Professional Documents
Culture Documents
Version: V12.13.50
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright © 2014 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
II
Figures............................................................................................................. I
Tables ............................................................................................................ III
Glossary .........................................................................................................V
III
IV
Intended Audience
This manual is intended for:
l Maintenance engineers
l Debugging engineers
Chapter Summary
2, Remote Backup Path Configuration Describes how to set a remote backup path.
4, System Backup and Restoration Describes data backup and restore operations.
5, System Monitoring Describes how to monitor the application server and the
database of the NetNumen U31 system.
Related Documentation
The following documentation is related to this manual:
l NetNumen U31 R18 Unified Element Management System Performance
Management Operation Guide
l NetNumen U31 R18 Unified Element Management System System Management
Operation Guide
l NetNumen U31 R18 Unified Element Management System Security Management
Operation Guide
l NetNumen U31 R18 Unified Element Management System MML Command
Reference
Typeface Meaning
II
1.1 Overview
The NetNumen U31 system provides the following modules for system maintenance and
monitoring:
l Task management module
l System backup and restoration module
l System monitoring module
l IT device monitoring module (optional)
IT monitoring is an optional function. Users need to apply for the software license from
ZTE and select ITMP when installing the NetNumen U31 server and client.
1-1
Historical Data Backs up and deletes log data, l Refreshing task settings
Archiving performance data, and alarm data l Modifying task settings
periodically to maintain database l Saving task settings
capacity. l Cancelling task modification
l Displaying the task execution
exceptions
l Displaying the task execution log
l Stopping the ongoing backup
process
l Enabling the data monitoring
function
File and Database Backs up the entire database l Modifying task settings
Backup with its structure and basic data l Saving task settings
(except historical data), and backs l Cancelling task modification
up version files, configuration l Displaying the task execution log
files, and runtime files in the l Stopping the ongoing backup
system. process
l Activating the task
l Suspending the task
File Clean-up Clears data backup files and l Modifying task settings
result files generated by other l Executing a task instantly
management operations to l Viewing the task execution log
maintain hard drive capacity. l Viewing file information
l Customizing columns to be
displayed
l Searching for specific directory for
file clean-up
1-2
In addition to the five task types described in Table 1-1, the task management module
allows users to schedule tasks in which Man Machine Language (MML) commands are
used to specify the actions to be performed. The following operations can be performed
to a scheduled MML task:
l Suspending an MML task
l Activating an MML task
l Modifying an MML task
l Viewing an MML task
l Viewing the execution log of an MML task
l Deleting an MML task
1-3
Supported Devices
The IT device monitoring module of the NetNumen U31 system can monitor the following
IT devices:
Type Model
Server Solaris, AIX, HP-UX, RedHat Linux, SUSE Linux, CGS Linux, Windows.
Applications BIND service, DNS service, TOMCAT service, , NTP service, NetNumen,
IBM Tivoli storage management, Trend Micro anti-virus software, WebLogic
application.
Note:
The supported IT devices vary with different NetNumen U31 versions.
Operating Environment
The IT device monitoring module can operate on various platforms. The following provides
the operating systems and databases that support the module operation:
Environment Version
Operating system Windows 2003 Server (SP2 or later), Windows 2008 Server, Solaris 10,
CGS Linux, IBM AIX
1-4
Environment Version
Operation Procedure
Figure 1-1 shows the operation procedure of IT device monitoring.
For details about how to create a measurement task, create a threshold task, and query
performance data, refer to the NetNumen U31 R18 Unified Element Management System
Performance Management Operation Guide.
1-5
1-6
Steps
1. On the menu bar, select Maintenance > Remote Backup Path Configuration. The
Configuration of Remote Backup Path dialog box is displayed, see Figure 2-1.
Parameter Description
File Transfer Protocol File transfer protocol. The options are: SFTP and FTP.
2-1
Note:
The Remote Backup Path text box and the Browse button are available only when
the server parameters are properly set.
6. If data backup to the remote server is not required any longer, perform the following
operations:
a. Select Maintenance > Remote Backup Path Configuration on the menu bar.
The Configuration of Remote Backup Path dialog box is displayed.
b. Click Clear. The parameter settings are cleared in the dialog box.
c. Click OK. The Remote Backup Path check box in the task information pane
becomes unavailable and the remote path disappears.
– End of Steps –
2-2
In the left pane of the Task Management window, all scheduled tasks are displayed by
type in a navigation tree. The right pane displays the information of a task selected in
the navigation tree. The task management toolbar provides multiple buttons for managing
scheduled tasks. The toolbar buttons vary with different tasks.
3-1
Context
The system defines a default start time (a specific hour) for each scheduled task type. A
scheduled task may be started from the exact default hour or a time offset. The time offset
is a random value generated by the system, and is an integer multiple of 10 ranging from
0 to 60. For example, if the start time of historical data archiving tasks is 22:00:00, the log
data backup and deletion task may be started at 22:20:00.
Note:
l Users do not need to modify the start time of scheduled tasks unless absolutely
necessary because the default start time is optimal in most cases.
l The start time should be unique for each type of scheduled tasks.
Steps
1. Select Maintenance > Task Management > Modify Task Start Time. The Modify
Task Start Time dialog box is displayed, see Figure 3-2.
3-2
2. Select File Clean-up, and then click (Alternatively, double-click the selected task
type). The Modify Time dialog box is displayed, see Figure 3-3.
3. Enter or select a new hour, and then click OK. The Modify Time dialog box is closed.
4. Click OK. The Modify Task Start Time dialog box is closed.
– End of Steps –
3-3
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click Log Data Backup and Deletion Task in the Task Management tree. The task
information is displayed in the right pane, see Figure 3-4.
For a description of the toolbar buttons for managing the log data backup and deletion
task, refer to Table 3-1.
Table 3-1 Toolbar Buttons for Managing the Log Data Backup and Deletion Task
Button Description
Refreshes the task to obtain the latest settings from the NetNumen
U31 server.
3-4
Button Description
3. To enable the log data monitoring function and set monitoring thresholds, perform the
following steps:
a. Click on the toolbar. The Set Capacity dialog box is displayed, see Figure
3-5.
Note:
All thresholds must be lower than the corresponding capacity limits.
b. Click Run, and then set thresholds for the operation log, system log, and security
log as required.
3-5
For a description of the parameters in the Set Capacity dialog box, refer to Table
3-2.
Parameter Description
Threshold (Critical) Set four thresholds for each log type as required.
Threshold (Major) If the number of log records exceeds a preset threshold, the system
Threshold (Minor) will raise a threshold crossing alarm at the corresponding severity
Threshold (Warning) level and delete older log records to reduce the log records in the
database.
After the alarm-raising thresholds for different severity levels are set, the system
checks the storage usage. If the system detects that the storage of the log backup
directory exceeds a specified threshold, an alarm of the corresponding severity
is raised, and the backup data is deleted to a size below 80% of the Warning
threshold.
Note:
When the capacity thresholds are set, the log saving duration in the database may
be shorter than the duration set in the configuration center.
The database space occupied by log data can be calculated as follows:
l In the system log table: 1024 log records occupy 1 MB.
l In the security log table: 3300 log records occupy 1 MB.
l In the operation log table: 1024 log records occupy 1 MB.
a. Click on the toolbar. The Backup Description area is activated, see Figure
3-6.
3-6
c. (Optional) To back up the log data in both the default path and a remote path,
select Remote Backup Path in the Backup Path area.
Note:
The Remote Backup Path is only available when the remote backup path is set.
For how to set a remote backup path, refer to "Chapter 2 Remote Backup Path
Configuration".
d. Click .
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click PM Data Backup and Deletion Task in the Task Management tree. The task
information is displayed in the right pane, see Figure 3-7.
3-7
For a description of the toolbar buttons for managing the performance data backup
and deletion task, refer to Table 3-3.
Table 3-3 Toolbar Buttons for Managing the Performance Data Backup and Deletion
Task
Button Description
Refreshes the task to obtain the latest settings from the NetNumen
U31 server.
3-8
c. (Optional) To back up the performance data in both the default path and a remote
path, select Remote Backup Path.
Note:
The Remote Backup Path is only available when the remote backup path is set.
For how to set a remote backup path, refer to "Chapter 2 Remote Backup Path
Configuration".
d. Click .
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click Alarm Data Backup and Deletion Task in the Task Management tree. The
task information is displayed in the right pane, see Figure 3-8.
3-9
For a description of the toolbar buttons for managing the alarm data backup and
deletion task, refer to Table 3-4.
Table 3-4 Toolbar Buttons for Managing the Alarm Data Backup and Deletion Task
Button Description
Refreshes the task to obtain the latest settings from the NetNumen
U31 server.
3. To enable the data monitoring function and set monitoring thresholds, perform the
following steps:
3-10
a. Click on the toolbar. The Set Capacity dialog box is displayed, see Figure
3-9.
Note:
All thresholds must be less than the corresponding capacity limits.
b. Click Run, and then set thresholds for the operation log, system log, and security
log as needed.
For a description of the parameters in the Set Capacity dialog box, refer to Table
3-5.
Parameter Description
Threshold (Critical) Set four thresholds for each log type as required.
Threshold (Major) If the number of log records exceeds a preset threshold, the system
Threshold (Minor) will raise a threshold crossing alarm at the corresponding severity
Threshold (Warning) level and delete older log records to reduce the log records in the
database.
After the alarm-raising thresholds for different severity levels are set, the system
checks the storage usage. If the system detects that the storage of the log backup
3-11
Note:
The database space occupied by alarm data can be calculated as follows:
l In the history alarm table: 300 alarm records occupy 1 MB.
l In the notification table: 300 alarm records occupy 1 MB.
c. Click OK.
4. To modify the backup settings, perform the following steps:
Note:
The Remote Backup Path is only available when the remote backup path is set.
For how to set a remote backup path, refer to "Chapter 2 Remote Backup Path
Configuration".
d. Click .
– End of Steps –
Context
Users can perform the following management operations on the basic data backup task:
l Modifying task settings.
l Saving and cancelling task modifications.
l Viewing the task execution log. Each log record contains the information of task
source, task rank, log name, details, host IP address, start time, end time, and related
log.
3-12
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click Backup Basic Data in the Task Management tree. The task information is
displayed in the right pane, see Figure 3-10.
Note:
l The button used to stop the basic data backup process is only available when
the system is backing up basic data during task execution.
l The Remote Backup Path is only available when the remote backup path is set.
For how to set a remote backup path, refer to "Chapter 2 Remote Backup Path
Configuration".
3. (Optional) To modify task settings, click . The Remote Backup Path check box is
available.
4. (Optional) Select the Remote Backup Path check box for saving the backup data both
in the default path and on the remote server.
3-13
7. (Optional) To view the execution log of the task, click on the toolbar. The View
Log dialog box is displayed, listing the log records of the task.
8. (Optional) To stop the ongoing backup process, click on the toolbar. The system
stops backing up the basic data.
9. (Optional) To suspend the basic data backup task, perform the following steps:
The basic data backup task is suspended and the button on the toolbar is
available.
11. Click .
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click Backup Whole DB Structure in the Task Management tree. The task
information is displayed in the right pane, see Figure 3-11.
3-14
Note:
l The button used to stop the database structure backup process is only
available when the system is backing up the entire database structure during
task execution.
l The Remote Backup Path is only available when the remote backup path is set.
For how to set a remote backup path, refer to "Chapter 2 Remote Backup Path
Configuration".
3. (Optional) To modify task settings, click . The Remote Backup Path check box is
available.
4. (Optional) Select the Remote Backup Path check box for saving backup data both in
the default path and on the remote server.
7. (Optional) To view the execution log of the task, click on the toolbar. The View
Log dialog box is displayed, listing the log records of the task.
8. (Optional) To stop the ongoing backup process, click on the toolbar. The system
stops backing up the entire database structure.
3-15
9. (Optional) To suspend the entire database structure backup task, perform the following
steps:
The entire database structure backup task is suspended and the button on the
toolbar is available.
11. Click .
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click Backup File in the Task Management tree. The task information is displayed
in the right pane, see Figure 3-12.
3-16
Note:
The Remote Backup Path is only available when the remote backup path is set.
For how to set a remote backup path, refer to "Chapter 2 Remote Backup Path
Configuration".
3. (Optional) To modify task settings, click . The Remote Backup Path check box is
available.
4. (Optional) Select the Remote Backup Path check box for saving backup data both in
the default path and on the remote server.
7. (Optional) To view the execution log of the task, click on the toolbar. The View
Log dialog box is displayed, listing the log records of the task.
8. (Optional) To suspend the file backup task, perform the following steps:
The file backup task is suspended and the button on the toolbar is available.
3-17
10. Click .
– End of Steps –
Steps
1. Modify the directory monitoring task.
a. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
b. In the Task Management tree, click Directory Monitoring under File Clean-up.
All directory monitoring tasks are listed in the right pane, see Figure 3-13.
c. Select the Performance Data Backup Directory Monitoring task and click .
The Performance Data Backup Directory Monitoring dialog box is displayed,
see Figure 3-14.
3-18
5. Click . The Directory Monitor File Information dialog box is displayed, see
Figure 3-15.
3-19
Steps
1. Click Automatically Acknowledge History Alarms in the Task Management tree.
The task information is displayed in the right pane, see Figure 3-16.
3-20
For a description of the toolbar buttons for managing the historical alarms
acknowledgement task, refer to Table 3-6.
Table 3-6 Toolbar Buttons for Managing the History Alarms Acknowledgement Task
Button Description
2. Click on the toolbar. The spin box under Day Setting is activated.
3. Enter or select a new number in the spin box.
4. Click .
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks (if
there are any in the system) are displayed in the right pane, see Figure 3-17.
3-21
For a description of the toolbar buttons for managing MML tasks, refer to Table 3-7.
Button Description
3. Click on the toolbar. The Create Task dialog box is displayed, see Figure 3-18.
3-22
Parameter Description
Task Status Select an initial status for the new MML task. The options are:
l Active: The system will execute an active task when the preset
start time is reached.
l Suspended: The system will not execute a suspended task
even when the preset start time is reached.
Edit Command A mode for command line editing, which requires users to enter MML
commands in the dialog box.
3-23
Parameter Description
Refer to Script Files A mode for command line editing. Users must select an operation
object from the Operation Object drop-down list and select a script
file in which MML commands to be executed have been edited in
advance, and click Import. The imported script file is displayed in
the Command text box.
Operation Object Select an object on which the system will perform operations in
accordance with the MML commands in the selected script file.
3-24
Note:
If Once is selected from the drop-down list, proceed to Step 7 after setting the
execution time.
For example, if an MML task is to be executed on Monday every two weeks, users
need to select By Week from the drop-down list, enter 2 in the text box, and select
Monday in the Plan Type area (see Figure 3-20).
Note:
The Execution Time area is only available when By Day, By Week, or By Month
is selected under Plan Type.
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
3-25
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task to be displayed, and then do one of the following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click View Task.
l Double-click the task.
The View Task dialog box is displayed, showing the basic information of the task on
the Basic Information tab by default.
4. Click the Policy tab. The task schedule is displayed on the Policy tab.
5. Click OK.
– End of Steps –
Prerequisite
The status of the MML task to be modified is “Suspend”.
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task to be modified, and then do one of the following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click Modify Task.
The Modify Task dialog box is displayed.
Note:
For a description of the parameters on the Basic Information and Policy tabs, refer
to “3.3.1 Creating an MML Task”.
The task name and status cannot be modified.
4. On the Base Information tab, modify the task description and the MML commands
as needed.
5. Click the Policy tab, and then modify the task schedule as needed.
3-26
6. Click OK.
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task to be activated, and then do one of the following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click Activate Task.
A confirmation box is displayed.
4. Click Yes to continue. The MML task status changes from “Suspend” to “Active”.
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task to be suspended, and then do one of the following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click Suspend Task.
4. Click Yes to continue. The MML task status changes from “Active” to “Suspend”.
– End of Steps –
3-27
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task whose execution log is to be displayed, and then do one of the
following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click View Log.
The View Log dialog box is displayed, listing all log records of the task.
4. To display the details of a log record, double-click the record, or right-click the record
and click Display Log Detail. The Log Detail dialog box is displayed.
5. Click Close. The Log Detail dialog box is closed.
6. Click OK. The View Log dialog box is displayed.
– End of Steps –
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task whose execution result is to be displayed, and then do one of
the following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click View Execution Result.
The View Execution Result dialog box is displayed, listing all result files of the task,
see Figure 3-21.
3-28
4. Select a result file, and then click in the View Execution Result dialog box.
Another View Execution Result dialog box is displayed, showing the execution result
of each MML command, see Figure 3-22.
Figure 3-22 View Execution Result Dialog Box (Command Execution Results)
3-29
5. Double-click a command. The details of the command execution result are displayed
under Execution Command Result.
6. Click Close.
– End of Steps –
Prerequisite
The status of the MML task to be deleted is “Suspend”.
Steps
1. Select Maintenance > Task Management from the menu bar. The Task
Management window is displayed.
2. Click MML Timing Task in the Task Management tree. All existing MML tasks are
displayed in the right pane.
3. Locate the MML task to be deleted, and then do one of the following:
l Click the task, and then click on the toolbar.
l Right-click the task, and then click Delete Task.
A confirmation dialog box is displayed.
4. Click Yes to continue. The MML task disappears from the Task Management window.
– End of Steps –
3-30
In the left pane of the System Backup and Restore window, all available backup and
restoration operations are listed in a navigation tree.
Being different from the scheduled backup and deletion tasks in the Task Management
window, which are automatically executed by the system, the backup and deletion
operations in the System Backup and Restore window are manually performed. In
4-1
addition, users can modify the backup or restore settings in the System Backup and
Restore window before performing a backup or restore operation.
If the button is not available on the toolbar, right-click a blank area on the toolbar,
and then select Customize from the shortcut menu to customize buttons to be
displayed on the toolbar.
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Backup Whole DB Structure in the Backup and Restore tree. The backup
settings are displayed in the right pane, see Figure 4-2.
3. To change the path for saving backup files, perform the following operations:
a. Click Browse... next to the Backup File Save Path at Server box. The Open
dialog box is displayed.
4-2
b. Select a new path, and then click Open. The new path is displayed in the Backup
File Save Path at Server text box.
4. To download the backup files from the server to the local client upon backup
completion, perform the following operations:
a. Select the Backup File Download Path at Client check box. The text box and
the Browse... button are activated.
b. To change the path, click Browse.... The Open dialog box is displayed.
c. Select a new path on the local client, and then click Open.
5. Click Execute. The system starts backing up the entire database structure and
displays the backup process and result in the Execution Result area.
– End of Steps –
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Backup Basic Data in the Backup and Restore tree. The backup settings are
displayed in the right pane, see Figure 4-3.
3. To change the path for saving backup files, perform the following operations:
4-3
a. Click Browse... next to the Backup File Save Path at Server text box. The Open
dialog box is displayed.
b. Select a new path, and then click Open. The new path is displayed in the Backup
File Save Path at Server text box.
4. To download the backup files from the server to the local client upon backup
completion, perform the following operations:
a. Select the Backup File Download Path at Client check box. The text box and
the Browse... button are activated.
b. To change the path, click Browse.... The Open dialog box is displayed.
c. Select a new path on the local client, and then click Open.
5. Click Execute. The system starts backing up all basic data and displays the backup
process and result in the Execution Result area.
– End of Steps –
Context
The system supports backing up three types of files on the server: version files,
configuration files, and runtime files.
l Version files are all files generated on the server except those generated during
runtime.
l Configuration files are all configuration-related files on the server.
l Runtime files are all files generated during runtime on the server.
Note:
The runtime files backed up by this operation do not contain log files generated during
runtime.
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Backup File in the Backup and Restore tree. The backup settings are displayed
in the right pane, see Figure 4-4.
4-4
b. To change the path, click Browse.... The Open dialog box is displayed.
c. Select a new path on the local client, and then click Open.
6. Click Execute. The system starts backing up the version files, configuration files,
and/or runtime files on the server, and displays the backup process and result in the
Execution Result area.
– End of Steps –
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
4-5
2. Click Backup and Deletion Log Data in the Backup and Restore tree. The backup
and deletion settings are displayed in the right pane, see Figure 4-5.
Table 4-1 Parameter Descriptions for Log Data Backup and Deletion
Parameter Description
Backup and Deletion Log data backup and/or deletion operation to be performed. The
Operation options are:
l Backup Only: used for backing up log data only
l Backup and Deletion: used for backing up and deleting log data
l Deletion Only: used for deleting log data only
Backup and Deletion Types of log data to be backed up and/or deleted. The options are:
Operation Content Operation Log, System Log, and Security Log.
Backup Filter Type Set a period during which the log data is to be backed up by selecting
a backup filter type and entering a number (T) in T Time next to
Backup Filter Type.
The Backup Filter Type options are:
l All: used for backing up all log data
l Latest T Day(s) (default): used for backing up the log data
generated in the last T days.
l T Day(s) Ago: used for backing up the log data generated T
days ago.
l Latest T Month(s): used for backing up the log data generated in
the last T months.
4-6
Parameter Description
Deletion Filter Type Set a period during which the log data is to be deleted by selecting
a deletion filter type and entering a number (T) in T Time next to
Deletion Filter Type.
The Deletion Filter Type options vary with the selected backup filter
type. For example, if Latest T Day(s) is selected from Backup Filter
Type, the Deletion Filter Type options are:
l T Day(s) Ago (default): used for deleting the log data generated T
days ago.
l Latest T Day(s): used for deleting the log data generated in the
last T days.
4. To change the path for saving backup files, perform the following operations:
a. Click Browse... next to the Backup File Save Path at Server text box. The Open
dialog box is displayed.
b. Select a new path, and then click Open. The new path is displayed in the Backup
File Save Path at Server text box.
5. To download the backup files from the server to the local client upon backup
completion, perform the following operations:
a. Select the Backup File Download Path at Client check box. The text box and
the Browse... button are activated.
b. To change the path, click Browse.... The Open dialog box is displayed.
c. Select a new path on the local client, and then click Open.
6. Click Execute. The system starts backing up and/or deleting the required log data and
displays the backup and/or deletion process and result in the Execution Result area.
– End of Steps –
4-7
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Backup and Deletion Alarm Data in the Backup and Restore tree. The backup
and deletion settings are displayed in the right pane, see Figure 4-6.
Table 4-2 Parameter Descriptions for Alarm Data Backup and Deletion
Parameter Description
Backup and Deletion Alarm data backup and/or deletion operation to be performed. The
Operation options are:
l Backup Only: used for backing up alarm data only
l Backup and Deletion: used for backing up and deleting alarm
data
l Deletion Only: used for deleting alarm data only
Backup and Deletion Types of alarm data to be backed up and/or deleted. The options are:
Operation Content History Alarm Table and Notification Table.
4-8
Parameter Description
Backup Filter Type Set a period during which the alarm data is to be backed up by
selecting a backup filter type and entering a number (T) in T Time
next to Backup Filter Type.
The Backup Filter Type options are:
l All: used for backing up all alarm data
l Latest T Day(s) (default): used for backing up the alarm data
generated in the last T days.
l T Day(s) Ago: used for backing up the alarm data generated T
days ago.
l Latest T Month(s): used for backing up the alarm data generated
in the last T months.
l T Month(s) Ago: used for backing up the alarm data generated
T months ago.
Deletion Filter Type Set a period during which the alarm data is to be deleted by selecting
a deletion filter type and entering a number (T) in T Time next to
Deletion Filter Type.
The Deletion Filter Type options vary with the selected backup filter
type. For example, if Latest T Day(s) is selected from Backup Filter
Type, the Deletion Filter Type options are:
l T Day(s) Ago (default): used for deleting the alarm data generated
T days ago.
l Latest T Day(s): used for deleting the alarm data generated in
the last T days.
4. To change the path for saving backup files, perform the following operations:
a. Click Browse... next to the Backup File Save Path at Server text box. The Open
dialog box is displayed.
b. Select a new path, and then click Open. The new path is displayed in the Backup
File Save Path at Server text box.
5. To download the backup files from the server to the local client upon backup
completion, perform the following operations:
a. Select the Backup File Download Path at Client check box. The text box and
the Browse... button are activated.
b. To change the path, click Browse.... The Open dialog box is displayed.
c. Select a new path on the local client, and then click Open.
4-9
6. Click Execute. The system starts backing up and/or deleting the required alarm data
and displays the backup and/or deletion process and result in the Execution Result
area.
– End of Steps –
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Backup and Deletion PM Data in the Backup and Restore tree. The backup
and deletion settings are displayed in the right pane, see Figure 4-7.
For a description of the parameters for performance data backup and deletion, refer
to Table 4-3.
4-10
Table 4-3 Parameter Descriptions for Performance Data Backup and Deletion
Parameter Description
Backup and deletion Performance data backup and/or deletion operation to be performed.
operation The options are:
l Backup Only: used for backing up performance data only
l Backup and Deletion: used for backing up and deleting
performance data
l Deletion Only: used for deleting performance data only
Backup and deletion Types of performance data to be backed up and/or deleted. The
operation content options are: Origin Table, Hour Table, and Day Table.
Backup filter type Set a period during which the performance data is to be backed up by
selecting a backup filter type and entering a number (T) in T Time
next to Backup Filter Type.
The Backup Filter Type options are:
l All: used for backing up all performance data
l Latest T Day(s) (default): used for backing up the performance
data generated in the last T days.
l T Day(s) Ago: used for backing up the performance data
generated T days ago.
l Latest T Month(s): used for backing up the performance data
generated in the last T months.
l T Month(s) Ago: used for backing up the performance data
generated T months ago.
4-11
Parameter Description
Deletion filter type Set a period during which the performance data is to be deleted by
entering a number (T) in T Time next to Deletion Filter Type.
The Deletion Filter Type options vary with the selected backup filter
type. For example, if Latest T Day(s) is selected from Backup Filter
Type,, only one option, T Day(s) Ago, is available in Deletion Filter
Type.
4. (Optional) To change the path for saving backup files, perform the following operations:
a. Click Browse... next to the Backup File Save Path at Server text box. The Open
dialog box is displayed.
b. Select a new path, and then click Open. The new path is displayed in the Backup
File Save Path at Server text box.
5. (Optional) To download the backup files from the server to the local client upon backup
completion, perform the following operations:
a. Select the Backup File Download Path at Client check box. The text box and
the Browse... button are activated.
b. To change the path, click Browse.... The Open dialog box is displayed.
c. Select a new path on the local client, and then click Open.
6. Click Execute. The system starts backing up and/or deleting the required performance
data and displays the backup and/or deletion process and result in the Execution
Result area.
– End of Steps –
Prerequisite
The log data backup file to be used is available.
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
4-12
2. Click Restore Log Data in the Backup and Restore tree. The restore settings are
displayed in the right pane.
3. Click Browse.... The Open dialog box is displayed.
4. Select the backup file (ZIP file) from which the log data is to be restored, and then click
Open. The file path is displayed in Select the Backup File box.
5. Click Execute. The system starts restoring the log data from the selected backup file
and displays the restore process and result in the Execution Result area.
– End of Steps –
Prerequisite
The alarm data backup file to be used is available.
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Restore Alarm Data in the Backup and Restore tree. The restore settings are
displayed in the right pane.
3. Click Browse.... The Open dialog box is displayed.
4. Select the backup file (ZIP file) from which the alarm data is to be restored, and then
click Open. The file path is displayed in Select the Backup File box.
5. Click Execute. The system starts restoring the alarm data from the selected backup
file and displays the restore process and result in the Execution Result area.
– End of Steps –
Context
Before restoring performance data, the system first checks whether the target PO table
contains data. If yes, the existing data needs to be cleared before importing data.
Prerequisite
The performance data backup file to be used is available.
4-13
Steps
1. Select Maintenance > System Backup and Restore from the menu bar. The System
Backup and Restore window is displayed.
2. Click Restore PM Data in the Backup and Restore tree. The restore settings are
displayed in the right pane.
3. Click Browse.... The Open dialog box is displayed.
4. Select the backup file (ZIP file) from which the performance data is to be restored, and
then click Open. The file path is displayed in Select the Backup File box.
5. Click Execute. The system starts restoring the performance data from the selected
backup file and displays the restore process and result in the Execution Result area.
– End of Steps –
4-14
In the left pane of the System Monitoring window, the application server and the database
of the NetNumen U31 system are listed in a navigation tree. The right pane displays the
monitoring status and server information of the application server or database selected in
the navigation tree, and provides the buttons for monitoring functions.
5-1
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. Click the application server under Server in the left navigation tree.
The basic server information is displayed in the Server Information area in the right
pane, including device name, device type, Java Name and Directory Interface (JNDI)
port, host IP address, host name, Operating System (OS) name, and EMS version,
see Figure 5-2.
– End of Steps –
5-2
Users can set thresholds for monitoring the CPU, RAM, and each partition of the hard disk
on the application server. If the actual usage of the CPU, RAM, or a partition of the Hard
Disk (HD) exceeds a preset threshold, the system may raise an alarm, prompting possible
performance degradation of the application server.
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. In the left navigation tree, click the application server under Server.
3. In the right pane, click Configure... under Monitor Server Performance. The
Configure Performance Monitor dialog box is displayed, see Figure 5-3.
4. Set necessary thresholds and monitoring periods for monitoring the CPU, RAM, and
hard disk of the application server as required.
Table 5-1 Parameter Descriptions for the Configure Performance Monitoring Dialog
Box
Parameter Description
5-3
Parameter Description
Threshold (Critical) Set four thresholds for CPU usage and RAM usage.
Threshold (Major)
Threshold (Minor)
Threshold (Warning)
Type Select a space usage threshold type for each hard disk partition to be
monitored from the corresponding drop-down list. The options are:
l Percentage for setting thresholds in percentage
l Absolute for setting thresholds in size
l NO for disabling the monitoring of the corresponding partition
Threshold (Critical) Set four thresholds for each hard disk partition to be monitored.
Threshold (Major)
Threshold (Minor)
Threshold (Warning)
5. Click OK.
– End of Steps –
5-4
Context
Note:
The Run button used for starting the application server monitoring is only available when
the monitoring is suspended.
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. In the left navigation tree, click the application server under Server.
3. In the right pane, click Run under Monitor Server Performance. The system starts
monitoring the application server, including the CPU, RAM, and/or hard disk usage of
the server.
– End of Steps –
Note:
Users do not need to suspend the application server monitoring unless absolutely
necessary.
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. In the left navigation tree, click the application server under Server.
3. In the right pane, click Suspend under Monitor Server Performance. The system
stops monitoring the application server.
– End of Steps –
5-5
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. In the left navigation tree, click the application server under Server.
3. In the right pane, click View... under View Server Performance. The View
Application Server Performance dialog box is displayed, see Figure 5-4.
5-6
Table 5-2 Area Descriptions for the View Application Server Performance Dialog
Box
Area Description
Monitoring Period Determines the frequency for refreshing the CPU, RAM, and hard disk
usage displayed in the dialog box. Users can modify a monitoring
period by dragging the corresponding slider as needed.
HD Information Displays the usage of each hard disk partition being monitored.
4. Click OK. The View Application Server Performance dialog box is closed.
– End of Steps –
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
5-7
– End of Steps –
This procedure describes how to set parameters for monitoring the database.
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. Click the database under Database in the left navigation tree.
3. In the right pane, click Configure... under Monitor Database Resource. The
Configure Database Monitoring dialog box is displayed, see Figure 5-6.
5-8
Table 5-3 Parameter Descriptions for the Configure Database Monitoring Dialog Box
Parameter Description
Usage Threshold Set a database size threshold, meaning a usage threshold of the hard
disk space that is allocated for the database.
5-9
Parameter Description
Type Select a usage threshold type for each table space to be monitored
from the corresponding drop-down list. The options are:
l Percentage for setting thresholds in percentage
l Absolute for setting thresholds in size
l NO for disabling the monitoring of the corresponding table space
Threshold (Critical) Set four thresholds for each table space to be monitored.
Threshold (Major)
Threshold (Minor)
Threshold (Warning)
Note:
The Run button used for starting the database monitoring is only available when the
database monitoring is suspended.
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. In the left navigation tree, click the database under Database.
3. In the right pane, click Run under Monitor Database Resource. The system starts
monitoring the database size and the usage of individual table spaces.
– End of Steps –
Note:
Users do not need to suspend the database monitoring unless absolutely necessary.
5-10
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System
Monitoring window is displayed.
2. In the left navigation tree, click the database under Database.
3. In the right pane, click Suspend under Monitor Database Resource. The system
stops monitoring the database.
– End of Steps –
Steps
1. Select Maintenance > System Monitoring from the menu bar. The System Monitor
window is displayed.
2. In the left navigation tree, click the database under Database.
3. In the right pane, click View... under View Database Resource.
The View Database Resources dialog box is displayed, see Figure 5-7. The Table
Space Information tab displays the information of all table spaces of the database.
4. Click the Table Information tab, and click a table space in the left pane. The
information of all tables in the selected table space is displayed in the right pane.
5-11
5. Click the Process Information tab. All database processes are displayed on this tab.
6. To refresh the resource information in dialog box, click Synchronize.
7. To export the data in the table to a local file, click Export Data.
8. Click Close. The View Database Resources dialog box is closed.
– End of Steps –
5-12
6-1
The navigation tree in the left pane shows all supported IT device types. Users can add
IT devices to be monitored under the corresponding device type node.
Prerequisite
l The root user password of the AIX server is known.
l The Telnet or SSH service is started on the AIX server, and an appropriate Telnet or
SSH port is used.
l The AIX server can be successfully pinged from the NetNumen U31 server.
l The AIX server is started up and a command prompt (# or $) is displayed.
6-2
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Server in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click AIX Server in the left pane. The server parameters are displayed in the right
pane, see Figure 6-2.
Parameter Description
6-3
Parameter Description
Packet Count (Required) Number of ICMP echo request messages that are sent
when the IT device monitoring module pings the server.
Value range: 1 to 4
Packet Size (Required) Size of the data field in each ICMP echo request message
that is sent when the IT device monitoring module pings the server.
Unit: bytes.
Default: 64.
Value range: 8 to 128.
Trap Listen Enables the IT device monitoring module to receive traps from the
server hardware. Necessary trap configuration is required on the
server to support this function.
When the check box is selected, the Server Model drop-down list
box is displayed. Users are required to select an appropriate server
model from the drop-down list.
Join Net Date Date when the server node is added in the NetNumen U31 system.
6. Click OK.
7. Click OK in the Add Node dialog box. The added server node is displayed under
Server in the navigation tree in the IT Monitoring window.
– End of Steps –
6-4
Prerequisite
l The system user password, System Identifier (SID), and the listener port number of
the Oracle database are known.
l The NetNumen U31 server can access the database through Java Database
Connectivity (JDBC).
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Database in the navigation tree and select
Add Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click Oracle DataBase in the left pane. The database parameters are displayed in
the right pane, see Figure 6-3.
6-5
Parameter Description
Oracle Database Click this check box when two Oracle databases are configured for
Streams Duplication streams duplication in the system.
Join Net Date Date when the database node is added in the NetNumen U31
system.
6-6
Vendor Model
Prerequisite
l The router can be successfully pinged from the NetNumen U31 server.
l The NetNumen U31 server can access the router via Simple Network Management
Protocol (SNMP).
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Router in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click Cisco Router in the left pane. The router parameters are displayed in the right
pane, see Figure 6-4.
6-7
Parameter Description
Packet Count (Required) Number of ICMP echo request messages that are sent
when the IT device monitoring module pings the router.
Value range: 1 to 4
6-8
Parameter Description
Packet Size (Required) Size of the data field in each ICMP echo request message
that is sent when the IT device monitoring module pings the router.
Unit: bytes.
Default: 64.
Value range: 8 to 128.
Join Net Date Date when the router node is added in the NetNumen U31 system.
Vendor Model
Cisco Cisco Catalyst 2960, 2970, 3400, 3750, 4500, and 6500 series.
Juniper EX series.
6-9
Prerequisite
l The switch can be successfully pinged from the NetNumen U31 server.
l The NetNumen U31 server can access the switch via SNMP.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Switch in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click Cisco Switch in the left pane. The switch parameters are displayed in the right
pane, see Figure 6-5.
Parameter Description
6-10
Parameter Description
Packet Count (Required) Number of ICMP echo request messages that are sent
when the IT device monitoring module pings the switch
Value range: 1 to 4
Packet Size (byte) (Required) Size of the data field in each ICMP echo request message
that is sent when the IT device monitoring module pings the switch.
Unit: bytes.
Default: 64.
Value range: 8 to 128.
Timeout (S) (Required) Timeout value for an echo reply to an echo request
message sent by the IT device monitoring module.
Unit: seconds.
Value range: 1 to 3.
Join Net Date Date when the switch node is added in the NetNumen U31 system.
6. Click OK.
7. Click OK in the Add Node dialog box. The added switch node is displayed under
Switch in the navigation tree in the IT Monitoring window.
– End of Steps –
6-11
Vendor Model
H3C F5000
Prerequisite
l The firewall can be successfully pinged from the NetNumen U31 server.
l The NetNumen U31 server can access the firewall via SNMP.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Firewall in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click Juniper Firewall in the left pane. The firewall parameters are displayed in the
right pane, see Figure 6-6.
6-12
Parameter Description
Packet Count (Required) Number of ICMP echo request messages that are sent
when the IT device monitoring module pings the firewall
Value range: 1 to 4
6-13
Parameter Description
Packet Size (byte) (Required) Size of the data field in each ICMP echo request message
that is sent when the IT device monitoring module pings the firewall.
Unit: bytes.
Default: 64.
Value range: 8 to 128.
Timeout (S) (Required) Timeout value for an echo reply to an echo request
message sent by the IT device monitoring module.
Unit: seconds.
Value range: 1 to 3.
Join Net Date Date when the firewall node is added in the NetNumen U31 system.
Cluster Model
6-14
Prerequisite
The NetNumen U31 server can access the cluster via SNMP.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Cluster in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click VCS Cluster in the left pane. The cluster parameters are displayed in the right
pane, see Figure 6-7.
Parameter Description
Host Operating System (Required) Operating system installed on the host of the cluster.
6-15
Parameter Description
Packet Count (Required) Number of ICMP echo request messages that are sent
when the IT device monitoring module pings the cluster.
Value range: 1 to 4
Packet Size (byte) (Required) Size of the data field in each ICMP echo request message
that is sent when the IT device monitoring module pings the cluster.
Unit: bytes.
Default: 64.
Value range: 8 to 128.
Timeout (S) (Required) Timeout value for an echo reply to an echo request
message sent by the IT device monitoring module.
Unit: seconds.
Value range: 1 to 3.
Join Net Date Date when the cluster node is added in the NetNumen U31 system.
6-16
NetApp disk arrays FAS270c, FAS2020A, FAS2050, and FAS 3070 (with Data
ONTAP Release 7.2.6.1)
Brocade SAN switches SW200E, SW300, SW4100, and SW5100 (with Brocade Fabric
OS V6.1.0 or earlier versions)
SUN disk arrays 6100, 6140, 6180, 2510, 2540, and 3320
Fujitsu disk arrays DX60, DX80, DX90, E2K M100, E4K M600, and E8K M1200
Prerequisite
l The IBM disk system can be successfully pinged from the NetNumen U31 server.
l The disk system is configured with the IP address of the NetNumen U31 server as an
SNMP trap address.
l The SNMP community string of the disk system is set to “public”.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Storage in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
6-17
3. Click IBM SM in the left pane. The disk system parameters are displayed in the right
pane, see Figure 6-8.
Parameter Description
Packet Count (Required) Number of ICMP echo request messages that are sent
when the IT monitoring module pings the disk system.
Value range: 1 to 4
Packet Size (Required) Size of the data field in each ICMP echo request message
that is sent when the IT monitoring module pings the disk system.
Unit: bytes.
Default: 64.
Value range: 8 to 128.
6-18
Parameter Description
Node Model (Optional) Device model, depending on the actual storage device.
Join Net Date Date when the storage device node is added in the NetNumen U31
system.
WEBLOGIC WebLogic10.3.6
6-19
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Application in the navigation tree and select
Add Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click BIND Service in the left pane. The service parameters are displayed in the right
pane, see Figure 6-9.
Parameter Description
(Required) User name for logging in to the server where the BIND
Login User
service is installed.
6-20
Parameter Description
(Required) Port for logging in to the server where the BIND service
is installed.
Login Port
Default: 23 (TELNET) or 22 (SSH)
The port configuration must be consistent with that on on the server.
The Server is (Optional) Select this check box if the BIND service to be monitored is
WINDOWS host installed on a WINDOWS server.
Node Model (Optional) BIND service type, depending on the actual BIND service.
Date when the BIND service node is added in the NetNumen U31
Join Net Date
system.
6-21
SeGW SeGW
DCS DCS
ATCA_LB10 LB10
Prerequisite
The SeGW can be successfully pinged through the NetNumen U31 server.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitoring window, right-click Other in the navigation tree and select Add
Node from the shortcut menu. The Add Node dialog box is displayed.
3. Click SeGW in the left pane. The server parameters are displayed in the right pane,
see Figure 6-10.
6-22
Parameter Description
6-23
Parameter Description
Join Net Date Date when the SeGW node is added in the NetNumen U31 system.
6-24
Prerequisite
l The IT device has component information.
l The IT device has been connected to the IT monitoring module.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitor window, click the database node to be configured in the navigation
tree. The basic information of the database is displayed on the Basic Information tab
in the right pane, see Figure 6-11.
3. Click the Component Information tab. The database components (table spaces) that
are being monitored are displayed, see Figure 6-12.
6-25
4. Click Set. The Component Set dialog box is displayed, see Figure 6-13.
5. Select the table spaces to be monitored or cancel the selection of specific table spaces
as required, and the click OK. The table space list on the Component Information
tab changes accordingly.
– End of Steps –
6-26
The status monitoring items that can be configured in the NetNumen U31 system vary with
different IT devices.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitor window, click the database node to be configured in the navigation
tree. The basic information of the database is displayed on the Basic Information tab
in the right pane, see Figure 6-14.
3. Click the Status Monitoring tab. The status monitoring settings are displayed, see
Figure 6-15.
6-27
For a description of the buttons for configuring the status monitoring settings, refer to
Table 6-19.
Table 6-19 Descriptions for the Buttons on the Status Monitoring Tab
Button Description
4. Click an appropriate button to start, stop, or set the monitoring of logs, database status,
or the database analyzer.
– End of Steps –
This procedure describes how to view alarms of a database monitored by the IT device
monitoring module.
Steps
1. Select Maintenance > IT Monitoring from the menu bar. The IT Monitoring window
is displayed.
2. In the IT Monitor window, right-click the monitored database in the navigation tree. A
shortcut menu is displayed, see Figure 6-16.
6-28
3. Select a command from the shortcut menu as required. The Fault Management
window is displayed in which a tab shows the required alarms, see Figure 6-17.
– End of Steps –
6-29
6-30
II
III
IV
MML
- Man Machine Language
OS
- Operating System
RAM
- Random Access Memory
SID
- System Identifier
SNMP
- Simple Network Management Protocol
SSH
- Secure Shell
SeGW
- Security Gateway