the PATROL Agent after
applying the configuration change.
Chapter 5
179
Custom Settings
active
You can use the active configuration variable to set the status of an application class.
NOTE
You cannot use this setting to activate an application class that is inactive by default
in the KM. If you use the PATROL KM for Event Management to activate such an
application class, the application class again becomes inactive after an agent restart.
Table 66
active Variable
Configuration
Variable
/AS/EVENTSPRING/APPLICATION_CLASSES/object/active
Values
Support
appClassSettingsStatusFlag
You can use the appClassSettingsStatusFlag to indicate whether PATROL KM for
Event Management application class settings are used.
NOTE
You cannot use this setting to activate an application class that is inactive by default
in the KM. If you use the PATROL KM for Event Management to activate such an
application class, the application class again becomes inactive after an agent restart.
Table 67
appClassSettingsStatusFlag Variable
Configuration
Variable
/AS/EVENTSPRING/APPLICATION_CLASSES/STATUSFLAGS/appClassSettingStatusF
lag
Values
0 = use KM defaults
1 = use PATROL KM for Event Management application class settings
2 = refresh active rules
Support
180
Availability
disableNotifyAnnotations
You can use the disableNotifyAnnotations variable to disable notification annotations
for the NotifiedEvents parameter. By default, this variable is not provided;
annotations are performed. To disable annotations, add this configuration variable to
the agent using the PATROL Configuration Manager and set the value to 1.
Table 68
disableNotifyAnnotations
Configuration Variable
/AS/EVENTSPRING/disableNotifyAnnotations
Values
Example
maxEventsToReport
You can use the maxEventsToReport variable to specify the maximum number of
NOTIFY_ EVENTS events to report in the console system output window when you
run the PATROL KM for Event Management menu command Reports => All NOTIFY
EVENTS.
Table 69
disableNotifyAnnotations
Configuration Variable
/AS/EVENTSPRING/maxEventsToReport
Values
Example
100
Availability
You can use the availability settings to specify the agents and hosts that PATROL
monitors for availability.
Chapter 5
181
Availability
Targets
You can use the Targets configuration variable to specify the host to be monitored.
You can also use this menu command to change the default SNMP settings and the
SNMP Object ID.
Table 70
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/Targets(Targets2)
Values
Example
Menu Command Access Event Management => Availability => Add Target
snmpSettings
You can use the snmpSettings configuration variable to specify the SNMP ping
information for the PATROL Agent on the managed system that you want to monitor
for availability.
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/snmpSettings
Values
Example
public,500,3
Menu Command Access Event Management => Availability => Add Target
snmpOid
You can use the snmpOid configuration variable to specify the SNMP Object ID on
the managed system that you want to monitor for availability. PATROL uses the
SNMP object ID only when checking the availability of the remote agent on the
managed system. It uses the object ID when making an SNMP call to the agent and
checking for a response. You can use the default object ID or provide any other valid
SNMP object ID.
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/snmpOid
Values
SNMP_ObjectID
Example
.1.3.6.1.2.1.1.3.0
Menu Command Access Event Management => Availability => Add Target
182
Availability
Updated
Use the Updated configuration variable to indicate that changes have been made to
the availability targets and availability checkers.
NOTE
The KM automatically sets the Updated variable to 1 whenever you make a change
using the Availability menu command.
Table 71
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/Updated
Values
Primary
You can use the Primary configuration variable to specify the primary availability
monitor.
Table 72
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/Primary
Values
Example
Menu Command Access Event Management => Availability => Failover Settings => Identify
Primary
NOTE
The PATROL Agent that you use to run the Identify Primary menu command
becomes the backup monitor.
Blackout
You can use the Blackout configuration variable to specify time periods to stop
monitoring of a host or an agent.
Chapter 5
183
Availability
NOTE
If you specify one or more availability blackouts for a PATROL Agent or host, the KM
stops monitoring that agent or host during the blackout period.
Table 73
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/Blackouts/host_port
Values
Example
Menu Command Access Event Management => Availability => Blackout Periods
pingCmd
You can use the pingCmd configuration variable to specify the operating system
command to use when checking host availability.
Table 74
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/pingCmd
Values
absolute_path_to_OS_ping_command
Example
/usr/patrol/myping.sh
Menu Command Access Event Management => Availability => Ping Command
pingOkString
The pingOkString configuration variable is the string that appears in the output of the
pingCmd.
Table 75
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/pingOkString
Values
ping output
Example
bytes
184
Availability
pingPacketSize
The pingPacketSize configuration variable defines the packet size of the ping
command in bytes.
Table 76
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/pingPacketSize
Values
Example
32
pingAttempts
The pingAttempts configuration variable defines the number of pings attempted.
Table 77
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/pingAttempt
Values
Example
pingArgs
The pingArgs configuration variable allows you to use custom ping arguments. The
arguments defined by pingArgs are appended to the ping command defined by the
configuration variable pingCmd.
If you assign a value to the configuration variable pingArgs, the configuration
variables pingAttempts and pingPacketSize are ignored.
For more information about using this variable, see Table 78 on page 186 or To
Specify Ping Command Arguments on page 93.
Chapter 5
185
Parameter Settings
Table 78
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/pingArgs
Values
Example
-n 2 -|32
checkerAccount.defaultAccount
You can use the checkerAccount.defaultAccount configuration variable to specify the
account to use when performing pings against other PATROL Agents.
Table 79
Configuration Variable
/AS/EVENTSPRING/AVAILABILITY/checkerAccount.defaultAccount
Values
username/PEM_encrypted_password
Example
patrolns/FB0A195D062696
Menu Command Access Event Management => Availability => Checker Account
NOTE
BMC Software recommends that you do use the PATROL Agent default account. The
account could be locked out if an agent check fails because of an invalid login.
Parameter Settings
You can use the Parameter Settings menu commands to customize PATROL
parameter thresholds and polling times. These changes are stored externally from the
KM and do not change the KM version.
THRESHOLDS
Using the Thresholds configuration variable, you can change the thresholds for all
instances of a parameter or thresholds for a particular parameter instance. Changes
apply only to the agent where the command was executed. This operation is similar
to creating a localized parameter (overriding the global definition) by using a
developer console.
186
Parameter Settings
Table 80
Configuration Variable
/FILESYSTEM/root/FSCapacity
Value
parameter_settings
Example
Menu Command Access Event Management => Parameter Settings => Thresholds
The following table provides a detailed description of the THRESHOLDS
configuration rule.
Table 81
Item
Description
variable folder
/NT_CPU
application class
/__ANYINST__
CPUprcrProcessorTi
mePercent
parameter name
80
85
Chapter 5
187
Parameter Settings
Table 81
Item
Description
85
100
interval
You can use the interval configuration variable to specify poll times for standard and
collector parameters.
Table 82
polltime_in_seconds
Example
90
Menu Command
Access
paramSettingsStatusFlag
You can use the paramSettingsStatusFlag configuration variable to enable or disable
the use of PATROL KM for Event Management thresholds or poll times. By default,
they are enabled. For more information on using PATROL KM for Event
Management to manage thresholds and poll times, see Managing Parameter
Thresholds and Poll Times on page 104.
188
Parameter Settings
Table 83
Configuration
Variable
Values
/AS/EVENTSPRING/PARAM_SETTINGS/STATUSFLAGS/paramSettingsStatusFlag
0 - PATROL KM for Event Management settings are ignored
1 - PATROL KM for Event Management parameter settings have been processed
2 - Refresh thresholds
4 - Refresh poll times
6 - Refresh thresholds and poll times
NOTE
You can use a special instance name, __ANYINST__, for all instances of a parameter.
processWildcards
You can use the processWildcards rule to enable the use of wildcards for instance
names when specifying parameter thresholds and poll times.
Table 84
1 = enable wildcards
0 = disable wildcards
Example
Menu Command
Access
None
Support
Chapter 5
189
Configuration Variable
/AgentSetup/ApplicationClass.filterList
Values
list_of_application_instances
Example
C:,D:,E:,F:
Configuration Variable
/AgentSetup/ApplicationClass.filterType
Values
Include
Exclude
190
Chapter
Parameters
This chapter list PATROL KM for Event Management parameters and shows their
default settings. The following topics are discussed:
Parameter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Parameter Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Chapter 6
191
Parameter Summary
Parameter Summary
PATROL KM for Event Management parameters are in the following applications
classes:
AS_EVENTSPRING
AS_AVAILABILITY
Parameter
Description
AgentLoginDenied
Monitors failed login attempts to the agent. The alarm is immediate - not
polling based.
To prevent a possible flood of notifications, this parameter alarms on the first
occurrence and must be manually reset or reset by a recovery action. Each
failed login attempt increments the parameter value by one and generates an
annotation that contains the IP address and user name of the failed login
account. You can use this information to troubleshoot communication
problems with the notification server. For more information, see
AgentLoginDenied Parameter is in Alarm on page 203.
NotifiedEvents
the number of OK, ALARM, and WARN NOTIFY events processed by the
PATROL KM for Event Management during the collection cycle. Data about
each event is stored in a parameter annotation. For example, if the following 3
events are detected during the collection cycle, an OK, an ALARM, and a
WARN event, then the value of the NotifiedEvents parameter is set to 3 and 3
annotations are created on the graph at that data point.
By default, the collection cycle is every 30 seconds. The collector parameter is
EventCollector.
You can use information to troubleshoot notification problems. For more
information, see Chapter 7, Troubleshooting PATROL KM for Event
Management.
192
Parameter Summary
Table 87
Parameter
Description
BlackoutEvents
EscalatedEvents
EventCollector
collects the NOTIFY events on the monitored agent and sets the value of the
following parameters:
NotifiedEvents
EscalatedEvents
BlackoutEvents
RetriggerEventQue
ue
Chapter 6
193
Parameter Defaults
Table 87
Parameter
Description
AvailabilityMonitor Collector that performs availability checks and sets the value of the following
Coll
parameters:
HostPingFailures
AgentPingFailures
SnmpPingFailures
HostPingFailures
SnmpPingFailures
Parameter Defaults
Table 88 lists the default properties for each PATROL KM for Event Management
parameter.
PATROL KM for Event Management Parameter Defaults (Part 1 of 2)
Type
AlertTest
Con
1-50
Active
Parameter
Alarm1
Alarm2
Annotated
Table 88
Border
Schedule
Icon
Units
N/A
N/A
Gauge
N/A
51-100
AgentLoginDenied
Con
N/A
N/A
0-0
N/A
Graph
N/A
NotifiedEvents
Con
N/A
N/A
N/A
N/A
Graph
N/A
194
Parameter Defaults
Type
BlackoutEvents
Con
EscalatedEvents
Active
Parameter
Alarm1
Alarm2
Annotated
Table 88
Border
Schedule
Icon
Units
N/A
N/A
N/A
N/A
Graph
N/A
Con
N/A
N/A
N/A
N/A
Graph
N/A
EventCollector
Coll
N/A
N/A
30 seconds
N/A
N/A
RefreshParamSettings
Std
N/A
N/A
0-1000
1.5 minutes
Graph
N/A
ResendAlertQueue
Std
N/A
N/A
N/A
10 minutes
Graph
N/A
RetriggerEventQueue
Std
N/A
N/A
N/A
2 minutes
Graph
N/A
AvailabilityMonitorCo Coll
ll
N/A
N/A
N/A
2 minutes 3
seconds
N/A
N/A
AgentPingFailures
Con
N/A
1
N/A
N/A
Graph
N/A
HostPingFailures
Con
N/A
1
N/A
N/A
Graph
N/A
SnmpPingFailures
Con
1
2
N/A
N/A
Graph
N/A
Chapter 6
195
Parameter Defaults
196
Chapter
Chapter 7
198
198
200
201
202
203
203
205
205
206
207
207
207
208
208
208
209
197
Configuration Problems
Configuration Problems
This section contains troubleshooting information for the following common
configuration problems:
Problem Type
Page
198
200
201
202
203
203
205
205
206
207
207
Solution
198
Configuration Problems
Default Values
If you configure the notification server using the Quick Config menu option, the
default value for /AS/EVENTSPRING/useEnvOnlyForCmds is 1 on Unix and
AS/400 (iSeries) environments, which does not support commas.
In Windows and VMS environments, the default value is 0, which does support
commas.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Notification Command => Set For Classes.
3 From the Choose Target Class(es) dialog box, select / (for all application classes)
and select Accept.
The SET EVENT MANAGEMENT VARIABLE: alertLocalCommand dialog box is
displayed, as shown in Figure 29.
Chapter 7
199
Configuration Problems
Figure 29
4 For the option Call command using Event Management KM environment variables
only, select No.
200
Configuration Problems
Explanation
Solution
Solution
The rule
Set the rule /AS/EVENTSPRING/ALERT/arsAction to 0.
/AS/EVENTSPRING/ALER
T/arsAction is set to 4.
If the arsAction rule is set to 4 for all PATROL objects, notifications
are sent for all events. Instead, you may want to disable notification
for all PATROL objects, by setting /AS/EVENTSPRING/arsAction
to 0 at the remote agent. Then, enable notification only for the
desired applications, instances, or parameters.
When you enable notification for a specific PATROL object, the
following configuration variable is created:
/AS/EVENTSPRING/ALERT/object/arsAction
Chapter 7
201
Configuration Problems
Solution
If the script runs correctly, verify that you have entered the
correct script name in your PATROL KM for Event
Management rule. If you update the script, you must restart the
PATROL Agent for the change to be recognized. For more
information, see Testing Notification Scripts on page 70.
The PATROL default account does Check the permissions on the script file.
not have the proper permissions
to execute the script file.
The PATROL Agent on the
notification server is not running.
202
/AS/EVENTSPRING/NOTIFICATION_SERVER1.defaultA
ccount rule exists at the remote agent. If this rule is not
present, you need to specify the notification server as
described in Configuring Remote Agents on page 73.
Configuration Problems
Solution
Solution
Chapter 7
203
Configuration Problems
Example)
patrol T:936.1389@192.168.1.233
To analyze the annotated data more closely, you can run this Unix command:
dump_hist-paramAgentLoginDenied-annotate|grep@|awk-F@{'print$2'}|sort
| uniq
204
Configuration Problems
Solution
The availability
Monitor a maximum of 100 agents.
monitor is monitoring
too many agents.
An availability monitor should monitor a maximum of 100 agents. If it
monitors more than 100 agents, it may not be able to ping with the
frequency specified by the parameter AvailabilityMonitorColl.
Solution
The parameter is being set There is currently no workaround for this issue.
to ALARM by way of an
PSL command, not because Some KMs change the state of a parameter using a PSL command.
it exceeded its threshold.
When this occurs, the parameter does not generate the standard state
change events 9, 11, or 39, that it generates when it exceeds thresholds
or is cleared. Thus, the PATROL KM for Event Management does not
detect the ALARM state and does not generate a NOTIFY_EVENT.
The wrong standard events Take the following steps:
catalog (StdEvents.ctg) is
being used.
1. For the PATROL Agent machine, obtain the updated catalog file,
StdEvents.ctg.EVS, and copy it to
%PATROL_HOME%\lib\knowledge.
2. Rename existing StdEvents.ctg to StdEvents.ctg.bak or any other
suitable name.
3. Rename StdEvents.ctg.EVS to StdEvents.ctg.
4. Restart the PATROL Agent.
If you are using the PATROL Console for Windows or PATROL
Console for Unix, make sure each is using the same StdEvents.ctg file
that is used by the PATROL Agent.
Chapter 7
205
Configuration Problems
Solution
206
Configuration Problems
Solution
Shorten the subject line to 80 characters or less and the body text to 255
characters or less.
In OpenVMS, the subject line of a mail message is limited to 80
characters and the e-mail message body is limited to 255 characters. If
you exceed these limits, notification messages may not be sent. For
more information, see Using Notification Scripts on page 64.
The notificiation rules are For more information about configuring notification rules, see
not configured properly. Configuring Notification Servers on page 71.
Solution
Solution
The event_trigger2() statement obtains the application If this problem occurs, you will need to
class, instance, and parameter name from the
change your notification rules so that
NOTIFY_EVENT details, not from the event origin.
notifications are sent to the correct target.
For more information see Event Details on page 156.
Chapter 7
207
Location
Description
Installation
logs
%USERPROFILE%\Application
Data\BMCINSTALL\
System
Output
Window
PATROL
Event
Manager
parameter
annotation
data
NotifiedEvents
BlackoutEvents
EscalatedEvents
Installation Logs
One log file is created each time the installer is run. The name of the log file is a
combination of the computer name and a time stamp. The log file is located in the
%USERPROFILE%\Application Data\BMCINSTALL\ directory.
For example, a log file for user bhunt on a Windows Server computer BHUNT_1
could be:
208
C:\WINNT\Profiles\jrando\Application Data\BMCinstall\BHUNT_1-1005340189.log.
Chapter 7
209
210
Appendix
BMC Software offers several PATROL consoles from which you can view a PATROL
Knowledge Module (KM). Because of the different environments in which these
consoles run, each one uses a different method to display and access information in
the KM. This appendix provides instructions for accessing the KM menu commands,
InfoBoxes, and online Help on each of the PATROL consoles. See the PATROL for
Windows Servers online Help for more detailed information about navigation in the
PATROL Consoles.
Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Appendix A
211
Console
To access
menu commands
To access
InfoBoxes
In either the Desktop tree tab or
the work area, right-click an
application class or parameter
icon and choose InfoBox from
the pop-up menu.
In the tree view area, right-click In the tree view area, right-click
an application icon and choose a PATROL object and choose
Knowledge Module Commands Infobox from the pop-up menu.
from the pop-up menu.
212
NOTE
If you are trying to access Help from a Unix console, see the PATROL Installation
Reference Manual for specific instructions about installing and setting up a browser in
the Unix environment.
Table 0-2
Console
PATROL Console
for Microsoft
Windows Servers
PATROL Console
for Unix
To access
product help
To access
application class help
Double-click an
application class in the
KM tab of the console.
From the Application
Properties dialog box,
click the Help tab. Then
click Show Help.
To access parameter
help
Right-click a
parameter icon and
choose Help On
from the pop-up
menu.
Double-click a
parameter icon; click
the ? icon or Help
button in the
parameter display
window.
Double-click a
parameter in the KM
tab of the console;
from the properties
dialog box, click the
Help tab; then click
Show Help.
Appendix A
213
Table 0-2
To access
product help
To access
application class help
To access parameter
help
PATROL Central
Operator Windows Edition
PATROL Central
Operator - Web
Edition
Console
214
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Index
Symbols
%AGENT_VERSION% 160
%ALARM_MAX% 159
%ALARM_MIN% 159
%APPCLASS% 158
%APPINSTANCE% 158
%AVE10% 158
%CUSTOM_ID1% 160
%CUSTOM_ID2% 160
%DATE% 158
%EVENT_CATALOG% 160
%EVENT_CLASS% 160
%EVENT_ID% 159
%EVENT_SEVERITY% 160
%EVENT_STATUS% 160
%EVENT_TYPE% 160
%HOSTNAME% 157
%ICON_NAME% 158
%IPADDRESS% 157
%LAST10% 158
%LAST10TP% 159
%LAST10TS% 159
%NOTIFY_EVENT_ID% 160
%OS_TYPE% 159
%PARAMETER_NAME% 158
%PARAMETER_STATUS% 158
%PARAMETER_VALUE% 158
%PARENT_INSTANCE% 158
%PATROL_HOME% 160
%TCP_PORT% 157
%TIME% 158
%TIMEZONE% 158
%UDP_PORT% 157
%USERDEFINED% 159
__ANYINST__ 149, 166, 189
__appl_class__ 124
__instance__ 124
__nfile__ 124
__output__ 125
__OVERRIDE__ 174
__param__ 124
__param_status__ 124
__param_value__ 124
__src_event_id__ 124
__udefvar__ 125, 143
A
accounts
adminstrative rights required for 28
availability monitoring 92
console connection 28
domain 28
generating failed login alarms 204
operator 28
root 29
setting up for installation 27
Unix 28
Windows 27
action scripts, AlarmPoint 98
active (configuration variable) 180
ActiveX control 66
addresses
default 72
email, multiple 198
paging 99
AgentLoginDenied 203
defined 192
resetting 204
troubleshooting 203
using annotation data 204
AgentPingFailures 194
agents
applying settings to 111
assigning notification servers to 73
configuring 7375
maximum to monitor 61
monitoring for availability 8793
persistent connection to 75
protocol settings 79
tuning 91
where to install 32
alarm ranges
default 194
setting 106
AlarmPoint
benefits 95
integrating with 94103
java client 21, 96
notification script for 95
215
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
alarms
generating notification for 128
resetting 204
triggering 106
tuning 201
alert condition 174
alertLocalCommand
defined 167
using 99
alertResend
defined 167
using 19, 20, 78
alertResetOnInit
defined 169
using 19
alerts
blacking out 115120
clearing outstanding 77
configuring 76
false 77
resending 78
troubleshooting 201
variables for 158
alertSystem
defined 162
troubleshooting 202
using 19, 20, 72, 76
AlertTest 193
aliases, account 29
ALL_COMPUTERS.KM 43
allowInfoRecoveryActions 165
allowOperator 178
allowOverrides 163
allowsendparamonly variable 206
annotations
disabling 181
parameter 194
troubleshooting 203, 208
using in recovery actions 140144
AP_PATROL_EmailActionScriptV521-01.ppx 98
AP_PATROL_FaxActionScriptV521-01.ppx 98
APAgent.xml 96
appClassSettingsStatusFlag 180
application classes
AS_AVAILABILITY 23
AS_EVENTSPRING 23
hierarchy 23
icons 23
variable for 158
architecture 16
arguments
command-line 164, 198
NOTIFY_EVENT 156
ping command 93
arsAction
defined 161
troubleshooting 201
216
arsAction, continued
using 19, 85, 99
arsCmdType
defined 168
using 19, 142
arsCommand
defined 168
using 19, 20, 142
AS/400
See also iSeries
installing on 42
scripts 67
subject line limitations 80
AS_AVAILABILITY.km 55
defined 23
InfoBox items 24
loading 53
preloading 91
troubleshooting 207
AS_EVENTSPRING.km
defined 23
InfoBox items 24
loading 53
AS_EVENTSPRING_ALL_COMPUTERS.km 53
AS_EVSLocalAlertNotify.bat
editing 68
requirements for using 66
AS_EVSLocalAlertNotify.pl
location 65
requirements for using 66
AS_EVSLocalAlertNotify.sh 65
AS_EVSLocalAlertNotifyAP.bat 99
AS_EVSLocalAlertNotifyAP.sh 99
availability
blackouts 184
monitoring 8793
AvailabilityMonitorColl
defined 194
troubleshooting 205
using 61
B
backing up notification scripts 69
backup availability monitor 89
backup notification servers 58
batch file 66
best practices 61
Blackout (configuration variable) 183
BlackoutEvents
annotations 208
defined 193
troubleshooting 203
blackoutPeriod
defined 174
using 19
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
blackouts, configuring 115120
Blat
defined 65
troubleshooting 198
version tested with 66
BMC Software, contacting 2
body, notification message 80
border, parameter 105
Bourne shell 45
C
C shell 45
cache, PATROL 43
changing
account, availability monitoring 92
notification messages 79
notification targets 171
parameter thresholds 104
ping commands 93
poll times 107
what is being monitored 112
checkerAccount.defaultAccount
defined 186
using 92
clearing
AgentLoginDenied parameter 204
false alerts 77
client, java 21
collection period, setting 107
colormap option 45
command-line 198
commands
menu 151
operating system 142
ping, changing 93
commas in variables 157
configuration variables
__ANYINST__ 189
__OVERRIDE__ 174
active 180
alertLocalCommand 167
alertResend 167
alertResetOnInit 169
alertSystem 162
allowInfoRecoveryActions 165
allowOperator 178
allowOverrides 163
appClassSettingsStatusFlag 180
arsAction 161
arsCmdType 168
arsCommand 168
Blackout 183
blackoutPeriod 174
checkerAccount.defaultAccount 186
CustomId1 and CustomId2 178
217
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
customizing
notification messages 79
ping command 93
scripts 6769
customTargets
defined 173
using 21, 99
D
date variables 158
default email account 72
default port number 27
default values, parameter 194
defining
notification servers 58
remote agents 58
targets 60
where to place rules 61
dependencies 55
deploying settings 59
designing
availability monitoring 61
notification servers 60
diagnosing problems 197209
disableNotifyAnnotations 181
disabling
annotations 181
monitoring of specific instances 112
notification 85
parameters 109
rules 86
use of event management KM thresholds 112
displaying in console 55
E
editing
notification messages 79
scripts 6769
electronic product download (EPD) site 31
emailTargets
defined 171
using 19
enabling
ftp 29
notification 141
parameters 109
PATROL KM for Event Management thresholds 112
recovery actions 121
enterprise console 59
environment variables
LANG 45
PATH 45
PATROL_BROWSER 46
218
H
Help, online 211
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
hierarchy, rule 154
host macro 94
hostname variable 157
HostPingFailures 194
I
ICMP ping 194
icon name variable 158
icon, parameter 194
importing action scripts 98
inheritance, rule 154
installation
custom option 35
log files 208
preparing for 30
setting up installation accounts 27
system requirements 26
typical option 35
Unix account requirements 28
Windows account requirements 27
installing
AlarmPoint java client 96
for the first time 37
on AS/400 (iSeries) 42
patches 30
upgrading from an earlier version 43
where to install PATROL Agent 32
instance name
__ANYINST__ 189
using wildcards to represent 107
variable 158
integration
AlarmPoint 94103
Blat 65
PATROL Enterprise Manager (PEM) 20
interval
collection, changing 107
configuration variable 188
IP address variable 157
iSeries
See also AS/400
installing on 42
scripts 67
subject line limitations 80
J
java client, AlarmPoint 96
K
KMs
determining versions of 209
installing individual 35
KMs, continued
installing QuickStart packages 35
loading and unloading 52
preloading 52
upgrading from an earlier version 43
Korn shell 45
L
LANG environment variable 45
license requirements 27
Linux
scripts 64
supported versions 26
loading KMs
with the PATROL Console for Unix 55
with the PATROL Console for Windows 54
local installation 31
local notification 162
location, rule 61
lock, account 203
login, failed 204
LoginDeniedIgnoredUsers 164
logs, installation 208
M
MAIL utility 67
mailx 64
Make Connection Persistent option 75
managed system role 32
MAPI scripts 67
maxEventsToReport 181
maximum agents to monitor 61
menu commands, accessing 211212
merging blackout settings 118
messages
body 177
customizing 140
error log 208
rewording 79
subject line 176
migrating from earlier version 43
monitoring
agent availability 8793
notification servers 60
specific instances 112
msgBody
defined 177
using 19
msgText
defined 176
using 19
multiple targets, email 198
219
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
N
negative value, parameter 202
Netscape Navigator 44
new PATROL users
easy install option 35
installing for the first time 37
NFS 29
notification
local versus remote 162
scripts, using 6471
server 17, 58
system, configuring 72
types supported 69
notification messages
body text 80
length 80
rewording 79
subject line 80
where to send from 72
notification scripts
backing up 69
customizing 69
editing 67
specifying 72
testing 70
notification servers
benefits of 58
configuring 7172
defining 58
monitoring for availability 60
primary and backup 58
protocol settings 79
providing security for 59
notification targets
defining 72
types 70
NOTIFICATION_SERVER1
defined 170
using 73
NOTIFICATION_SERVER1.defaultAccount
defined 170
troubleshooting 202
using 73
NOTIFICATION_SERVER2
defined 170
using 73
NOTIFICATION_SERVER2.defaultAccount 170
NotifiedEvents
annotations 181, 208
defined 192
troubleshooting 203
usage example 143
NOTIFY_EVENT
description 156
missing 205
triggering 156
220
NOTIFY_EVENT, continued
troubleshooting 203
nsRemoteTargetSetting 175
O
objects, PATROL 153
OpenVMS
ping command 94
scripts 67
subject line limitations 80
support for 26
troubleshooting 207
operating systems, support for 26
operator accounts 28
OS (operating system)
command type 142
type, variable 159
OS(operating system)
supported 26
output window, system 208
overrides
allowing 163
variable 174
P
PACFG (PATROL Agent Configuration) utility 206
pagerTargets 172
parameters
activating 105
AgentLoginDenied 192
AgentPingFailures 194
AlertTest 192, 193
AvailabilityMonitorColl 194
BlackoutEvents 193
default values 194
EscalatedEvents 193
EventCollector 193
HostPingFailures 194
list of 192
NotifiedEvents 192
RefreshParamSettings 193
ResendAlertQueue 193
RetriggerEventQueue 193
set value 166
SnmpPingFailures 194
variables for 158
paramSettingsStatusFlag
defined 188
using 111
parent instance variable 158
partitions, installing on 29
patches, installing 30
PATH environment variable 45
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
PATROL Agents
See also agents
version of, variable for 160
where to install 32
PATROL Configuration Manager
icon 22
using 134
PATROL Enterprise Manager (PEM) 59
PATROL Event Translator (PET) 20
PATROL objects 153
PATROL Script Language (PSL) 124
PATROL security 34
PATROL.conf 206
PATROL_BROWSER environment variable 46
PATROL_CACHE 43
pconfig variables 17
PEM (PATROL Enterprise Manager) 59
Perl scripts 65
permissions 202
persistent agent connection 75
PET (PATROL Event Translator) 20
pingArgs
defined 185
using 93, 94
pingAttempts 185
pingCmd
defined 184
OpenVMS 94
using 93
pinging
arguments 93
commands 93
InfoBox items 24
on OpenVMS 94
problems with 205
variables 184186
pingOkString 184
pingPacketSize 185
planning
availability monitoring 61
installation 30
notification 58
platforms, supported 26
poll times
applying to agent 111
disabling 112
setting 107
practices, best 61
preloading KMs 52
preparing for installation 30
Primary (configuration variable) 183
problem resolution 197209
processWildcards
defined 189
using 111
product
application classes 23
architecture 16
capabilities 15
components 15
features 16
uninstalling in Windows environments 48
product support 3
protocol settings 79
PSL (PATROL Script Language) 124
R
ranges, alarm 106
recommendations, rule location 61
recovery actions
about 121
allowing 161
configuring 120125
enabling 121
examples 144
rule location 63
testing 149
redundancy 58, 60
RefreshParamSettings 193
remote agents, assigning notification servers to 73
remote installation 31
REMOTE_NOTIFY_EVENT
triggering 156
troubleshooting 203
RemoteAgentCommSettings
defined 170
using 79
removing
annotations 181
customized KM files 43
menu commands 43
notification 85
renaming notification scripts 69
requirements
license 27
system 26
Unix account 28
Unix script 65
Windows account 27
Windows script 66
ResendAlertQueue 193
resending alerts 78
Reset AgentLoginDenied Alert menu command 204
restart, agent 206
RetriggerEventQueue 193
rewording
default notification message 81
example 136
messages 79
variables 81
221
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
rules
__OVERRIDE__ 174
See also configuration variables
active 180
alertLocalCommand 167
alertResend 167
alertResetOnInit 169
alertSystem 162
allowOperator 178
allowOverrides 163
appClassSettingsStatusFlag 180
arsAction 161
arsCmdType 168
arsCommand 168
Blackout 183
blackoutPeriod 174
checkerAccount.defaultAccount 186
copying 134
CustomId1 and CustomId2 178
customTargets 173
disableNotifyAnnotations 181
e-mail 154
emailTargets 171
example 153
filterList 190
filterType 190
hierarchy 153
hierarchy of 154
inheritance 154
inheritance of 154
interval 188
LoginDeniedIgnoredUsers 164
loginDeniedIgnoredUsers 164
msgBody 177
msgText 176
notification server 170
nsRemoteTargetSetting 175
overriding 86
pagerTargets 172
paramSettingsStatusFlag 188
pingArgs 185
pingAttempts 185
pingCmd 184
pingOkString 184
pingPacketSize 185
Primary 183
processWildcards 189
RemoteAgentCommSettings 170
setParameterValue 166
snmpOid 182
snmpSettings 182
spoolDirectory 165
Targets 182
testing 84
Thresholds 186
ttTarget 173
Updated 183
222
rules, contined
useEnvOnlyForCmds 164
using wildcards in 107
where to locate 61
S
scalability 205
scenarios 128150
schedule, parameter 195
scheduling interval, setting 107
scripts
action 98
AlarmPoint 98, 99
AS/400 (iSeries) 67
backing up 69
batch file 66
customizing 69
editing 6769
Linux 64
OpenVMS 67
Perl 65
renaming 69
testing 70
Unix 64
using 6471
using exit statements in 202
Windows 65
security
account 28
changing levels 34
notification server 59
SED Utility 143
Send Distribution utility 67
send_mapi.vbs 66
sendmail.vbs 66
servers
deploying settings to 59
monitoring for availability 60
notification 71
setParameterValue
defined 166
using 103
setting environment variables for Help browser 45
shells
Bourne 45
C 45
Korn 45
SMTP scripts 67
snmpOid 182
SnmpPingFailures 194
snmpSettings 182
spoolDirectory 165
standard events catalogue 43
standard events, PATROL 19, 159, 205
StdEvent.ctg 43
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
StdEvents.ctg.EVS 205
stopping
notification 85
the monitoring of objects 112
subject line
back slashes in 81
length limitations 80
notification message 80
rewording 79
rewording variables 81
support, customer 3
supported platforms 26
system output window 208
system requirements 26
T
tabs in variables 157
targets
availability monitoring 88
custom 21
example 136
rules 171174
using multiple 198
where to locate 61
Targets (configuration variable) 182
TCP port variable 157
TCP protocol 79
technical support 3
telnet, enabling 29
testing
AlarmPoint java client 97
notification scripts 70
notification using AlarmPoint 103
recovery actions 149
rules 84
thresholds
applying to agent 111
configuration variable 186
disabling 112
PATROL KM for Event Management 104
rule for 187
setting 104
tuning 201
time variables 158, 159
Tivoli 59
Trigger NOTIFY_EVENT option 101
triggering alarms 106
troubleshooting 197209
ttTarget
defined 173
using 70
typical installation option 35
U
UDP Port variable 157
UDP protocol 79
umask setting 29
uninstalling 48
units, parameter 194
Unix
account requirements 28
browser requirements 44
scripts 64
subject line limitations 80
using for availability monitoring 61
unloading KMs
with the PATROL Console for Unix 57
with the PATROL Console for Windows 57
Updated (configuration variable) 183
upgrading 43
backing up scripts prior to 30
from an earlier version of the KM 43
useEnvOnlyForCmds
changing value of 199
defined 164
troubleshooting 198
user account 45
User defined variables 159
userdefined configuration variable 157
V
variables
alarm settings 159
alert 158
application class 158
date 158
disableNotifyAnnotations 181
event catalog 160
event class 160
event ID 159
event severity 160
event status 160
event type 160
hostname 157
icon name 158
instance name 158
IP address 157
maxEventsToReport 181
message-replacement 157161
OS type 159
parameter 158
parent instance 158
PATROL Agent version 160
PATROL_BROWSER 46
pconfig 17
pingArgs 186
pingAttempt 185
223
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
variables, continued
pingPacketSize 185
TCP port 157
time 158, 159
UDP port 157
user-defined 159
using tabs or commas in 157
VB (Visual Basic) 65
verifying discovery 64
version, determining 209
Visual Basic (VB) 65
VMware, support for 29
W
What If? feature 84
wilcards 107
Windows
accounts 27
scripts 65
224
Notes
*52965*
*52965*
*52965*
*52965*
*52965*