You are on page 1of 390

Monitoring Studio KM for PATROL

Version 8.6.53

User Documentation

May 2011

Monitoring Studio KM for PATROL
Version 8.6.53

Contacting BMC Software
You can access the BMC Software Web site at http://www.bmc.com/. From this Web site, you can obtain information about the company, its products, corporate offices, special events, and career opportunities. United States and Canada Outside United States and Canada

Address

BMC Software, Inc. 2101 CityWest Blvd. Houston TX 770422827 713 918 8800 or 800 841 2031 713 918 8000

Telephone

(01) 713 918 8800

Telephone Fax

Fax

(01) 713 918 8000

Copyright 2006 BMC Software, Inc. or licensors, as an unpublished work. All rights reserved. BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered trademarks or trademarks of BMC Software, Inc. IBM is a registered trademark of International Business Machines Corporation. DB2 is a registered trademark of International Business Machines Corporation. Oracle is a registered trademark, and the Oracle product names are registered trademarks or trademarks of Oracle Corporation. All other trademarks belong to their respective companies. BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable End User License Agreement for the product and the proprietary and restricted rights notices included in this documentation.

Restricted Rights Legend
U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section 52.227-14, DFARS 252.227-7013, DFARS 252.227-7014, DFARS 252.227-7015, and DFARS 252.227-7025, as amended from time to time. Contractor/Manufacturer is BMC Software, Inc., 2101 CityWest Blvd., Houston, TX 77042-2827, USA. Any contract notices should be sent to this address.

2

Monitoring Studio KM for PATROL
Version 8.6.53

You can obtain technical support by using the Support page on the BMC Software Web site or by contacting Customer Support by telephone or e-mail. To expedite your inquiry, please see "Before Contacting BMC Software."

Support Web Site
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at http://www.bmc. com/support_home. From this Web site, you can Read overviews about support services and programs that BMC Software offers: Find the most current information about BMC Software products Search a database for problems similar to yours and possible solutions Order or download product documentation Report a problem or ask a question Subscribe to receive e-mail notices when new product versions are released Find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax numbers, and telephone numbers

Support by Telephone or E-mail
In the United States and Canada, if you need technical support and do not have access to the Web, call 800 537 1813. Outside the United States and Canada, please contact your local support center for assistance. To find telephone and email contact information for the BMC Software support center that services your location, refer to the Contact Customer Support section of the Support page on the BMC Software Web site at http://www.bmc.com/support_home.

Before Contacting BMC Software
Before you contact BMC Software, have the following information available so that Customer Support can begin working on your problem immediately: Product information product name product version (release number) license number and password (trial or permanent) Operating system and environment information machine type operating system type, version, and service pack or other maintenance level such as: PUT or PTF system hardware configuration serial numbers related software (database, application, and communication) including type, version, and service pack or maintenance level Sequence of events leading to the problem Commands and options that you used Messages received (and the time and date that you received them) product error messages messages from the operating system, such as "file system full"

3

Monitoring Studio KM for PATROL
Version 8.6.53

Table of Contents
Targeted Computers ...........................................................................................................................1 1 Migrating from Previous Versions of Monitoring Studio ...........................................................................................................................1 1 Requirements ...........................................................................................................................1 2 Installation Packages ...........................................................................................................................1 3 Installing Monitoring Studio KM for PATROL ...........................................................................................................................1 4 ...........................................................................................................................1 4 Getting the BMC Software Installation utility ...........................................................................................................................1 4 Installation Procedure ..................................................................................................................23 Extracting the Setup Files ..................................................................................................................24 Loading Monitoring Studio KM for PATROL ..................................................................................................................25 Preloading Monitoring Studio Uninstalling BMC...........................................................................................................................26 Performance Manager Monitoring Studio Creating and Importing an Adapter for a BMC PATROL KM ...........................................................................................................................36 Updating an Adapter for a BMC PATROL KM ...........................................................................................................................44 Importing and Customizing Thresholds ...........................................................................................................................45 Monitoring with Monitoring Studio ...........................................................................................................................48 Configuring Monitoring Studio to Monitor your Application ...........................................................................................................................50 Day-to-day monitoring with Monitoring Studio ...........................................................................................................................51 Monitoring Features ...........................................................................................................................53 ...........................................................................................................................53 Application/Container Icons ...........................................................................................................................61 Command Line Analysis Database Query ...........................................................................................................................7 1 Analysis ..................................................................................................................7 6 Setting connection to Microsoft SQL Server Databases ..................................................................................................................80 Setting connection to MySQL Server Databases ..................................................................................................................83 Setting connection to Oracle Database Server ..................................................................................................................87 Setting connection to Other Databases (ODBC only) ...........................................................................................................................88 Dynamic Object Builder ...........................................................................................................................93 File Monitoring and Analysis ...........................................................................................................................98 File System Monitoring ...........................................................................................................................1 01 File Security Check ...........................................................................................................................1 09 Folder Monitoring ...........................................................................................................................1 1 3 Multi-Parameter Formula ...........................................................................................................................1 1 8 Numeric Value Extraction

Table of Contents

4

Monitoring Studio KM for PATROL
Version 8.6.53

...........................................................................................................................1 25 Process Monitoring SNMP Polling ...........................................................................................................................1 32

...........................................................................................................................1 38 SNMP Trap Listening String Search ...........................................................................................................................1 43 ...........................................................................................................................1 49 Text Pre-Processing ...........................................................................................................................1 61 WMI Query Analysis ...........................................................................................................................1 65 WBEM Query Analysis ...........................................................................................................................1 69 Web-farm Monitoring ...........................................................................................................................1 7 7 Web Request Analysis Windows Event ...........................................................................................................................1 83 Monitoring ...........................................................................................................................1 88 Windows Performance Monitoring ...........................................................................................................................1 92 Windows Service Monitoring JMX ...........................................................................................................................1 96 ..................................................................................................................1 96 Java MBean Polling (JMX) ..................................................................................................................1 99 Generic JMX Client ..................................................................................................................205 Input variables for JMX polling Wizards JBoss WebSphere JOnAS WebLogic ..................................................................................................................207 ..................................................................................................................21 4 ..................................................................................................................221 ..................................................................................................................228

Thresholds and...........................................................................................................................234 Alert Actions ...........................................................................................................................234 Managing Thresholds ...........................................................................................................................236 Setting or Modifying Alert Thresholds ...........................................................................................................................240 Setting Thresholds on Dynamic Numeric Value Extractions ...........................................................................................................................242 Alert Actions Description ...........................................................................................................................246 Alert Actions Capabilities ...........................................................................................................................254 Alert Action Macros Administration ...........................................................................................................................258 Features ...........................................................................................................................258 Exporting Configuration to a File ...........................................................................................................................261 Importing Configuration Process Viewer...........................................................................................................................266 Tool ...........................................................................................................................267 Modifying Object Name and/or ID ...........................................................................................................................269 Process Command Credentials SNMP Browser ...........................................................................................................................27 0 Tool ...........................................................................................................................27 1 SNMP Trap Listener Tool ...........................................................................................................................27 1 Setting Polling Interval

Table of Contents

5

Monitoring Studio KM for PATROL
Version 8.6.53

Java Settings ...........................................................................................................................27 3 ...........................................................................................................................27 6 Windows EventLog Reader Tool ...........................................................................................................................27 7 Setting the Discovery Interval ...........................................................................................................................27 7 Trigger a KM Discovery ...........................................................................................................................27 8 Monitoring Studio Configuration Reports ..................................................................................................................27 8 Instant Configuration Reports ..................................................................................................................280 Scheduling Configuration Reports Operator Day-to-Day Tasks ...........................................................................................................................285 ...........................................................................................................................285 Acknowledge and Update ...........................................................................................................................285 Acknowledge all and Reset ...........................................................................................................................285 Acknowledge Alerts ...........................................................................................................................286 Copy, Cut and Paste ...........................................................................................................................287 Delete a Monitored Object ...........................................................................................................................288 Pause the Monitoring of an Object ...........................................................................................................................288 Rename an Object ...........................................................................................................................289 Restart Scan from the Beginning of the File ...........................................................................................................................290 Restart an Application ...........................................................................................................................290 Stop an Application ...........................................................................................................................291 View the Content of a File Alert Actions Example ...........................................................................................................................294 XML LOG File Parsing ...........................................................................................................................297 Enabling the Debug Mode ...........................................................................................................................307 About Processes ...........................................................................................................................31 0 About WMI ...........................................................................................................................31 1

Alert Actions Macros ...........................................................................................................................31 4 Format Symbols for %{ASCTIME:…} Macros ...........................................................................................................................31 8 Regular Expressions ...........................................................................................................................320 Application Classes ...........................................................................................................................321 ...........................................................................................................................321 List of Application Classes ...........................................................................................................................323 SW_APPLICATIONS ...........................................................................................................................326 SW_DB_QUERIES SW_DYNAMIC ...........................................................................................................................328 ...........................................................................................................................329 SW_DYNAMIC_CONTAINER ...........................................................................................................................330 SW_DYNAMIC_DISCOVERY ...........................................................................................................................331 SW_DYNAMIC_NUMBERS ...........................................................................................................................332 SW_DYNAMIC_STRINGS

Table of Contents

6

Monitoring Studio KM for PATROL
Version 8.6.53

SW_FILES

...........................................................................................................................333

...........................................................................................................................335 SW_FILE_SECURITY ...........................................................................................................................337 SW_FILESYSTEMS SW_FOLDERS ...........................................................................................................................339 ...........................................................................................................................341 SW_HTTP_REQUESTS ...........................................................................................................................343 SW_HTTP_WEBFARM SW_JMX ...........................................................................................................................345

...........................................................................................................................347 SW_KMWATCH SW_NTEVENTS...........................................................................................................................348 ...........................................................................................................................350 SW_NTPERFORMANCE ...........................................................................................................................352 SW_NTSERVICES SW_NT_WMI ...........................................................................................................................353 SW_WBEM ...........................................................................................................................355

SW_NUMBERS ...........................................................................................................................357 ...........................................................................................................................359 SW_OSCOMMANDS ...........................................................................................................................361 SW_PROCESSES SW_SENTRY ...........................................................................................................................363

...........................................................................................................................366 SW_SNMP_POLLING ...........................................................................................................................368 SW_SNMP_TRAPS SW_STRINGS ...........................................................................................................................37 0 ...........................................................................................................................37 2 SW_TRANSFORM

Table of Contents

7

53 .Release Notes for v8.6.

The ASCII filter used by Monitoring Studio did not take Asian characters into account preventing PATROL IDs to be properly displayed. when working with this operation system. Every time a dynamic discovery was performed. Known Issue Oracle Database: Space characters are not supported for passwords in Windows. Instead of simply destroying all missing instances related to one dynamic container.50 for optimization purposes was not compatible with special characters. What's New Full support for BMC ProactiveNet Performance Management (BPPM 8.6. Dynamic Numbers or Dynamics Strings: A problem occurred when two or more dynamic containers with dynamic string/number templates were configured. you must enter a space-free password to access an Oracle Database. Process Monitoring: The KM commands now retrieves the entire process command-line and is no longer limited to the first 2048 characters.8. the dynamic string/number instances were updated. It includes the required metadata that describe the classes and parameters for accurate interpretation. thus.53 This section describes changes and updates that have occurred since the release 8.5): Monitoring Studio KM for PATROL now fully and natively integrates with the latest iteration of BMC's monitoring framework. correlation and trending in ProactiveNet. Monitoring Studio would show the Exit Status in the ReturnOuput parameter of the OS if the command output was empty. the running discovery also destroyed any instances that were not related to the current container running the discovery thus resulting in dynamic string/number instances clipping. 9 .Monitoring Studio KM for PATROL Version 8. Fixed Issues Monitoring Studio would show invalid service display names in the New Windows Service Wizard on Windows 7 and Windows 2008 servers.52 of Monitoring Studio KM for PATROL.6. Changes and Improvements Window Service Monitoring: It is now possible to manually enter the name of a service to monitor allowing the possibility to configure a Service monitoring even if the service is not currently installed on the server (for deployed configurations). The product could not perform SQL queries to an Oracle database on Windows anymore (invalid username/password message) The new Java polling method introduced in v.6.

Installation Guide .

The difficulty lies in the fact that a PATROL Console may need to connect to several PATROL Agents. A utomatic migration is only supported from 8. a previous installation of Monitoring Studio will be overwritten by the latest version. This version of Monitoring Studio supersedes previous versions. On PATROL Agents As only one version of Monitoring Studio can be installed on a PATROL Agent.Monitoring Studio KM for PATROL Version 8. It helps you understand what you need to install and where (on which components of your IT infrastructure) and guides you through the step-by-step installation procedure. It means that with the latest version of Monitoring Studio on the PATROL Console. Monitoring Studio will take the action necessary to complete the migration (migrating configuration variables if needed). you need to install Monitoring Studio on the following components of your PATROL architecture: Every managed system with a PATROL Agent Every PATROL Console (Classic) The Console Server PATROL Central – Web Edition Migrating from Previous Versions of Monitoring Studio Monitoring Studio is the new name assigned to Application Sentry KM for PATROL. 11 . x v ersions of Monitoring Studio. you will be able to seamlessly connect to Agents with previous versions of Monitoring Studio. only one version of Monitoring Studio can be installed on a PATROL Console (Classic). Previous versions of Monitoring Studio were formerly known as Application Sentry. Upon startup. No specific migration operation is required (you do not need to uninstall the previous version of Monitoring Studio). Targeted Computers Like most Knowledge Modules for PATROL. each with different versions of Monitoring Studio.53 Introduction This section provides detailed information about the pre-requisites for the installation of Monitoring Studio. On PATROL Consoles (Classic) As for PATROL Agents.6. Earlier v ersions are no longer supported.

4. Monitoring Studio will work but you will not be able to use the features of the new classes. A v oid the use of the "Dev eloper" connection ty pe in the PA TR O L C onsole.00 of Monitoring Studio added various new Menu Commands in the PATROL Console. an error message will be displayed in the System Output Window of the Agent. Requirements Requirements for managed systems The operating system must be one the following: Windows (any Windows-based version. Console Server will automatically use the appropriate version of the KM depending on what is running on the displayed agent. Version 8. especially when y ou deal with sev eral v ersions of the same KM in y our env ironment. HP Tru64. In such case.5. 2003.kml file in the profile.53 However. although the new Menu Commands may seem available on all agents. Monitoring Studio will not work properly. To do so. PATROL Central – Web Edition As Console Server and PATROL Central are able to manage several versions of the same KM. including Windows NT4. ever since. you do need to update the console profiles to include the new Monitoring Studio classes. 2008 and Vista) UNIX or Linux-based (including Solaris. you can install the current version of Monitoring Studio and earlier versions side-by-side on the same Console Server. and its version should be at least 3. RedHat Linux.6.11. If you do not load the new class in the console.Monitoring Studio KM for PATROL Version 8. IBM AIX. On Console Server. you only need to: Load the SW_SENTRY8. Therefore. you will not be able to monitor the security settings of a file. HP-UX.kml file in the PATROL Console. previous versions of Monitoring Studio (formerly known as Application Sentry) will not be able to execute these new Menu Commands. This problem will not occur on PATROL Central consoles. SUSE Linux. However. VMWare ESX Host) OpenVMS The BMC Software PATROL Agent must be installed. To achieve this. 2000. you still need to update the console profiles to include the new Monitoring Studio classes. that is. This will add the new file security-related class. all you need to do is: Load the SW_SENTRY8. It is ev en more important that y ou nev er use the "C ommit KMs" feature of the PA TR O L C onsole. If you do not load the new classes in the profile. Migrating from Previous Versions of Monitoring Studio 12 .

) Place the Installation Utility package in the same folder as the Monitoring Studio packages.exe For UNIX and Linux systems: swsy_UNIX_8653. Requirements 13 . Console. Console Server.6.tar Downloading from Sentry Software Web site For Windows-based systems: swsy_WINDOWS_8653.) For UNIX and Linux systems: ins_ALL_<version number>.sentrysoftware. you require: The BMC Installation Utility (formerly known as Thorium) For Windows-based systems: ins_WINDOWS_<version number>.exe (agent. The Monitoring Studio packages There are two packages. console. console. However.Monitoring Studio KM for PATROL Version 8. etc.53 Requirements for console systems BMC Software PATROL Console PATROL Central Operator PATROL Console Web-edition Monitoring Studio Installation Packages To install the product.). the files name may differ: Downloading from BMC Web site For Windows systems: LYV39_KM_WINDOWS_1710.tar Each package can be used to install Monitoring Studio on every PATROL component (Agent. depending on the package download source.tar (agent.net.exe For UNIX and Linux systems: LYV39_KM_UNIX_1710. The Installation Utility is available on the Sentry Software website and on the BMC FTP site.) according to the platform you are using. etc. etc. etc. each of which can be used to install the KM on every PATROL component (Agent. Console. The Monitoring Studio packages are available on the BMC Software EPD site as well as on Monitoring Studio KM for PATROL product page on the Sentry Software Web site at www. Console Server.

Choose the appropriate package depending on the platform on which you plan to install Monitoring Studio: For UNIX/Linux systems: ins_ALL_<version number>.Monitoring Studio KM for PATROL Version 8. Browse to the Installing Monitoring Studio KM for PATROL 14 . Please refer to the Distribution Server documentation on the BMC website for a detailed description of the procedure. Consoles and Console Servers Place the Installation Utility package in the same folder as the Monitoring Studio package 2.com/pub/patrol/patches/. You can download the latest version of the Installation Utility from the BMC Software FTP site at: ftp:// ftp.bmc. 1. you need the latest version of the BMC Software Installation Utility.53 Installing Monitoring Studio KM for PATROL This section describes the installation procedure of Monitoring Studio on any PATROL component (Agents.6.exe The packages are valid for installation on Agents. Console Server. The wizard goes through the necessary steps to properly install Monitoring Studio and all files associated with it. etc.tar For Windows systems: ins_WINDOWS_<version number>. Consoles. The procedure applies to all operating systems supported by Monitoring Studio.). See Also Installation Basics Installing Monitoring Studio KM for PATROL Targeted Computers Getting the BMC Software Installation Utility In order to install Monitoring Studio. Installation Procedure Essential It is essential to install the KM on the following components of the PATROL framework: Managed systems with a PATROL Agent PATROL Console (Classic) PATROL Console Servers (PATROL 7 framework only) PATROL Central – Web Edition Installing Monitoring is an automated process managed by a wizard. installation through the Distribution Server is fully supported as well. Although not covered by this section. You are simply prompt for the product's folder location and the product/components to install.

53 bmc_products folder where the files have been extracted (both Monitoring Studio and the Common Installer). Click Next to continue.exe program. On Windows: Launch the setup.Monitoring Studio KM for PATROL Version 8.sh script On the more recent versions of Windows XP and Windows 2003.Ste p 1: W e lco m e Installing Monitoring Studio KM for PATROL 15 . Ins ta lla tio n W iza rd .6. To install Monitoring Studio KM for PATROL 1. On UNIX: Launch the setup. The welcome screen of the installer appears. you may get this security alert dialog: Windows detected that the BMC Software Installation Utility is listening on the 50001 port.

Ins ta lla tio n W iza rd .Ste p 2: R e v ie wing Lice nce A g re e m e nt 3.6.Ste p 3: Se le cting Ins ta lla tio n Op tio ns Installing Monitoring Studio KM for PATROL 16 . Select Install the products on this computer now and click Next to continue.Monitoring Studio KM for PATROL Version 8. Read the license agreement. click the Accept option and then click Next to continue. Ins ta lla tio n W iza rd .53 2.

Monitoring Studio KM for PA TR O L must be installed on each PA TR O L A gent. 4. Please refer to the Monitoring Studio KM for PA TR O L – Installation Guide for further details on the installation procedure. Ins ta lla tio n W iza rd . Click Next to continue.6. Specify the BMC Software products folder.Ste p 4: Se le cting the Ins ta lla tio n Dire cto ry Installing Monitoring Studio KM for PATROL 17 .53 The activ e part of Monitoring Studio resides on the PA TR O L A gent. See the BMC Software documentation for more information about the BMC Software products folder.Monitoring Studio KM for PATROL Version 8. therefore: A PA TR O L A gent must be installed on each serv er that needs monitoring.

Select Default. Click Next to continue.53 5.6. Installing Monitoring Studio does not require any customization.Monitoring Studio KM for PATROL Version 8.Ste p 5: Se le cting a n Ins ta lla tio n T y p e Installing Monitoring Studio KM for PATROL 18 . Ins ta lla tio n W iza rd .

Click Next to continue. Select the Console Systems role to install Monitoring Studio on a PATROL Classic Console.Monitoring Studio KM for PATROL Version 8. Select Managed System to install Monitoring Studio on a PATROL Agent.6. Select Common services to install Monitoring Studio on the Console Server or on PATROL Central – Web Edition. Ins ta lla tio n W iza rd .Ste p 6: Se le cting R o le s Select as many options at required. Installing Monitoring Studio KM for PATROL 19 .53 6.

Installing Monitoring Studio KM for PATROL 20 . Click Next to continue. Review the installation parameters and click Start Install to launch the installation procedure. Ins ta lla tio n W iza rd .6.Ste p 7: Se le cting Pro d ucts a nd Co m p o ne nts 8. Check the Monitoring Sentry KM for PATROL box to install the KM (it should be selected by default).53 7.Monitoring Studio KM for PATROL Version 8.

The setup program displays the actions performed and indicated the percentage of completion.Monitoring Studio KM for PATROL Version 8.53 Ins ta lla tio n W iza rd .Ste p 9 Ins ta lla tio n Sta tus Installing Monitoring Studio KM for PATROL 21 . Once the installation complete. click Next the view the installation results. Ins ta lla tio n W iza rd .6.Ste p 8: R e v ie wing Ins ta lla tio n Op tio ns 9.

6.Ste p 10: Ins ta lla tio n R e s ults 11. The wizard displays the installation results. Installing Monitoring Studio KM for PATROL 22 . Click Next and then Finish to exit the setup program. Click View Log to display a detailed log of the installation procedure.Monitoring Studio KM for PATROL Version 8. Ins ta lla tio n W iza rd . Click the Finish button to quit the installation wizard.53 10.

Monitoring Studio KM for PATROL
Version 8.6.53

Ins ta lla tio n W iza rd - Ste p 11: Co m p le ting a nd clo s ing the Ins ta lla tio n W iza rd

A Help button in av ailable at each step of the procedure. C lick to display the installation online help. The Ex it button allows y ou to stop the installation procedure.

Extracting the Setup Files
On Windows
The packages for Windows can simply be extracted by double-clicking the following files in a consecutive order: 1. 2. BMC Installation Utililty: ins_WINDOWS_<version number>.exe Monitoring Studio KM for PATROL: swsy_WINDOWS_8653.exe

The packages are extracted in a subfolder named bmc_products.

On UNIX/Linux
The packages for UNIX/Linux need to be extracted with the tar utility: 1. 2. BMC Installation Utililty: tar xf ins_ALL_<version number>.tar Monitoring Studio for PATROL: tar xf swsy_UNIX_8653.tar

The files are extracted in a sub-directory named bmc_products.

Installing Monitoring Studio KM for PATROL

23

Monitoring Studio KM for PATROL
Version 8.6.53

Loading the Monitoring Studio KM
Prior to using Monitoring Studio KM for PATROL you must load the Knowledge Modules (KMs) on the PATROL Console. Follow the steps below to load Monitoring Studio KM for PATROL:

Loading the KM on PATROL Console for Windows or on PATROL Console for UNIX
1. 2. Select File > Load KM in the PATROL Console menu In the dialog box, select SW_SENTRY8.kml and click Open

Loading the KM on PATROL Central Operator
1. Select Action > Common Tasks > Load Knowledge Modules… 2. In the dialog box, check the box next to the managed systems for which you wish to load Monitoring Studio KM for PATROL and click Next 3. Click the Knowledge Module lists tab, check the box near SW_SENTRY8.kml and click Next. 4. Click the Finish button.

Loading the KM on PATROL Central Web Edition
1. In the General Tasks panel, click Load Knowledge Modules 2. In the dialog box, click on the managed systems for which you wish to load Monitoring Studio KM for PATROL and click Next 3. Select SW_SENTRY8.kml from the list and click Next 4. Click the Finish button.

Application classes on the Monitored systems and Console
If the KM is properly loaded, the following 22 classes should be loaded on the Monitored System and Console:

Classes
SW_APPLICATIONS SW_DB_QUERIES SW_FILES SW_FILE_SECURITY SW_ FILESYSTEMS SW_FOLDERS SW_HTTP_REQUESTS SW_HTTP_WEBFARM SW_JMX

Description
Monitors application/container icons Executes and monitors database queries Monitors files and file content Monitors file security Monitors file-systems Monitors folders Monitors web-based applications, executes HTTP requests Monitors web farms Polls and monitors JMX-enabled application servers

Installing Monitoring Studio KM for PATROL

24

Monitoring Studio KM for PATROL
Version 8.6.53

Classes
SW_KMWATCH SW_NTEVENTS SW_ NTPERFORMANCE SW_ NTSERVICES SW_NT_WMI SW_NUMBERS SW_OSCOMMANDS SW_PROCESSES SW_SENTRY SW_SNMP_POLLING SW_SNMP_TRAPS SW_STRINGS SW_TRANSFORM

Description
Monitors parameters of other KMs Monitors Windows Event Logs Monitors Windows Performance Monitors Windows Services Executes and monitors WMI queries Enables extracting numeric values Executes, monitors and parses command lines and scripts Monitors Processes Main application class Polls and monitors SNMP agents Monitors and listens for SNMP traps Executes string searches Transforms complex (multi-line, HTML, XML) text to enable string/numeric value searches

Preloading Monitoring Studio
For optimal operation of Monitoring Studio, it is strongly recommended that you configure the PATROL Agent to pre-load the KM. This means that the PATROL Agent will automatically load Monitoring Studio upon startup and will not wait for a console requesting the KM. This can be done by setting the /AgentSetup/preloadedKMs configuration variable of each PATROL Agent where Monitoring Studio has been installed. To set a configuration variable, you need to use: PATROL Configuration Manager (PCM) WPCONFIG.EXE (Windows) xpconfig (UNIX/Linux). For more information about these tools, please refer to the BMC Software PATROL documentation. The /AgentSetup/preloadedKMs is a comma-separated list of KM files or KM lists that have to be loaded by the agent upon startup. Basically, it looks like the following: EVENT_MANAGEMENT.kml,Windows_PERFMON_WIZARD.kml,Windows_BASE.kml,AS_EVENTSPRING.kml Add SW_SENTRY8.kml to this list as shown below and then apply the configuration: EVENT_MANAGEMENT.kml,Windows_PERFMON_WIZARD.kml,Windows_BASE.kml,AS_EVENTSPRING.

Installing Monitoring Studio KM for PATROL

25

Monitoring Studio KM for PATROL
Version 8.6.53

kml,SW_SENTRY8.kml

Uninstalling BMC Performance Manager Monitoring Studio
Uninstalling Monitoring Studio is an automated process managed by a wizard. The wizard goes through the necessary steps to remove Monitoring Studio and all files associated with it. You are simply prompt for the product's folder location and the product/components to uninstall. 1. Locate the Uninstall folder under the BMC products directory (typically under C:\Program Files\BMC Software, or /opt/bmc): On Windows systems, launch uninstall.exe On UNIX, launch uninstall.sh

Un-ins ta lla tio n W iza rd — W e lco m e Ste p

Ensure that the uninstall program is up-to-date. You may need to use the installation program from a fresh Installation Utility package.

2. Specify the BMC Software products folder. See the BMC Software documentation for more information about the BMC Software products folder.

Installing Monitoring Studio KM for PATROL

26

Monitoring Studio KM for PATROL
Version 8.6.53

Un-ins ta lla tio n W iza rd — Sp e cify ing fo ld e r

3. To uninstall the KM, select Monitoring Studio KM for PATROL.

Un-ins ta lla tio n W iza rd — Se le cting Pro d ucts a nd Co m p o ne nts Dire cto ry

4. Review your selection and click Start Uninstall to run the un-installation.

Uninstalling BMC Performance Manager Monitoring Studio

27

Monitoring Studio KM for PATROL
Version 8.6.53

Un-ins ta lla tio n W iza rd — R e v ie wing Se le cte d Pro d ucts & co m p o ne nts a nd s ta rt unins ta lling

5. A page displays the list of products/components processed and the percentage of completion. Click Next to continue.

Un-ins ta lla tio n W iza rd — Sta tus

Uninstalling BMC Performance Manager Monitoring Studio

28

Monitoring Studio KM for PATROL
Version 8.6.53

6. A page displaying SUCCESS indicates that Monitoring Studio KM for PATROL is now uninstalled. Click Finish to quit the wizard.

Un-ins ta lla tio n W iza rd — Unins ta ll R e s ults

Uninstalling BMC Performance Manager Monitoring Studio

29

Integrating with BMC Portal .

5. the Portal matches the application classes and parameters in its BMC Performance Manager Integration with PATROL component with those in the KM on the agent. an additional component called BMC-PM-PATROL-Monitoring-Studio-8.zip is released with the KM. The details on this integration component are stated in the document Monitoring Studio KM 8. so that you can use the Portal to monitor your infrastructure from within a single console using PATROL parameter data. v8.Monitoring Studio KM for PATROL Version 8. PATROL Configuration Manager.5.6.5. you can select the parameter threshold values that can be used by the integration component. and it obtains only the data for which it identifies a match. During the data process. It enables visualizing.01and v8. Overview of BMC Performance Manager Integration BMC Performance Manager Integration with Monitoring Studio KM for PATROL mines data from the PATROL Agent for integration into the BMC Performance Manager Portal. on the Portal.53 Since v8.5.00.00. Please refer to the Reference section of this online help for details on the same.5. The integration component provided with this release is the same as the one provided with v8.par. This is an integration component for the BMC Portal environment in the form of a PAR file. the parameter data of objects monitored by the KM. and is valid on versions: v8. 31 .5.02.5.xx Portal Integration available on the Monitoring Studio product page of the Sentry Software website. Using the Host Name or IP Address option in the BMC Portal to specify one or more managed systems as monitored elements. or PATROL KM for Event Management. you can update the threshold settings from within the Portal and not impact the values set in the BMC Performance Manager Consoles. Integrated application classes and parameters The application classes and parameters in the integrated component for the Portal are exactly the same as those in the KM for PATROL. After you perform the initial import of threshold values into the Portal.00.xx.

32 .4.Monitoring Studio KM for PATROL Version 8. However. the PAR file name and Performance Manager properties appear as Published under PAR Files Currently Loaded. and select the PAR file. To remove an inactive instance. 6. On the PAR Files page. and select the Portal tab. 5. Click Upload. just as you would do for any PM on the Portal. 3. asp?topic=28 Installation information Place the BMC-PM-PATROL-Monitoring-Studio-8.net/link.x. select Performance Managers. Add Elements and then add the application class to them or add this application class to existing elements. Parameter data with values larger than 7 digits may be represented in the Portal in scientific notation It is not possible to have border thresholds in the Portal as opposed to in the KM.sentrysoftware. The Portal will translate border thresholds from the KM into its own system of "greater than"/"lesser than".6. 4. How to obtain BMC Performance Manager Integration with Monitoring Studio KM for PATROL The integration component is available at the Sentry Software website: www. Once the application class has been added to the Elements: Click on Configure > Elements > Refresh PATROL Integration to collect the threshold values from the PATROL Agent and reflect them in the Portal. Click Browse to open a file selection dialog box. Under Tasks in the navigation pane.53 Open issues and workarounds The following general issues impact each BMC Performance Manager Integration component: The Portal is unable to dynamically remove application instances that are no longer active. Click the Import tab. Log on to the Portal with administrator credentials. To install BMC Performance Manager Integration with Monitoring Studio KM for PATROL: 1. in Portal v2.5. removing an instance is possible by clicking on the instance > Configure > Delete The Portal does not dynamically activate or inactivate parameters based on the environment. remove the infrastructure element and add it back to the Portal.par file that you downloaded from the EPD page in a known location on your file system. The portal uploads the PAR file to the application server. 2.

com/support_home or visit the BMC Performance Manager Monitoring Studio page on the Sentry Software website. Levels of support BMC Software provides the same support for BMC Performance Manager Integration with Monitoring Studio KM for PATROL as it does for the corresponding BMC Performance Manager Monitoring Studio KM for PATROL. 33 . from where you can download updates as well as all the support documents in PDF format and refer to the online version of the support documents available in the online technical library. by clicking on Configure > Elements > Refresh PATROL Integration. Where to view the latest product information To view the latest BMC Software books and release notes.bmc. visit the Customer Support Web page at http://www. please note that although you are able to change the threshold values in the Portal – these will not in any way impact the values set in the PATROL Agent.bmc. However.53 Updating threshold values in Portal If threshold values are modified in the PATROL Agent. see the Customer Support page of the BMC Software website at http://www. Also.Monitoring Studio KM for PATROL Version 8. you need to manually update them in the Portal. For more information about the latest Support policies and guidelines.6.com/support_home. clicking the Refresh PATROL Integration will always update the values in the Portal to reflect those in the PATROL Agent.

Integrating with BMC Atrium Orche .

Using an Adapter. you can import BMC PATROL application classes (provided in a Knowledge Module –KM) into BMC ProactiveNet. you need to create a specific adapter. The Adapter periodically synchronizes the performance data collected by these application classes into BMC ProactiveNet.6.53 Overview To integrate a BMC PATROL KM into BMC ProactiveNet .Monitoring Studio KM for PATROL Version 8. An adapter for BMC PATROL facilitates pulling of performance data from existing BMC PATROL solutions into BMC ProactiveNet. A d a p te r fo r BM C PA T R OL A rchite cture 35 .

Monitoring Studio KM for PATROL Version 8.53 Creating and Importing an Adapter for a BMC PATROL KM Creating an Adapter for a BMC PATROL KM 1. The BMC ProactiveNet Administration Console is displayed as shown in the following figure: A cce s s ing the A d m inis tra tio n ta b in the A d m inis tra tio n Co ns o le Creating and Importing an Adapter for a BMC PATROL KM 36 .6. Open the BMC ProactiveNet Administration Console.

Im p o rting M o nito r T y p e s a nd A d d ing A d a p te r Creating and Importing an Adapter for a BMC PATROL KM 37 . Right-click the Adapters folder and select Import Monitor Type and Add Adapter > BMC PATROL.6.53 2.Monitoring Studio KM for PATROL Version 8.

6. In the Configuration tab.Monitoring Studio KM for PATROL Version 8. enter the required information: Se tting the co nne ctio n p a ra m e te rs In the Instance Name field. enter a name for this instance of the Adapter that will perform the integration of the ‘targeted KM’ into BMC ProactiveNet. The default port is 3182. Enter the required credential to connect to the Integration Service Agent Creating and Importing an Adapter for a BMC PATROL KM 38 . Select the Agent where this instance of the Adapter will be executed Enter the Integration Service Agent hostname or IP address Enter the Integration Service Agent Port.53 3.

6.Monitoring Studio KM for PATROL Version 8. Click Next to continue R e v ie wing the Inte g ra tio n Se rv ice co nfig ura tio n Creating and Importing an Adapter for a BMC PATROL KM 39 .53 4.

Click Next to let the system load the BMC PATROL application classes.6. Se le cting A p p lica tio n Cla s s e s to im p o rt 6.53 5. A pplication classes ready to be deleted are marked with a red x .Monitoring Studio KM for PATROL Version 8. Creating and Importing an Adapter for a BMC PATROL KM 40 . Select the application classes to import Unselecting will delete the application classes that hav e already been imported during a prev ious operation.

Monitoring Studio KM for PATROL Version 8.53 7. Se le cting A p p lica tio n Cla s s e s fo r A uto -s y nc Creating and Importing an Adapter for a BMC PATROL KM 41 . click Next to continue. The system displays a summary of the application class import.6. Click Next to start the import process. 8. Select the application classes you wish to auto-synchronize with the Integration Service Agent.

53 9.Monitoring Studio KM for PATROL Version 8.6. Set the Filter details if need. Click Next to continue 10. Se tting filte r d e ta ils Creating and Importing an Adapter for a BMC PATROL KM 42 .

12. Click Next to continue.53 11. Sche d uling A uto -s y nc p o lls 13. right-click the Adapter and select Details. W e strongly recommend that y ou create a specific adapter for each KM y ou need to integrate into BMC Proactiv eNet to enable the update of a single KM independently .6. To see the class instances that have been imported by the Adapter. Set the Auto-sync poll scheduling. expand the Adapters folder. The Adapter has been added to the Adapters folder of the Administration Console.Monitoring Studio KM for PATROL Version 8. Click Next to continue. if needed. Creating and Importing an Adapter for a BMC PATROL KM 43 . 14. click Finish to confirm. The system displays a summary of your settings.

53 Updating an Adapter for a BMC PATROL KM Updating an Adapter 1. Updating an Adapter for a BMC PATROL KM 44 . Delete the Adapter instance Go through the Add an Adapter wizard to actually delete the monitor types that had been created based on the previous version of the KM Close Resume the entire Creating an Adapter for a BMC PATROL KM procedure F or complete and detailed information on these procedures. 4. please refer to the BMC Proactiv eNet documentation av ailable from BMC W eb site.Monitoring Studio KM for PATROL Version 8. 3.6. 2.

you need to run the PW Commands as Administrator. On Windows 2008.Monitoring Studio KM for PATROL Version 8. 2. Importing and Customizing Thresholds 45 . Launch the BMC ProactiveNet PW Commands.6. producing extra lines of output during extraction and conver The command has produced a text file with all the parameter threshold settings.53 Importing and Customizing Thresholds 1. Execute the following command line: where pw adapter -type patrol -get_thresholds <file name> -pproxy_host <hostname|ipaddress> [-pproxy_p -get_thresholds <file name> = File name with absolute path at which thresholds will be i -pproxy_host <hostname|ipaddress> = Host name or IP Address of Patrol Proxy Server -pproxy_port <port_number> = Port at which Patrol Proxy Agent communicates with Patrol P -pproxy_user <username> = User name of Patrol Proxy user -pproxy_passwd <password> = Password to authenticate Patrol Proxy user -i = import Instance level thresholds -v = run in "verbose" mode.

Then go to the # INSTANCE LEVEL THRESHOLDS section of the file. If no file path is specified then the de -v enables the Verbose mode Class-level thresholds can be displayed using the Absolute Global Thresholds panel in the BMC ProactiveNet Operator Console.Monitoring Studio KM for PATROL Version 8. 4. Check that the global thresholds have been properly interpreted. Open the file in a text editor.6.53 3. Execute the following command: pw threshold loadpatrolthreshold [<thresholdfilename> [-v]] where: <thresholdfilename> is a thresholds file name. while instance-level thresholds are displayed in the Absolute Instance Thresholds panel: Thresholds have been successfully imported into BMC ProactiveNet. Search the file for the 'NO T_IMPLEMENTED' occurrences to detect thresholds that were not properly conv erted by the PA TR O L A dapter. Save the file. 6. 7. Uncomment all instance level thresholds for the _PATROL__SW_ prefixed instances. 5. Importing and Customizing Thresholds 46 .

Getting Started .

An easy-to-use GUI to setup the monitoring of an application or IT component Monitoring Studio provides a graphical user interface that allows PATROL administrators to set up the monitoring of an application or any other IT component. inevitably involves a lot of programming. devices or IT components for which there are no standard KMs. Please note that although this section briefly gives goes over the installation procedure. Until recently. all of which are time and resource-intensive. Monitoring with Monitoring Studio Monitoring Studio is a module that allows PATROL administrators to set up the monitoring of custom applications and other applications. Developing a PATROL KM.Monitoring Studio KM for PATROL Version 8. This chapter helps you understand how Monitoring Studio KM for PATROL works and what you can do with it. often critical. you can cover up to 100% of your critical applications within your BMC Software monitoring environment. It gives you a quick glimpse of the installation and integration process. In a few clicks. companies often also need to use various custom or in-house applications. was feasible only through a custom PATROL KM. Monitoring Studio provides a graphical user interface through which the administrators can use diverse monitoring tools with great flexibility to monitor their applications/devices/technologies. although not an impossible task. device or IT component for which there is no out-of-the-box monitoring solution available. project management. Once Monitoring Studio is properly configured.53 Introduction While out-of-the-box BMC Software monitoring solutions are available for the most common applications. Once installed. of almost any application. the application/device or IT component appears on the PATROL Console and operators are alerted when a failure or anomaly occurs (depending on the settings). it remains essential to refer to the Installation Guide to ensure a correct installation of the product. release and maintenance management skills. monitoring these custom applications. The user .friendly wizards enable the administrators to decide what should be monitored and how it is to be monitored.6. as they are intrinsically linked to the business. and thanks to intuitive wizards. It also enables you to consolidate diverse monitoring needs through a single solution. and a basic guideline on how to set-up the monitoring of your applications with Monitoring Studio. without any coding. Monitoring Studio KM for PATROL allows you to set up the monitoring. The administrator can create icons for the applications in the PATROL Console and specify in a highly 48 .

What you can do with Monitoring Studio Monitor processes of the application Monitor and analyze files Parse complex log files (xml. Monitoring with Monitoring Studio 49 .6. multi-line or large files) Run string searches Extract numeric values Monitor file systems used by the application Launch commands or scripts Send requests to a web front-end of the application Send queries to the database back-end of the application Poll SNMP agents and listen for SNMP traps Poll JMX-enabled application servers Execute and analyze WMI queries Monitor Windows Performance Monitor Windows Events Monitor Windows Services Monitor other KM's parameters and integrate them within your application/component monitoring The entire configuration of Monitoring Studio is stored in the agent configuration tree (under /MA SA I/SENTR Y8).53 detailed way what must be monitored for this IT component.Monitoring Studio KM for PATROL Version 8.

etc.Monitoring Studio KM for PATROL Version 8. Specify what should be searched for in these information sources: Strings (regular expressions) that are to be found or not to be found Numeric values that will be used to build a graph in the console (with alert thresholds) 4.53 Configuring Monitoring Studio to Monitor your Application Configuring Monitoring Studio to monitor your application strongly depends on the application itself. certain basic guidelines can be followed: 1. Specify the resources used by your application: Processes or Windows services File systems (or logical disks) used by your application Directories (folders) where your application runs (where transactional data is stored. Specify the information sources (where or how can you get information about the application): Flat files that contain useful information about your application LOG files in which your application writes data (traces of the operations) Web pages (your application provides a web front-end that should be tested) Database queries (your application relies on a database server and some tables contain useful data or procedures that should be tested) SNMP agents (your application provides information through an SNMP agent that can be polled or that sends SNMP traps) Commands or scripts that test the application. size. Nevertheless. MSMQ. etc. Configuring Monitoring Studio to Monitor your Application 50 .) Files that are critical to your application (to check their presence. Tuxedo. growth.) as well as their security settings Other middleware information provided by other KMs if your application relies on some middleware software that can be monitored by specific KMs (Oracle. giving its status or other useful information JMX-enabled servers that you want to poll and monitor 3. where queries are queued. Specify what Monitoring Studio should do when an application failure has been detected: Decide what kind of Alert Actions are to be taken when an error is detected.) Other middleware information provided by Windows performance counters if your application relies on middleware software under Windows and provides perfmon data 2.6. etc.

6.Monitoring Studio KM for PATROL Version 8.). etc. M o nito ring Stud io — T re e Vie w Ele m e nts Operators use Monitoring Studio to monitor the applications just like any other KM to: Get information about the application/component Trigger various tests Refresh values Get histories Get alerts and notifications Day-to-day Monitoring with BMC Performance Manager Monitoring Studio 51 . OS. middleware. This IT component is now monitored just like any other standard component of the system (hardware.53 Day-to-day Monitoring with BMC Performance Manager Monitoring Studio Once configured. the application or IT component is monitored and displayed in the PATROL Console.

User Guide .

it appears at the same level as the main Monitoring Studio icon). In addition. IT component or device. Method (summary) Create a new application or container icon (when created. Monitoring Features This section describes all the monitoring tools offered by this version of Monitoring Studio. It also provides detailed information on the product tools and operations: Monitoring Features Thresholds and Alerts Actions Configuration Reports Daily Task Two sections are respectively dedicated to examples and troubleshooting information. it is possible to specify up to three advanced options that facilitate the monitoring management of applications: 53 . and it provides step-by-step illustrated details mon how to use each monitoring tool. It greatly facilitates the monitoring management of applications/components and permits you to have a clean and well-structured hierarchy of the monitored objects.Monitoring Studio KM for PATROL Version 8. etc.53 Introduction This chapter helps you understand how Monitoring Studio KM for PATROL works and what you can do with it.6. Application/Container Icons Objective The aim of the application/container tool is to group several monitoring objects related to the same monitored application. You can create sub-containers within y our application/container which is v ery useful to ensure that the monitoring matches y our actual applications as closely as possible. Specify an application name (or container name) and enter properties that will be useful to operators such as: Description of the application Name of contact in case of an application failure.

if you wish to apply global Alert Actions to all monitored objects belonging to one application. To create sub-containers. right-click the Monitoring Studio icon in the PATROL Console and select KM Commands > New > Application icon (container)… Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — W e lco m e Pa g e To edit an existing application/container icon. You can specify signature files whose existence means that the managed application is currently present on the system and consequently should be monitored (great for clustered applications). for instance. And the third option consists of setting application constants which are very useful for monitoring an application whose properties may change from one system to another. right-click the icon in the PATROL Console > select KM Commands > Edit.Monitoring Studio KM for PATROL Version 8.53 You can set command lines that allow starting or stopping of the application from the menu command. This way they are all grouped together. Create and edit application/container icons To create a new application/container icon. right-click the application/container icon under which you want to create a sub-container > select KM Commands > New > Sub-container… Monitoring Features 54 . The application containers enable you to have a clean and structured hierarchy of your monitored objects.6. Result The application/container icon appears in the PATROL console and you can create or add other monitored objects belonging to the application under it. This is useful.

Let me setup advanced options: Selection enables setting advanced options.53 Step 1: Identifying the application to monitor (naming a container) Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — Co nta ine r Na m e Pa g e Container name: Enter the name of the container or application to monitor. Contact (optional): Enter the name of the person to be alerted or who can provide support in case of an application failure.Monitoring Studio KM for PATROL Version 8. Description (optional): Description of the application or IT component being monitored.6. This builds the label of the icon in the PATROL Console. Monitoring Features 55 .

and then enter user credentials to run these commands.53 Step 2: Advanced options (optional) If you decide to set advanced options in the previous panel shown. On clicking the Start--Stop button in the panel shown above. the next dialog panel gives you access to three options start--stop. and the other to stop it. applications constants: Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — A d v a nce d Op tio ns Pa g e Click on the desired button to show the panel for the corresponding option. To activate this feature.6.Monitoring Studio KM for PATROL Version 8. Start -.Stop This option enables the starting and stopping of an application through a Monitoring Studio KM command. the following panel pops-up: Monitoring Features 56 . signature files. you need to specify two command lines: One to start the application.

If y ou click the C ancel button. Make sure y ou click the A ccept button before y ou go to the nex t step. If you enter the word "PASSWORD" as a Command name.Monitoring Studio KM for PATROL Version 8. Monitoring Features 57 . The Password field will then show instead of the actual password characters.6. the corresponding value will automatically encrypted once you click the Finish button at the last step of the wizard. <Application name> can be stopped with the following command line: Set a command line to stop the application. the newly applied settings will be disregarded! You can start or stop this application by right-clicking on the application/container icon > KM commands > Manage > Start the application/Stop the application.53 Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — A d v a nce d Op tio ns (Sta rt/Sto p Op tio ns ) Pa g e <Application name> can be started with the following command line: Set a command line to start the application. Run these commands as this user with password: Enter a login and password to execute the start and stop command lines.

53 Signature files This is a feature for managing the monitoring of clustered applications. These file names do not accept wildcards. In such case. the following panel is displayed: Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — A d v a nce d Op tio ns (Sig na ture File ) Pa g e Paths to the signature files: Up to four signature file paths can be entered in these fields. If y ou click the C ancel button. When you click the Signature files button in the first panel of "Advanced options". the application monitoring will be turned offline. This can be extremely useful when the application is hosted by a "fail-over" cluster. The presence of signature files indicates that the managed application is currently available on the system and should be monitored.6. When none of these signature files are present. the freshly applied settings will be disregarded! Monitoring Features 58 . The presence of a signature file means that the application is currently present and should be monitored. Monitoring Studio will disable the entire monitoring of this application. Make sure y ou click the A ccept button before y ou go to the nex t step. If none of the required files can be found. The application monitoring will be performed only if a minimum of one of these four files is found. it means that the application is not actually present on the system and consequently should not be monitored.Monitoring Studio KM for PATROL Version 8.

you can specify %{APP_PATH}/log/MyApp. If the IP address changes later. Instead of specifying the IP address of the remote device directly in these SNMP objects. Monitoring Features 59 .6. instead of editing every SNMP polling and trap listening object. Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — A d v a nce d Op tio ns (A p p lica tio n Co ns ta nts ) Pa g e Example 1 When creating the application/container icon for "MyApplication". If you plan to monitor the same application on another system. They facilitate the monitoring across various systems of an application whose properties may change from one system to another.53 Application Constants Application constants are defined at the level of an application/container and can be reused in the various objects underneath. Then. and this application is located under another directory (/usr/local/MyApp for example). Example 2 You specify the monitoring of a remote device using SNMP polling and SNMP trap listening objects in Monitoring Studio.log as the path to the LOG file.Monitoring Studio KM for PATROL Version 8. you will only need to modify the value of the DEVICE_IPADDRESS constant. when creating a "LOG File Analysis" object in Monitoring Studio. you define the APP_PATH constant with the /opt/MyApp value. you can define a DEVICE_IPADDRESS Application Constant at the level of the application/container and use % {DEVICE_IPADDRESS} in the SNMP polling and SNMP listening objects. you will be able to use the same configuration of Monitoring Studio (export and import) and just modify the APP_PATH constant on the new system.

you first: 1. Click Finish and the application/container icon will appear in the PATROL console. Example: APPLICATION_PATH Value: Set a value for the constant.Monitoring Studio KM for PATROL Version 8. Example: /opt/MyApp. The Value field will then show instead of the actual password characters. 3. This feature is particularly useful if you create an application monitoring template where all the defined application constants are empty – in this case.53 Constant name: Enter the name of the constant. Required: Check the box to activate this newly-set application constant. W hen y ou check the R equired box . If you enter the word "PASSWORD" as a Constant name. Monitoring Features 60 . This ensures that no monitoring operation is performed until the required application constants are properly set. the corresponding value will automatically encrypted once you click the Finish button at the last step of the wizard. The application constant/s will be taken into consideration by Monitoring Studio.6. Import the configuration template Enter values to all required application constants before the monitoring actually starts Click Accept. Object ID: PATROL internal identifier of this application/container. Step 3: Monitoring Studio settings Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — Obje ct ID Pa g e Container/Application name: Label that will be displayed in the PATROL Console for this application/container monitoring object. 2. the monitoring of the application container and all its dependent objects are taken offline if the v alue of the application constant is not set.

Command Line Analysis Objective The aim of this tool is to execute a command line and parse the output of this command. and in addition. Monitoring Features 61 .6. The command line analy sis features prov ides a "do-it-y ourself" kind of tool allowing y ou to ex ecute any shell script or VBScript and search for Strings and Numeric v alues in the returned output. the application icon and all its dependent objects will be removed from the PATROL Console and from the agent configuration. to run an infinite background command or to stop a command execution if the timeout elapses. analyze and monitor the script or command line.Monitoring Studio KM for PATROL Version 8. The program or script being ex ecuted should not need any user interaction and should not create any window. Application icons/container objects are instances of the SW_APPLICATIONS class. e. You can configure Monitoring Studio to execute any command line and parse the output of this command. the command line execution feature allows you to: Stop the command execution once a given timeout is reached Verify the status of the execution by searching for a string Run a background command that never ends Thus. Deletion of an application icon or container cannot be undone.53 Removing an application icon/container You can remove an application icon or container from the PATROL Console simply by right-clicking the application icon and selecting KM commands > Delete. what has been written to the stdout and stderr streams. i. verify the status of the execution by searching for a string. After confirmation. Monitoring Studio will analy ze its output. Although Monitoring Studio offers a variety of tools with extensive capabilities. you may have an inhouse script or command that you need to run and analyze at regular intervals in order to monitor your application. In addition. the command line execution feature gives you the options you need to properly execute.

. Monitoring Features 62 . right-click the application/container icon in the PATROL Console and select KM Commands > New > Command Line analysis.Monitoring Studio KM for PATROL Version 8.53 Create or edit a command line analysis To create a new Command Line analysis. Ne w Co m m a nd Line Ex e cutio n W iza rd — W e lco m e Pa g e To edit an existing Command Line analysis. right-click the Command Line icon in the PATROL Console and select KM Commands > Edit.6..

Monitoring Studio KM for PATROL Version 8. Monitoring Features 63 . They will be replaced respectiv ely by the current time and by the last ex ecution time. See F ormat sy mbols for more details on the macros. Execute this command line as Username/Password: Enter a username and password if the command line needs to be run with a user account different from the default PATROL Agent account.6. You can use the % {TIME:… } and % {LA STTIME:… } macros in the command line that will be ex ecuted.53 Classic command execution Step 1: Entering the command line to execute Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — Co m m a nd Line Pa g e Command line to execute: Enter the OS command line or the path to the script that Monitoring Studio will execute.

If the timeout is reached.6.53 Examples The following command line runs the diagnose.EXE //NoLogo C:\MyApplication\bin\diag\diagnose.sh shell script and parses its output: /opt/myApp/bin/diag/diagnose. Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — Co m m a nd Ex e cutio n Pe rio d Pa g e Stop the command if it takes longer than … seconds: The time after which the command will be stopped.vbs The following command dumps the errpt log on IBM AIX and does only take into account the new lines that have been logged since the last polling: errpt –a –s %{LASTTIME:%m%d%H%M%S} Step 2: Execution period. No further analy sis will be performed (String and Numeric Value searches). Monitoring Features 64 . indicating that the command failed to ex ecute properly .sh The following command executes a VBS script: CSCRIPT.Monitoring Studio KM for PATROL Version 8. and execution timeout As the option This command needs to be launched only once and runs continuously is not selected in step 1. the v alue of the Ex ecutionStatus parameter will be set to 1. the following dialog box is displayed.

Step 3: Command execution validation (optional) This option is useful to avoid basic execution errors like File not found because the command line was mistyped. Monitoring Studio triggers an alarm on the ExitStatus parameter to indicate that the execution failed.6. If it is not found. Enter one or several exit codes separated by commas. This option qualifies the exit code returned at the end of the command line execution. The {% PID} macro can be used to indicate the PID of command line process being interrupted. Monitoring Features 65 .53 Command to execute if the timeout above is reached: A command similar to a recovery/cleaning action that will be executed when the timeout is reached. When one of the exit codes is found or not depending on the execution option selected.Monitoring Studio KM for PATROL Version 8. the value of the ExecutionStatus parameter will be set to 1. Command execution validation: The regular expression entered here will be searched in the output of the command. indicating that the command failed to execute properly. The following panel will pop up: Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — Co m m a nd Ex e cutio n Va lid a tio n Pa g e Command Exit Status: States if the command line has been properly executed: Select an execution option (succeeded/failed).

You can then customize (any /all) the thresholds of the parameters as per y our specific needs. on clicking F inish.indicating that they already hav e thresholds. If y ou select Use default thresholds and customize them.6.53 Step 4: Monitoring Studio settings Ne w A p p lica tio n/Co nta ine r Ico n W iza rd — Se tting s Pa g e Object display name: Label that will be displayed in the PATROL Console for this command line monitoring object.Monitoring Studio KM for PATROL Version 8. Monitoring Features 66 . certain parameters for the instance may appear with an asterisk sy mbol . Object internal identifier (ID): PATROL internal identifier of this monitored object. and leave the default settings for the others. the Set Thresholds panel will appear. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them.

It is not actually polled but instead executed just once and the returned value of the command is displayed in the ReturnOutput parameter as it runs.6. You can use the % {TIME:… } and % {LA STTIME:… } macros in the command line that will be ex ecuted to display the current time and the last ex ecution time. See F ormat sy mbols for more information on how to format the % {TIME:… } and % {LA STTIME:… } macros. In addition. Execute this command line as Username/Password: Enter a username and password if the command line needs to be run with a user account different from the default PATROL Agent account. Monitoring Features 67 . String and Numeric value searches are performed as new output is received.53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. and as a result no alerts will be triggered.Monitoring Studio KM for PATROL Version 8. This command needs to be launched only once and runs continuously: A so-called "neverending" command is a program or script that runs continuously. Never-ending Command Execution Step 1: Entering the command line to execute Ne v e r-e nd ing Co m m a nd Ex e cutio n — Co m m a nd Line Command line to execute: Enter the OS command line or the path to the script that Monitoring Studio will execute. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. Thresholds can be set or modified at any time by right-clicking on the instance > KM commands > Set Thresholds.

sh The following command executes a VBS script: CSCRIPT. the following dialog box confirming that the command line will be executed just once and will run continuously is shown: Monitoring Features 68 .Monitoring Studio KM for PATROL Version 8.vbs The following command dumps the errpt log on IBM AIX and does only take into account the new lines logged since the last polling: errpt –a –s %{LASTTIME:%m%d%H%M%S} Step 2: Confirm never-ending command and additional command to execute to stop the never-ending command If you select the option This command needs to be launched only once and runs continuously in step 1.6. the following pop-up asks you to confirm your choice: Ne v e r-e nd ing Co m m a nd Ex e cutio n — Co nfirm a tio n M e s s a g e Once the "never-ending" option is confirmed.53 Example The following command line runs the diagnose.EXE //NoLogo C:\MyApplication\bin\diag\diagnose.sh shell script and parses its output: /opt/myApp/bin/diag/diagnose.

6. Abort any previous execution of this command upon a PATROL Agent restart: Select this option if you wish the system to automatically stop the execution of the previous launched never-ending Command upon the next PATROL Agent restart.53 Ne v e r-e nd ing Co m m a nd Ex e cutio n — Co m m a nd Ex e cutio n Additional command to execute in such a case: Enter a specific command to execute in order to stop the execution of the previous launched never-ending Command.Monitoring Studio KM for PATROL Version 8. This command runs when the command analysis is deleted from the PATROL configuration. Monitoring Features 69 . It is required to properly end the execution of the command. Click Next.

on clicking F inish. and leave the default settings for the others. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance.indicating that they already hav e thresholds. If y ou select Use default thresholds and customize them.53 Step 3: Monitoring Studio settings Ne v e r-e nd ing Co m m a nd Ex e cutio n — Se tting s Object display name: Label displayed in the PATROL Console Object internal identifier (ID): PATROL internal identifier What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. the Set Thresholds panel will appear.6.Monitoring Studio KM for PATROL Version 8. Monitoring Features 70 . You can then customize (any /all) the thresholds of the parameters as per y our specific needs. certain parameters for the instance may appear with an asterisk sy mbol .

You need no longer run separate SQL queries.Monitoring Studio KM for PATROL Version 8. You can then run string or numeric value searches on the return output to get/monitor the result in myriad ways. it is easy to specify strings to be searched or numeric values to be extracted from a database query. Database Query Analysis Objective The aim of this tool is to execute SQL queries on most of the database servers currently available on the market (Microsoft SQL. Method (Summary) If the application you wish to monitor uses a database server. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. Please refer to the string search and numeric value extraction sections for more information. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . As query results are stored by Monitoring Studio in a pipe-separated table format. or by testing the content of some critical application tables. you can search for strings in the result set and build graphs using the numerical values returned. Command line analysis objects are instances of the SW_OSCOMMANDS class. MySQL and Oracle for instance) and monitor their return output within your PATROL environment. Once you specify an SQL query.6.53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. Queries can be set up to perform complex tasks with just the click of a button. you can test this database by sending applicative queries to the database server. and they can be saved for future use. Example How the database query result is formatted and then searched for strings and numeric values: Monitoring Features 71 . and as a result no alerts will be triggered.

If a Database Query Analysis is found. If no Database Query Analysis is found. right-click the Database Query analysis icon in the PATROL Console and select KM Commands > Edit. MySQL Server. right-click the Application/Container icon in the PATROL Console and select KM Commands > New > Database Query analysis… To edit an existing Database query analysis. Step 2: Selecting the connection method Monitoring Studio searches for an existing Database Query Analysis in the configuration for the selected database type. Let me set up the database connection method: Check this option to select the connection method you wish to use to access the database.6. the following panel is displayed whether the Let me set up the database connection method is selected or not. a Microsoft SQL Server. Monitoring Features 72 .53 Create or edit a database query analysis To create a new database query analysis. or any Other database (supporting only ODBC connections). A list of available connection methods will be displayed in next wizard's panel.Monitoring Studio KM for PATROL Version 8. Click Next to continue. Monitoring Studio uses these settings to access the database. Step 1: Selecting the database type Da ta ba s e Que ry A na ly s is W iza rd — W e lco m e Pa g e Select a database type: Specify here whether the database used by your application is an Oracle Database Server.

Open Database Connectivity (ODBC): Select this option to use ODBC to perform the query to the database. This method is by far the fastest but requires the command line tools to be installed on the local server and properly set. SQ L queries are not limited to the local host but a specific driv er must be installed on the serv er where the agent is running. However.2a: Setting JDBC connection to Microsoft SQL database servers 3.Monitoring Studio KM for PATROL Version 8.3b: Setting ODBC connection to MySQLSQL database servers) Monitoring Features 73 .3a: Setting ODBC connection to Microsoft SQL database servers) MySQL Server: 3. it requires the proper driver to be installed on the local server as well as Java for UNIX/Linux servers. Performing an SQ L Q uery on a Microsoft SQ L database installed on a UNIX Serv er is only possible with JDBC and O DBC connection methods since Microsoft does not prov ide O SQ L for UNIX. for UNIX. This method is the slowest and requires Java to be installed on your local server.6. This method is known as the most flexible. The next steps depend on the database server and the connection method selected: Step 3: Connection Information MS SQL Server: 3.1a: Setting Command line connection to Microsoft SQL database servers 3. These command line tools are: Microsoft SQL Server: OSQL MySQL Server: MySQL Oracle Database Server: Oracle SQL*Plus Java Database Connectivity (JDBC): Select this option to use JDBC to perform the query to the database.1b: Setting Command line connection to MySQL database servers 3.2b: Setting JDBC connection to MySQLSQL database servers 3.53 Da ta ba s e Que ry A na ly s is W iza rd — Da ta ba s e Co nne ctio n M e tho d Se le ctio n Command line utility: Select this option to use the command line tool developed by the database provider to manage access to a database. A dditional information: SQ L queries on O racle Database running on W indows serv ers can only be performed locally with the O DBC connection method.

1d: Setting ODBC connection to Other database servers The two following steps of he Database Query Analysis wizard are common to all database queries and connection methods. Example Oracle service name: BACKENDDB Username: sysApp Monitoring Features 74 .Monitoring Studio KM for PATROL Version 8.3c: Setting ODBC connection to Oracle database servers) Other (ODBC only): 3. O nly supported with C ommand Line connection method. Query timeout: When the execution exceeds the given timeout (in seconds).53 Oracle Database Server: 3. the ConnectionStatus parameter goes into alert.6.2c: Setting JDBC connection to Oracle database servers 3. This can be also the path to an existing SQL script file.1c: Setting Command line connection to Oracle database servers 3.Defining the query to be executed Da ta ba s e Que ry A na ly s is W iza rd — Que ry De finitio n Pa g e SQL Query to execute: Single line SQL statement to be executed by the Oracle server. Clicking Next brings you to the last step of the wizard with the Monitoring Studio settings. Step 4 . Use the following sy ntax if y ou want to ex ecute the SQ L query from a file: "@ @ < file name> ". They follow Step 3 that depends on the database server and the connection methods you have selected (see above).

Monitoring Studio KM for PATROL Version 8. Step 5 -Monitoring Studio settings The final step of the wizard allows you to enter information related to the query labeling and the threshold settings.53 Password: ****** SQL query: SELECT COUNT(*) FROM PendingCustomers Behavior: Will connect to the BACKENDDB Oracle server instance using the sysApp database account and ask the server to return the number of rows in the Pending Customers table. This query should give a number representing the number of waiting customers for the application. Da ta ba s e Que ry A na ly s is W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console Object internal identifier (ID): PATROL internal identifier of this monitored object What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 75 .6.

Setting connection to Microsoft SQL Server Databases This section details the various connection settings available for performing queries on Microsoft SQL database server.indicating that they already hav e thresholds.Setting Command line connection to Microsoft SQL database servers If you have selected Command Line Utility as the connection method at Step 2 of the Database Query Analysis wizard. the following panel is displayed: Monitoring Features 76 . on clicking F inish. certain parameters for the instance may appear with an asterisk sy mbol .53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. They are documented in the Database Query Analysis section. the Set Thresholds panel will appear. Database query analysis objects are instances of the SW_DB_QUERIES class. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. and leave the default settings for the others.6. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. and as a result no alerts will be triggered. If y ou select Use default thresholds and customize them.Monitoring Studio KM for PATROL Version 8. Step 1 and 2 are common to all database queries and connection methods. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .1a . Step 3.

Leave "default" if there is a single instance Database name: Name of the database Authentication mode (SQL Server/Windows): Select Windows if you wish to connect to the database through your Windows user account. SQL Server performs the authentication itself by checking to see if a SQL Server login account has been set up and if the specified password matches the one previously recorded. If SQL Server does not have a login account set. In that case.6. Monitoring Features 77 .Monitoring Studio KM for PATROL Version 8. Select SQL Server if you wish to connect the database with a specified login name and password from a non-trusted connection. authentication fails and you get an error message. Username: Account used to connect to the database Password: Password associated with the specified username Click Next to access the query definition panel.53 Da ta ba s e Que ry A na ly s is W iza rd — M icro s o ft SQL Se rv e r Co m m a nd Line Co nne ctio n Se tting s Hostname: Name of the server where SQL Server is running (host name or IP address) SQL Server instance name: Specify the SQL server instance name if there are several SQL Server instances installed.

Port: Specify the Microsoft SQL port number Username: Account used to connect to the database Password: Password associated with the specified username Click Next to access the query definition panel Monitoring Features 78 . SQL Server performs the authentication itself by checking to see if a SQL Server login account has been set up and if the specified password matches the one previously recorded.Monitoring Studio KM for PATROL Version 8. In that case.6.2a . authentication fails and you get an error message. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — M S SQL Se rv e r J DBC Co nne ctio n Se tting s Host name: Name of the server where SQL Server is running (host name or IP address) SQL Server instance name: Specify the SQL server instance name if there are several SQL Server instances installed. Select SQL Server if you wish to connect the database with a specified login name and password from a non-trusted connection.Setting JDBC connection to Microsoft SQL database servers If you have selected Java Database Connectivity (JDBC) as the connection method at Step 2 of the Database Query Analysis wizard.53 Step 3. If SQL Server does not have a login account set. Leave "default" if there is a single instance Database name: Name of the database Authentication mode (SQL Server/Windows): Select Windows if you wish to connect to the database through your Windows user account.

Monitoring Features 79 .3a . The ODBC driver must be installed on the PATROL Agent Host name: Name of the server where SQL Server is running (host name or IP address) Database name: Name of the database Username: SQL Server account used to connect to the database Password: Password associated with the specified username Monitoring Studio prov ides two driv ers for W indows: SQ L Serv er and SQ L Serv er 2005.53 Step 3.Setting ODBC connection to Microsoft SQL database servers If you have selected Open Database Connectivity (ODBC) as the connection method at Step 2 of the Database Query Analysis wizard. ODBC Driver (for ODBC Connection only): Select the appropriate ODBC driver.Monitoring Studio KM for PATROL Version 8.6. and one driv er for UNIX: Easy soft O DBC -SQ L Click Next to access the query definition panel. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — M S SQL Se rv e r ODBC Co nne ctio n Se tting s Click Next to open the query definition panel.

Monitoring Features 80 . Step 1 and 2 are common to all database queries and connection methods.6.53 Setting connection to MySQL Server Databases This section details the various connection settings available for performing queries on MySQL database server.Setting Command line connection for MySQL database servers If you have selected Command Line Utility as the connection method at Step 2 of the Database Query Analysis wizard. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — M y SQL Da ta ba s e Se rv e r Co m m a nd Line Co nne ctio n Se tting s Hostname: Name of the server where MySQL Server is running (host name or IP address) Database name: Name of the database Port: Specify the MySQL port number Path to mysql command-line tool: Enter the path to the mysql tool Username: MySQL Server account used to connect to the database Password: Password associated with the specified username Click Next to access the query definition panel. Step 3. They are documented in the Database Query Analysis section.1b .Monitoring Studio KM for PATROL Version 8.

53 Monitoring Studio connects to My SQ L databases using the my sql command-line tool.6. It forces my sql to retriev e results from the serv er a row at a time rather than retriev ing the entire result set and buffering it in memory before display ing it.Setting JDBC connection to MySQL database servers If you have selected Java Database Connectivity (JDBC) as the connection method at Step 2 of the Database Query Analysis wizard. Monitoring Studio uses the following optional my sql parameters to connect to the database and ex ecute the SQ L query : connect_timeout: The number of seconds before connection timeout (as entered in the Monitoring Studio interface). Produce less output. Step 3. This client can be downloaded from the My SQ L website and is installed by default when installing a My SQ L database. W ith this option. called my sql on Linux /UNIX and my sql. my sql does not use the history file. This may slow down the serv er if the output is suspended.Monitoring Studio KM for PATROL Version 8. quick: Do not cache each query result. ex e on W indows needs to be installed on the sy stem that will perform the SQ L queries. This is done to av oid problems due to insufficient memory for large result sets. safe_updates: A llow only those UPDA TE and DELETE statements that specify which rows to modify by using key v alues. no_beep: Do not beep when errors occur. silent: Silent mode.2b . skip_column_names: Do not write column names in results. This command-line tool. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — M y SQL Da ta ba s e Se rv e r J DBC Co nne ctio n Se tting s Hostname: Name of the server where MySQL Server is running (host name or IP address) Database name: Name of the database Port: Specify the MySQL port number Username: Account used to connect to the database Monitoring Features 81 . print each row as it is receiv ed.

5 and My SQ L C onnector 3. Step 3. 51. Monitoring Features 82 .6.3b .53 Password: Password associated with the specified username Click Next to access the query definition panel.Monitoring Studio KM for PATROL Version 8. The ODBC driver must be installed on the PATROL Agent Hostname: Name of the server where MySQL Server is running (host name or IP address) Database name: Name of the database Username: Account used to connect to the database Password: Password associated with the specified username Monitoring Studio prov ides two driv ers (W indows and UNIX): My SQ L C onnector 3. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — M y SQL Da ta ba s e Se rv e r OCBC Co nne ctio n Se tting s ODBC Driver (for ODBC Connection only): Select the appropriate ODBC driver. Click Next to access the query definition panel.Setting ODBC connection to MySQL database servers If you have selected Open Database Connectivity (ODBC) as the connection method at Step 2 of the Database Query Analysis wizard.

.6. ora entries.Monitoring Studio KM for PATROL Version 8.1c: Setting Command line connection to Oracle database servers If you have selected Command Line Utility as the connection method at Step 2 of the Database Query Analysis wizard.53 Setting connection to Oracle Database Server This section details the various connection settings available for performing queries on Oracle database server. Monitoring Features 83 . Step 1 and 2 are common to all database queries and connection methods. y ou can use the sy ntax ://hostname:1521/oracleSID. Step 3. They are documented at the beginning of this section. O therwise. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — Ora cle Da ta ba s e Se rv e r Co m m a nd Line Co nne ctio n Se tting s System identifier (Oracle SID) or connection string: Specify the Oracle SID of the database server you want to connect to. If the O racle Instant C lient is installed. this must match one of the tnsnames.

y ou need to enter the current O R A C LE_HO ME as the O racle location. y ou can use the following sy ntax for the O racle sy stem identifier: //serv er_hostname:1521/database_sid Click Next to access the query definition panel. ora needs to be maintained by an O racle administrator. The tnsnames. Instead.53 Oracle location: Path to the Oracle client. Monitoring Studio will detect the proper SQ L*Plus settings only if the PA TH env ironment v ariable contains the directory of the SQ L*Plus binary . If the O racle Database C lient has been installed on the computer where the PA TR O L A gent is running. Specify the directory where y ou unzipped the O racle packages as the O racle location. thus y ou need to enter a space-free password if y ou are working with this operating sy stem. In most cases. Therefore. y ou need to enter the current O R A C LE_HO ME as the O racle location. If it is located in another specific directory . O racle sy stem identifier (O racle SID): If O racle Database Serv er of the full O racle Database C lient is installed on the computer where the PA TR O L A gent and Monitoring Studio are running. y ou do not need the tnsnames. Note that space characters are not supported for passwords in W indows. Monitoring Studio will try to detect by itself the SQ L*Plus settings. If y ou are configuring local queries. In order to make O racle queries with Monitoring Studio. SQ L*Plus will be using the classic name resolution sy stem. O n Linux and UNIX. or the path to Oracle Instant Client (example: /opt/oracle_instant_client). ora file is located in the $O R A C LE_HO ME/network/admin directory . Please consult y our database administrator if the O racle sy stem identifier of the database y ou want to connect to is not registered in the tnsnames. SQ L*Plus: Monitoring Studio uses O racle SQ L*Plus to connect to an O racle Database Serv er. y ou must specify the optional alternate TNS_A DMIN path (only enter the path to the directory ). the O racle sy stem identifier (O racle SID) that y ou enter in the first field will be resolv ed by using the tnsnames. Optional alternate TNS_ADMIN path: If the Oracle Database Server or Full Client is installed and the tnsnames.6.ora that will allow SQL*Plus to resolve the Oracle SID that you entered in the first field. SQ L*Plus needs to be installed on the computer where Monitoring Studio and the PA TR O L A gent are running. SQ L*Plus is also installed by default with the O racle Database C lient (from v ersion 7. ora file. Monitoring Features 84 .Monitoring Studio KM for PATROL Version 8. y ou need to install the "Instant C lient Basic" (or "Instant C lient Basic Lite") as well as "Instant C lient SQ L*Plus". you can specify the path to the directory which contains tnsnames. Username: Database account to use to connect to the server Password: Password associated with the specified username. x to 10g). This can be either ORACLE_HOME if the Oracle Database Server or Full Client is installed (example: c:\Oracle\ora92. If the O racle Instant C lient is installed on the computer where the PA TR O L A gent and Monitoring Studio are running. Starting with v ersion 10g. x to 10g). O racle now prov ides a new lightweight client: O racle Instant C lient. ora file.ora file is not located in the default directory. ora file. SQ L*Plus is installed by default with O racle Database Serv er (from v ersion 7. In this case. This new client is made of sev eral packages. O n W indows. the tnsnames.

Setting JDBC connection to Oracle database servers If you have selected Java Database Connectivity (JDBC) as the connection method at Step 2 of the Database Query Analysis wizard.6. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — Ora cle Da ta ba s e Se rv e r J DBC Co nne ctio n Se tting s Hostname: Name of the server where Oracle Server is running (host name or IP address) Database name: Name of the database Port: Specify the Oracle port number Username: Database account to use to connect to the server Password: Password associated with the specified username Click Next to access the query definition panel. Monitoring Features 85 .Monitoring Studio KM for PATROL Version 8.2c .53 Step 3.

Monitoring Features 86 .6. the following panel is displayed: Da ta ba s e Que ry A na ly s is W iza rd — Ora cle Da ta ba s e Se rv e r ODBC Co nne ctio n Se tting s ODBC Driver (for ODBC Connection only): Select the appropriate ODBC driver.53 Step 3. Click Next to access the query definition panel.Monitoring Studio KM for PATROL Version 8.Setting ODBC connection to Oracle database servers If you have selected Open Database Connectivity (ODBC) as the connection method at Step 2 of the Database Query Analysis wizard. The ODBC driver must be installed on the PATROL Agent Hostname: Name of the server where Oracle Server is running (host name or IP address) Database name: Name of the database Username: Database account to use to connect to the server Password: Password associated with the specified username Monitoring Studio prov ides an O racle driv er for W indows and the Easy soft O racle O DBC driv er for UNIX serv ers. O n W indows.3c . only queries to a local O racle database are supported.

53 Setting connection to Other Databases (ODBC only) This section details the various connection settings available for performing queries on database servers other than MS SQL. Step 3.Setting Command line connection to Other database servers (ODBC only) Connection settings for databases other than MS SQL. MySQL or Oracle is only supported through ODBC connection.1d . MySQL or Oracle. They are documented in the Database Query Analysis section. You can set the connection parameters with the following panel: Da ta ba s e Que ry A na ly s is W iza rd — Othe r (ODBC o nly ) co nne ctio n s e tting s Pa g e Monitoring Features 87 .6.Monitoring Studio KM for PATROL Version 8. Step 1 and 2 are common to all database queries and connection methods.

Password: Passwords are sensible information that should not be displayed without being encrypted.Password=%{SW_PASSWORD}. Click Next to open the query definition panel. the data source could also be a spreadsheet or text file. thus y ou need to enter a space-free password if y ou are working with this operating sy stem. It is passed in code to an underlying driver or provider in order to initiate the connection. The monitoring features supporting Dynamic Object Builders are: Command Line Analysis Database Query Analysis File Monitoring and Analysis Java MBean Polling SNMP Polling Text Pre-Processing WBEM Query Analysis Web Request Analysis WMI Query Analysis Method (Summary) What the PATROL administrator does: Monitoring Features 88 . In computing. database and security information (user name and password). User=user. you must use the % {PASSWORD} macro in the string and enter the corresponding password in the Password field (encrypted display).51 Driver}. Password = ********* Note that space characters are not supported for passwords in W indows. Dynamic Object Builder Objective The aim of the Dynamic Object Builder is to monitor objects whose return output is dynamic by applying a set of user-defined rules this return output data. server. a connection string is a string that specifies information about a data source and the means of connecting to it.The connection string may include attributes such as the name of the driver.Server=myserver. server and database. Example String = Driver={MySQL ODBC 3.Option=3.6.Whilst commonly used for a database connection.53 Connection String: Enter the connection string that includes attributes such as the name of the driver.Monitoring Studio KM for PATROL Version 8.Database=mydatabase. as well as security information such as user name and password. When a password is included in the string you need to execute.

53 Creates a set of rules to apply to output data Creates String Search/Numeric Value Extraction templates to apply to dynamic items What the Dynamic Object Builder does: Applies the user-defined set of rules to the output data Extracts each matching line and creates a dynamic object for each of them in the PATROL console according to the user-defined naming Groups all dynamic objects under a dynamic container to facilitate the management of all the dynamic objects What analyzing and/or processing commands may be applied to the data: You can analyze the dynamic objects with String Search and Numeric Value Extraction. To edit a Dynamic Object Builder. Dy na m ic Obje ct Build e r W iza rd — W e lco m e Pa g e Monitoring Features 89 . If you have selected the Trigger an alarm when objects are missing option. right-click one of the monitoring features supporting Dynamic Object Builders and select KM Commands > New > Dynamic Object Builder. a parameter named Status is automatically added to the PATROL Console for Dynamic Items. Create or edit a dynamic object To create a Dynamic Object Builder..Monitoring Studio KM for PATROL Version 8.6. It informs you of the Dynamic Item presence or absence upon each collect.. right-click the Dynamic Object Builder icon in the PATROL Console and select KM Commands > Edit.

containing the extracted line. Exclude lines matching the regular expression below: Specify the regular expression you wish the Dynamic Object Builder to search for in the output data. Trigger an alarm when objects are missing: This option allows you to define if and how Monitoring Studio must trigger an alert when the Dynamic Item. Keep only lines matching the regular expression below: Specify the regular expression you wish the Dynamic Object Builder to search for in the output data. Each matching lines is displayed in a separated Dynamic Item automatically added in the PATROL Console under the Dynamic Container icon.53 1. Each matching lines will be ignored.Monitoring Studio KM for PATROL Version 8.6. Defining the rules to apply to the output data Dy na m ic Obje ct Build e r W iza rd — R ule s De finitio n Pa g e View Parameter Output: Displays the output data to which the Dynamic Object Builder rules will be applied. is missing from one collect to another: Do not trigger any alert: Select this option if you do not wish Monitoring Studio to trigger any alert when objects are missing Trigger an INFORMATION: Select this option if you wish Monitoring Studio to trigger an Information alert when objects are missing Trigger a WARNING: Select this option if you wish Monitoring Studio to trigger a Warning alert when objects are missing Trigger an ALARM: Select this option if you wish Monitoring Studio to trigger an Alarm alert when objects are missing Monitoring Features 90 .

Monitoring Studio will trigger the alarm before deleting the object. Column contents are used to generate the Dynamic Items display name and ID in the PATROL Console. The available options are: Never: Monitoring Studio never deletes missing objects in the console.. in a row: Monitoring Studio deletes missing objects after they have been missing a specific number of times in a row Column separators: Define the way the Dynamic Object Builder detects columns of output data. When they are missing . If an alarm is configured. Click the Status parameter to open a graph pane displaying the status history of the Dynamic Item. They will always be present.. Dy na m ic Obje ct Build e r W iza rd — Co lum n s e p a ra to r d e finitio n Monitoring Features 91 . As soon as they are missing: Monitoring Studio deletes missing objects from the console as soon as their absence is discovered. Delete missing objects: Set this option according to how you want Monitoring Studio to display missing objects in the console.6.53 I you have chosen to trigger an alert. a Status parameter will automatically be activated and displayed under the Dynamic Item in the PATROL Console to indicate that the Dynamic Item is missing.Monitoring Studio KM for PATROL Version 8..

While standard String Search and Numeric Value Extraction features apply to a single return output. Define Dynamic Objects. Templates apply to all the Dynamic Items' output within the Dynamic Container (see step in the example below). In order to apply these features to all the Dynamic Items in a single operation.6. Monitoring Features 92 . Dynamic Objects are instances of the SW_DYNAMIC class.53 2.Monitoring Studio KM for PATROL Version 8. the Dynamic Object Builder creates Templates instances of these features. Instance Names and Internal identifier Dy na m ic Obje ct Build e r W iza rd — Dy na m ic Obje ct Na m e s a nd ID d e finitio n Pa g e Object Display Name: Name of the Dynamic Object Builder as it will appear in the PATROL Console Object Internal Identifier (ID): Name used by the PATROL Console to internally identify the Dynamic Object Builder Object Display Name: Name of the Dynamic item that contains the data retrieved from the output data. Using String Search and Numeric Value Extraction Templates Features such as String Search and Numeric Value Extraction can help you analyze the Dynamic Items output. This name will be used as a label to identify the Dynamic item in the PATROL Console Object Internal Identifier (ID): Name used by the PATROL Console to internally identify the Dynamic item More Information: Provides information on the objects creation and labeling Click Finish to apply the Dynamic Object Builder rules to the KM command output file. When you modify a Template. the changes will apply to all the Dynamic Items upon the next data collection.

growth & security Parse file content to retrieve useful data (including strings that should be present or not and numeric values to build graphs). The most typical usage of file monitoring is parsing a LOG file.6. if its security settings have changed. The File Analysis tool is one of the most important monitoring tools as most applications deal with files and many of them are critical. Most applications use LOG files to trace their operations and notify operators when failures occur. if it is being regularly updated. size.Monitoring Studio KM for PATROL Version 8.53 Example How a Dynamic Object Builder elements are managed and displayed in the PATROL Console File Monitoring and Analysis Objective The aim of this powerful File Monitoring tool is to instantly detect and alert if any files go missing. Monitoring Studio allows you: To monitor the main characteristics of these files such as: presence. Monitoring Features 93 . etc. if a file is growing at a steady speed.

6. In LO G files.53 The difference between flat files and LO G files: A s opposed to the LO G files. right-click the Application/Container icon in the PATROL Console > KM Commands > New > File monitoring and analysis. 3. and file security objects are set up for the monitored file.. only the new lines will be scanned when searching for strings or numeric v alues. and then run string and numeric value searches on it. 2. you can first transform the content with the text pre-processing tool. or XML files or complex LOG files. you must first: 1. If required. 6. Indicate the path to the file Select the characteristics to be monitored.Monitoring Studio KM for PATROL Version 8. create string search and numeric value extraction objects If you have large multi-line records. Method (summary) In order to monitor a file. 5. Specify whether it is a flat file or a LOG file (Flat files are entirely updated and therefore need to be parsed entirely as opposed to LOG files where new lines are appended at the end of the file and therefore only these new lines need to be analyzed). Result Once the file monitoring is set up and string searches/numeric value searches/text preprocessing. 4.. the objects hierarchy in the PATROL Console will be as illustrated in the image below: Hie ra rchy in the PA T R OL Co ns o le Create or edit a file monitoring To create a new file monitoring and analysis. so-called "flat files" are alway s entirely parsed when y ou specify strings or numeric v alues to search in the file. Monitoring Features 94 .

Monitoring Studio KM for PATROL Version 8. 2.53 Step 1: Selecting the type of file to monitor File M o nito ring a nd A na ly s is W iza rd — W e lco m e Pa g e To edit an existing file monitoring. To specify numeric values to extract from this file: 1.. Right-click the file icon (once it has been created) in the PATROL Console Select KM Commands > New > String search.6. To monitor the security settings of this file. See section on "Searching for strings" for more information about this feature. To specify strings to search in this file: 1. 2. Monitoring Features 95 . Right-click the file icon (once it has been created) in the PATROL Console Select KM Commands > New > Numeric Value extraction… See chapter "Searching for numeric values" for more information about this feature. right-click the file icon in the PATROL Console > KM Commands > Edit.. right-click the file icon (once it has been created) in the PATROL Console > KM Commands > New > File Security check… See section on "File security monitoring" for more information about this feature.

Simply insert the following string in the "F ile name and path" field.g. F or the complete list of format sy mbols. no information is lost when switching from the previous file to the new one. The wildcard characters that can be used are: '?': replaces one character. please see F ormat Sy mbols in the R eference section. Monitoring Features 96 . It is also possible to use a format Menu C ommand to dy namically assign the current date or time in the file name or path.g. the most recently modified or created file matching the criteria will be monitored. In this case. Example Monitor: /opt/myApplication/log/myApp*. replacing the three dots by date format sy mbols: % {A SC TIME:… }. This way.6. meaning and some ex amples. Monitoring Studio analyses the current file for changes and searches for strings and numbers.) and start the monitoring of this file. When the application stops writing in this LOG file and creates a new one (/opt/myApplication/log/ myApp_20030808_0512 e. W ildcards can be used in the path or file name.53 Step 2: Identifying the file to monitor Identify the file you wish to monitor File M o nito ring a nd A na ly s is W iza rd — File Na m e a nd Pa ra m e te rs Pa g e File name and path: Path and name of the file to be monitored. and then switch to this new file.).log Behavior: Monitoring Studio will look for the most recent file that matches the mask (/opt/ myApplication/log/myApp_20030807_1711 e. '*': replaces one or more characters.Monitoring Studio KM for PATROL Version 8.

Click Next. Although modifiable. click on the instance > KM commands > Edit and select or de-select the parameters. W hen y ou set or edit thresholds.6. See SW_FILES for parameter details. A t a later stage. You arrive at the last panel of the file monitoring set-up process.Monitoring Studio KM for PATROL Version 8. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 97 . the thresholds dialogue box display s only those parameters selected at this stage. if y ou wish to monitor more parameters of this file (or less).53 Select the parameters you want to monitor: Select only those relevant to this file monitoring and deselect the others. A warning panel will appear if the file does not actually ex ist/if the path entered is incorrect. it is strongly recommended not to change the default ID. Step 3: Monitoring Studio settings File M o nito ring a nd A na ly s is W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console Object internal identifier (ID): PATROL internal identifier of this monitored object.

Although file systems are already monitored by BMC Performance Manager for Servers. If y ou select Use default thresholds and customize them. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance.indicating that they already hav e thresholds. Thresholds can be set or modified at any time by right-clicking on the instance > KM commands > Set Thresholds. and as a result no alerts will be triggered. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance.Monitoring Studio KM for PATROL Version 8. Monitoring Features 98 . File monitoring objects are instances of the SW_FILES class. File systems (or Windows logical disks) are often a critical resource for applications. File System Monitoring Objective The aim of the File System monitoring tool is to enable operators to rapidly identify impacted applications by distinguishing and specifying what applications rely on which file systems. operators often do not know which application is impacted when a file system is full. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. and certain parameters for the instance may appear with an asterisk sy mbol .6. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. the Set Thresholds panel will appear.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. and leave the default settings for the others. on clicking F inish.

The panel that shows all the drives is for display/information purpose only. Step 1: Identifying the file system to monitor File Sy s te m M o nito ring W iza rd o n W ind o ws — W e lco m e Pa g e Select a File System: This drop-list box contains the list of file systems on the computer. Again. right-click the Application/Container icon in the PATROL Console and select KM Commands > New > File System monitoring. Select the file system you wish to monitor. The parameters you can monitor on a file system are: Monitoring Features 99 ..Monitoring Studio KM for PATROL Version 8. selection of the drive/file system with the cursor is not possible – you are required to enter the drive manually. owing to PSL limitation. UNIX/Linux with more than 30 file systems: On UNIX/Linux servers with more than 30 file systems.6. PSL limitations render the correct functioning of a long drop-down list difficult. Click Accept/Cancel. hence these systems will display the dialogue box.53 Create or edit a file system monitoring To create a new file system monitoring. To edit an existing file system monitoring. By clicking Existing File Systems a small box showing current file systems will appear.. right-click the File System icon in the PATROL Console and select KM Commands > Edit.

53 FreeMegabytes: Free space left in megabytes. in percentage of its size (in percentage per hour . Note that the UsedSpaceGrowthSpeed parameter may have negative values. Note that the UsedSpaceGrowthPercent parameter may have negative values. You can configure Monitoring Studio to trigger an alert when the percentage of free space on the file system is lower than a given threshold. Step 2: Monitoring Studio settings File Sy s te m M o nito ring W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console. FreeSpacePercent: Displays the free space in percentage. UsedSpaceGrowthPercentage: Shows how fast the file system is filled up. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 100 . It is possible to trigger an alert when the free space in MB is lower than a given value.6.Monitoring Studio KM for PATROL Version 8. Object internal identifier (ID): PATROL internal identifier of this monitored object.%/hour). UsedSpaceGrowthSpeed: Shows how fast the file system is filled-up (in megabytes per hour – MB/hour).

on clicking Finis h. Monitoring Features 101 .. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. With a few clicks. certain parameters for the instance may appear with an asterisk sy mbol .6.indicating that they already hav e thresholds. Create or edit a File security monitoring To create a new File Security monitoring.. If y ou select Use default thresholds and customize them. To edit an existing File Security monitoring. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . Step 1: Selecting the security parameters to monitor The first panel of the File Security wizard allows you to select different file security options. File system monitoring objects are instances of the SW_FILESYSTEMS class. the Set Thresholds panel will appear. right-click the File monitoring icon in the PATROL Console and select KM Commands > New > File security check.. you can monitor the access and rights of groups and users and define who should be alerted if the file content is changed or if security is breached.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. right-click the File security icon in the PATROL Console and select KM Commands > Edit.Monitoring Studio KM for PATROL Version 8. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. and leave the default settings for the others. File security check Objective The aim of this tool is to offer you a complete coverage of file monitoring by allowing you to ensure that file security is respected. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. and as a result no alerts will be triggered.

Monitoring Studio KM for PATROL Version 8. simply click on Nex t until the end of the wizard. Check the options and click Next to proceed. Depending on the operating system the PATROL agent is running on. Step 2: File’s access rights This panel helps you select the type of alert to be triggered if the file’s access rights do not match the criteria entered. On UNIX and Linux systems Monitoring Features 102 . By default.6. you may get different options. If the current file configuration is the correct one. Monitoring Studio will use the current file attributes and owners in the nex t steps.53 File Se curity Che ck W iza rd — W e lco m e Pa g e Granted file access rights User that owns the file Group that may have access to the file File integrity.

group.6.53 W ind o ws Se rv ice M o nito ring W iza rd — File A cce s s R ig hts o n UNIX/Linux Sy s te m s Choose type of alert: The first dropdown list enables you to choose the type of alert to trigger if the current file mode does not match the "expected" file mode. S. Various permission combinations are possible. for example. -rwxr-xr-x. The" – "indicates that permission is not granted. except that the x. s. The access right characters are interpreted as follows: Monitoring Features 103 . and others categories. File access rights: These are the classic file access rights that can be looked up by executing an "ls –l" command. and T characters are mutually exclusive. The mode consists of 10 characters.Monitoring Studio KM for PATROL Version 8. t. The first character indicates the entry type: b: block special file c: character special file d: directory l: symbolic link n: network special file p: fifo (also called a \"named pipe\") special file s: socket -: ordinary file The next 9 characters are interpreted as three sets of three characters each which identify access and execution permissions for the owner.

SUID) or group (set group ID. On Windows systems The file access rights depend on the Access Control List (ACL) on Windows systems. t: Grant execute (search) permission to others. An ACL is a table that tells a computer operating system the access rights each user has to a particular system object. SGID). as indicated by position.Monitoring Studio KM for PATROL Version 8. SGID). SUID) or group (set group ID. s: Grant execute (search) permission to the corresponding user class. S: Deny execute (search) permission to the corresponding user class. r: Grant read permission to the corresponding user class. such as a file directory or individual file. The "sticky" (save text image) bit is set. as indicated by position. w: Grant write permission to the corresponding user class.6. The most common privileges include the ability to: Monitoring Features 104 . x: Grant execute (or search in directory) permission to the corresponding user class. Each object has a security attribute that identifies its access control list. T: Deny execute (search directory) permission to others. The list has an entry for each system user with access privileges. Execute the file as if by the owner (set user ID.53 -: Deny all permissions in the corresponding position. Execute the file as if by the owner (set user ID. The "sticky" (save text image) bit is set.

Monitoring Features 105 . an access control list is associated with each system object. Generally.Monitoring Studio KM for PATROL Version 8. the access privileges are stated in a string of bits called an access mask. the system administrator or the object owner creates the access control list for an object. groups.53 Read a file (or all the files in a directory) Write to the file or files Execute the file (if it is an executable file. The user can also be a role name.6. Each ACL has one or more access control entries (ACEs) consisting of the name of a user or group of users." or "tester. or roles. such as "programmer. W ind o ws Se rv ice M o nito ring W iza rd — File A cce s s R ig hts o n W ind o ws Sy s te m s In Windows." For each of these users. or program).

Monitoring Features 106 .6.Monitoring Studio KM for PATROL Version 8. Trigger an ALARM. Step 4: File’s group Monitoring Studio checks if a group differs from the specified criteria. Trigger an INFORMATION Specify whether the file owner is or is not: Specify whether or not the file’s owner should or should not match the specified names. Trigger a WARNING. you can: Enter up to 8 users or groups Indicate the access criteria: read.53 In this panel. write or execute Specify the type of alert to be triggered if the file’s access rights differ from the specified criteria. W ind o ws Se rv ice M o nito ring W iza rd — File Owne rs hip Pa g e Select the type of alert: Do nothing. Step 3: Ownership Monitoring Studio can check if the file’s owner is approved.

Trigger an INFORMATION Specify whether the file’s group is or is not: Specify whether or not the file’s group matches the specified criteria. W ind o ws Se rv ice M o nito ring W iza rd — File Inte g rity Pa g e Select the type of alert: Do nothing. Step 5: File’s integrity In this panel. Trigger a WARNING.6. Trigger an ALARM. Trigger an INFORMATION Monitoring Features 107 .Monitoring Studio KM for PATROL Version 8.53 W ind o ws Se rv ice M o nito ring W iza rd — File Gro up Pa g e Select the type of alert: Do nothing. you are simply asked to select the type of alert to trigger when the file’s content is modified. Trigger a WARNING. Trigger an ALARM.

it is strongly recommended not to change the default ID. File security check objects are instances of the SW_FILE_SECURITY class.Monitoring Studio KM for PATROL Version 8. Although modifiable. Thresholds can be set or modified at any time by right-clicking on the instance > KM commands > Set Thresholds. The default polling interval is 2 minutes. PATROL Object ID: PATROL internal identifier of this File security monitoring. Poll every "x" minutes: Set the polling interval for this monitored object.53 Step 6: Monitoring Studio settings W ind o ws Se rv ice M o nito ring W iza rd — Se tting s Pa g e PATROL Object Label: Label displayed in the PATROL Console.6. Monitoring Features 108 .

Method (summary) Identify the folder to monitor Specify the parameters Monitoring Studio tests and measures the content of this folder every two minutes (total size.).6. y ou can set the configuration v ariable "/MA SA I/SENTR Y8/folderLimit" to a v alue greater than 1000. F older monitoring may be time-consuming for large size folders. Result This allows you to: Ensure that your application is not overloaded (number of files to be processed. right-click the application/container icon in the PATROL Console and select KM Commands > New > Folder monitoring. Folders/directories are often critical elements for an application and checking their content is a good way to monitor the application's health. Create or edit a folder monitoring To create a new folder monitoring. how many have been processed) Check the age of the newest file (whether the data is coming in properly…) Check the age of the oldest file (whether the application late in processing queued files). Therefore..) Measure the application activity (how many removed files.. growth and flow (including how many files move in.53 Folder Monitoring Objective The aim of the tool is to monitor folders (directories) that store files processed by the application: measure their size. number of files) and compute the file flows (how many new files. etc. that is.g. Monitoring Studio will automatically reduce its monitoring features when the monitored folder contains more than 1000 files. how many out. how many removed files) etc depending on the options selected. If y ou want to av oid the use of this limit. e. Monitoring Features 109 .Monitoring Studio KM for PATROL Version 8.

right-click the folder icon in the PATROL Console and select KM Commands > Edit.53 Fo ld e r M o nito ring W iza rd — W e lco m e Pa g e To edit an existing folder monitoring. Monitoring Features 110 .6. Step 1: Identifying the folder Ne w Co m m a nd Line Ex e cutio n W iza rd — Fo ld e r Id e ntifica tio n Pa g e Folder name and path: Enter the name and path of the folder (directory) to be monitored.Monitoring Studio KM for PATROL Version 8.

You may also use sev eral masks separated by ". Example You can enter:. and all files matching these masks will be monitored Step 2: Select the parameters M o nito ring Fo ld e r W iza rd — Pa ra m e te rs Pa g e What the parameters signify: Folder Disk Usage: FolderSize: Total size of all files in the folder (and sub-folders if asked). This is the last recorded size divided by the polling interval. Monitoring Features 111 . You can use wildcards such as "*" to replace any number of characters. This parameter can also be negative. Monitoring Studio will only take into account the files matching the masks entered.53 Include sub-folders: Check this box to monitor all the sub-folders of the above-specified folder.".Monitoring Studio KM for PATROL Version 8.6. GrowthSpeed: Growth speed of the folder since the last polling.log.file.myFiles?.*. Unit: percent per minute. Monitor only files matching the mask below (optional): Specify the file types or enter masks. and only these files will be monitored. or "?" to replace just one character. GrowthPercentage: Growth of the folder since the last polling.txt. Unit: kilobytes per minute. divided by the polling interval.

Unit: files per minute LastModifiedFileElapsedTime: Time elapsed since the last modification/creation of a file in this folder.6. Unit: files per minute Files Modified: ModifiedFileCount: Number of files modified since the last polling. Unit: minutes Step 3: Monitoring Studio settings Fo ld e r M o nito ring W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console. Unit: minutes OldestModifiedFileElapsedTime: Time lapsed since the last modification/creation of the oldest file in this folder. divided by the polling interval. Object internal identifier (ID): PATROL internal identifier of this monitored object. Unit: files per minute NewFileCount: Number of new files added to this folder since the last polling. divided by the polling interval. divided by the polling interval.53 Folders File Flow: FileCount: Current number of files in the folder DeletedFileCount: Number of files deleted from this folder since the last polling. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 112 .Monitoring Studio KM for PATROL Version 8.

certain parameters for the instance may appear with an asterisk sy mbol . representing the formula results. Monitoring Features 113 . Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. and leave the default settings for the others. on clicking F inish. You can then customize (any /all) the thresholds of the parameters as per y our specific needs.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them.Monitoring Studio KM for PATROL Version 8. Folder monitoring objects are instances of the SW_FOLDERS class. Method (summary) The Multi-Parameter Formula option has been specifically designed to apply mathematical formulas to monitored Knowledge Modules’ parameters. If y ou select Use default thresholds and customize them. All you need to do is: Create a Multi-Parameter Formula Select the parameter(s) of the KM that you wish to monitor Define the formula you wish to apply to the collected value(s) Enter a name and an identifier for the object. and as a result no alerts will be triggered. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .indicating that they already hav e thresholds. that will be created in the console Set the threshold conditions Result You can then receive alerts for any malfunction in the KM(s) that could in turn affect the functioning of your application. the Set Thresholds panel will appear.6. Multi-Parameter Formula Objective The aim of this Multi-Parameter Formula tool is to monitor parameters of any KMs loaded in your console and to apply a mathematic formula to the collected values in order to obtain a meaningful result. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance.

Monitoring Features 114 . right-click the application/container icon in the PATROL Console and select KM Commands > New > Multi-Parameter Formula.Monitoring Studio KM for PATROL Version 8. M ulti-Pa ra m e te r Fo rm ula W iza rd — W e lco m e Pa g e To edit an existing Multi-Parameter Formula.6. right-click the Multi-Parameter Formula icon in the PATROL Console and select KM Commands > Edit..53 Create or edit a Multi-Parameter Formula To create a new Multi-Parameter Formula..

Monitoring Studio will determine the parameter's path according to the parameter's class and the selected instance label. in that case. If needed. Click Next to continue.6. Monitoring Features 115 . Monitoring Studio will list the objects actually present at the time of the collect and will only consider and monitor the first instance that matches the label selected in the MultiParameter Formula wizard. The list displays all the KMs and their respective parameters currently available on the Agent. check the Use the objects display name to dynamically determine the PATROL IDs option to allow the use of label instances instead of PATROL IDs to determine a parameter's path.Monitoring Studio KM for PATROL Version 8.53 Step 1: Selecting the parameter(s) you wish to use in the formula M ulti-Pa ra m e te r Fo rm ula W iza rd — Pa ra m e te r(s ) Se le ctio n Pa g e Select the parameter(s) you wish to use in the formula: Click as many parameters as you need to select. upon each collect. This option may be particularly useful when an object ID is unknown.

53 Step 2: Define the formula to apply to the monitored parameter(s) M ulti-Pa ra m e te r Fo rm ula W iza rd — De fining a fo rm ula to a p p ly to the s e le cte d p a ra m e te r(s ) The parameter(s) you have selected at the previous step are listed and labeled alphabetically: A.Monitoring Studio KM for PATROL Version 8. Use the standard mathematical symbols to do so. such as: + . Formula: Enter the formula you wish to apply to the parameter(s)./ * ( ). It is recommended not to select these parameters. Do not collect if one or more parameter has no value: Select this option if you do not wish to collect data for parameter(s) not returning any value. C for the third. for the first parameter.6. B for the second. and so on. Use these letters to represent the parameters in the formula. Monitoring Features 116 . O ff-line parameters and parameters with no v alues (like collectors) are display ed as "O F F LINE" in the list.

Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . on clicking F inish. Monitoring Studio will poll the object and return the output of the polling. If y ou select Use default thresholds and customize them. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. Object internal identifier (ID): PATROL internal identifier of this monitored object.indicating that they already hav e thresholds. Monitoring Features 117 .6. certain parameters for the instance may appear with an asterisk sy mbol . and leave the default settings for the others. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. but will not raise any alerts until you set thresholds. You can then customize (any /all) the thresholds of the parameters as per y our specific needs.Monitoring Studio KM for PATROL Version 8. the Set Thresholds panel will appear. and as a result no alerts will be triggered.53 Step 3: Defining a name for the formula result M ulti-Pa ra m e te r Fo rm ula W iza rd — De fining a Na m e fo r the Fo rm ula R e s ult Object display name: Label that will be displayed in the PATROL Console for this Multi-Parameter Formula.

53 Click Finish to start monitoring the selected parameters. the numeric values are searched in the entire source (the whole file. This feature is called "Numeric Value extraction" as its purpose is to extract numeric values from a text input (the output of a command. it is possible to select which value should be kept: the last value found. or WBEM query etc. or WBEM query etc. lowest value. the whole HTTP response.).): On "running sources" (LOG files and never-ending command lines). Monitoring Studio extracts these values and reports them as graphs in the Console. command lines. These numbers may be reported by the application through its files. like a queue length. etc. a web page. Web requests. The basic mechanism is: 1. a web page.6. Numeric Value Extraction Objective The aim of this tool is to enable you to fine-tune your monitoring by searching for and extracting actual values from a source of information (the output of a command.Monitoring Studio KM for PATROL Version 8. Specify an information source Specify with a regular expression the location of the numeric value within the searched lines Indicate the numeric value’s position in these lines i. the result of a SQL query. a utilization percentage." Sometimes. command lines. M ulti-Pa ra m e te r Fo rm ula Obje ct in the PA T R OL Co ns o le Multi-Parameter Formula objects are instances of the SW_KMWATCH class. in a Web page. The numeric value searching function works a bit differently on "running sources" (LOG files and neverending command lines) than on flat sources (flat files. the whole data-set). in the output of commands. Problems with an application are not always as simple as a sentence explaining that an "error has occurred. 3. column number etc. an application reports its health by providing critical numbers. A new object labeled with the name you have entered at Step 3. Indicate which numbers are to be considered if several lines contain the searched numeric value: first value. calculate average. last value. is automatically created under the application/container icon in the PATROL console. in a database. If several values are found. before/after the string. the Monitoring Features 118 . the numeric values are searched only in new lines since the last polling. a processing time. On "flat sources" (flat files.). database queries).e. Web requests. Method (summary) All you need to do is indicate how to find the numeric value(s) within the information source. highest value. etc. the result of a SQL query. 4. and build graphs with these values. etc. 2. the whole standard output.

right-click the information source icon (file.6.. right-click the Numeric Value Extraction icon in the PATROL Console and select KM Commands > Edit. A graph is then built with these values. etc.. Num e ric Va lue Ex tra ctio n W iza rd — W e lco m e Pa g e To edit an existing numeric value search.Monitoring Studio KM for PATROL Version 8.53 average of all values. Web request. the minimum or maximum or a total of all values. Step 1: Lines to be taken into account Provide information about the line(s) in which the numeric value will be searched for: Monitoring Features 119 .) in the PATROL Console and select KM Commands > New > Numeric Value Extraction. Create or edit a numeric value search To create a new numeric value search.

Step 2: Location of the numeric value within the selected lines Indicate the position of the numeric value to be found: Monitoring Features 120 . If this mode is selected. empty lines will be ignored in the line-count. The information to enter subsequently depends on this first choice. Line numbers are specified as follows: x. There is no need to enter anything. Line numbers (fill in below): Only specific line numbers will be scanned.Monitoring Studio KM for PATROL Version 8. There are three modes to choose from: All lines: All lines of the text will be scanned for the Numeric value search. y: line x and line y x-y: all lines from x to y inclusive x: all lines from 1 to x inclusive x-: all lines from x to the end of the file inclusive If the "Skip blank lines" option is selected. the line numbers must be specified in the text field below. Lines matching the regular expression below: The lines scanned will be lines matching the regular expression specified in the field.6.53 Num e ric Va lue Ex tra ctio n W iza rd — Line s Id e ntifica tio n Pa g e Lines to be taken into account: Specify which lines are to be searched for the numeric value.

At the character offset…: The value should be at a specific character offset in the line.6. In the column number…: The previously selected lines contain several columns identified by a separator character. After/before the string…: Indicate if the numeric value is located after or before the string to be entered in the text field. Monitoring Studio will look for the numeric value at that exact character offset in the line. . so y ou will enter "7" as the character offset. for ex ample: y ou want to search for a v alue that starts from the 7th character in the line. no value will be collected. Enter the offset number in the box. Monitoring Features 121 . If no numeric data is found.Monitoring Studio KM for PATROL Version 8.53 Num e ric Va lue Ex tra ctio n W iza rd — Lo ca tio n Pa g e The numeric value is located: There are four different modes to choose from and the information to enter depends on this choice. . A character offset is nothing but the character "number". Enter the column number that should contain the value and click the "Column separators" button to specify how columns are separated.

Expected format: Select how the numeric values are formatted. it indicates that consecutive separators must be treated as a single separator. semicolon.53 Num e ric Va lue Ex tra ctio n W iza rd — Co lum n Se p a ra to r De finitio n The panel shows the available default separators: Blank space. no numeric v alue will be ex tracted and the PA TR O L graph will not be refreshed (space characters are ignored). If Monitoring Studio does not find a number at the specified location. comma or points as decimal and thousand separators. The above two options are especially useful for data separated by blanks. Step 3: Value selection from multiple matches Num e ric Va lue Ex tra ctio n W iza rd — A d d itio na l Op tio ns Pa g e If several values are found in the searched text. Simply type the separators one after the other. pipe. comma. Consecutive separators mean empty columns: Each separator is treated as an individual column separator and the column is considered empty. You can also add a list of custom separators in the "Other" text box. Consecutive separators must be treated as a single one: Typically.Monitoring Studio KM for PATROL Version 8. The possible choices are: Keep the first value found Keep the last value found (default) Monitoring Features 122 .6. The value can be negative: Specify if the numeric values that you are looking for can be negative. Check or uncheck separators as you need. This option allows you to extract numeric values that use blank. it is necessary to identify which one should be used to set the parameter value and build the graph in the PATROL Console. tabulation.

Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console. The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor Monitoring Features 123 .Monitoring Studio KM for PATROL Version 8.53 Calculate the average Keep the lowest value Keep the greatest value Add up all values Step 4: Parameter Selection Select the parameters you wish to collect.6. DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of seconds elapsed between the collection times Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph. Num e ric Va lue Ex tra ctio n W iza rd — Pa ra m e te rs Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Delta: Calculates the difference between values collected during two consecutive polling.

but will not raise any alerts until you set thresholds. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance.Monitoring Studio KM for PATROL Version 8. you would divide the values by 1048576 (1024*1024). Monitoring Studio will poll the object and return the output of the polling. the Set Thresholds panel will appear. and as a result no alerts will be triggered. and leave the default settings for the others. If y ou select Use default thresholds and customize them. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . In such a case. and certain parameters for the instance may appear with an asterisk sy mbol . You can then customize (any /all) the thresholds of the parameters as per y our specific needs.53 This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes. Monitoring Features 124 . on clicking F inish.6. Object internal identifier (ID): PATROL internal identifier of this monitored object. Step 5: Monitoring Studio settings Num e ric Va lue Ex tra ctio n W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them.indicating that they already hav e thresholds. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance.

When several processes match the entered criteria.Monitoring Studio KM for PATROL Version 8. you will be prompt to enter process command credentials that will be used for running OS commands. Command line that was used to launch the process (arguments passed to the binary). Environment. you can select which parameters should be monitored. Monitoring Features 125 . please refer to About processes in the Reference section. Processes are launched by the operating system and have several properties: PID (unique identifier of a process). In that case. CPU and memory usage. What is a process In practice. Advanced privileges are sometimes required to collect process information.53 Numeric value search objects are instances of the SW_NUMBERS class. User ID. Method to monitor a process (summary) On Windows. Monitoring Studio allows you to check the presence of these processes by specifying one or more of the following criteria: Name of the process (as it appears in ps or in the Windows Task Manager) Command line that was used to spawn the process Username the process is run as PID (process ID) Once you have entered the criteria to detect the processes of your application. Process Monitoring Objective The aim of the Process Monitoring tool is to ensure that an application is functioning properly by checking if the processes of an application are running. UNIX and Linux systems. Other various OS-specific properties. Monitoring Studio provides an application-oriented mechanism to test the presence of such processes. For further details on the concepts related to processes.6. the selected parameters will be valued in the PATROL Console (under the single process icon) by summing up the value of the parameters for each matching process. Result All processes that match the entered criteria will be monitored and identified as one icon in the PATROL Console. See section Process Command Credentials for more information. a process is basically a binary code being executed by processors. Name.

user name and command line.. Monitoring Features 126 . Monitoring Studio builds the list of processes currently running on the monitored server with all the details of each process: PID. Creating and editing a process monitoring To create a new process monitoring." then all the Oracle processes will be monitored within a single icon in the PATROL Console.53 Example If the criterion entered to detect the processes is "ORA. The ProcessorTime parameter under this icon will represent the sum of the processor time of all Oracle processes. process name..Monitoring Studio KM for PATROL Version 8. Step 1 – Select the action you wish to perform Pro ce s s M o nito ring W iza rd — W e lco m e Pa g e To edit an existing process monitoring. Step 2– a: Pick the process to monitor from a list The aim of this option is to let users select a process from a list with a simple click..6. right-click the Application/Container icon within the PATROL Console and select KM Commands > New > Process monitoring. right-click the Process icon within the PATROL Console and select KM Commands > Edit.

select any other process. of course. You can click on any of the process’ lines to select the process from the list. the following dialog box is shown: Monitoring Features 127 . Step 2 . You may . You may remove or modify any information you do not wish to monitor from this panel and proceed with the wizard. Monitoring Studio has to retriev e the list of currently running processes which may a moment depending on the serv er ty pe and the number of processes running. If y ou proceed to the nex t panel and come back to this one. This is due to some PSL limitation.53 Pro ce s s M o nito ring W iza rd — Pick the p ro ce s s to m o nito r fro m a lis t Click the process you wish to monitor and click the Next button. the process y ou chose will not be pre-selected from the list. It may take a few seconds for the panel to be display ed.Monitoring Studio KM for PATROL Version 8.6.b: Criteria the monitored process must match with If you choose to specify criteria that the monitored process must match with. You hav e to re-select the process before clicking on Nex t > . Processes with long command lines may take more than one line to display all the arguments. This will bring up the process criteria panel (see step 1-b) with all information already filled.

exe -p 3181 Monitoring Features 128 .exe Command-line = <nothing> Processes that match the criteria PatrolAgent. Only processes that have been launched by a command-line that matches this regular expression will be monitored. AND the command line that launched the process must match the regular expression below/must contain: Enter a regular expression.Exe C:\Patrol\PatrolAgent.6.exe" extension at the end of the name.53 Pro ce s s M o nito ring W iza rd — Ente r crite ria to id e ntify a nd m o nito r p ro ce s s e s The name of the process must be exactly/must contain: Choose the appropriate option and enter the name of the process to monitor. Under Windows. The tex t entered in the fields is case-sensitiv e on UNIX and Linux . but not on W indows. do not forget the ". View processes: Click this button to view the currently running processes.Monitoring Studio KM for PATROL Version 8. Must be exactly: Signifies that Monitoring Studio will search for a process whose name is exactly as stated in the text you enter. AND the process must be running as this user: Enter the user name the monitored process is running as. Here are a few examples: Criteria Example 1 Process name MUST BE EXACTLY patrolagent.

exe Command-line MUST MATCH THE REGULAR EXPRESSION -[pP] 3181 User Identity = <nothing> Example 3 Process name MUST CONTAIN pat Command-line = <nothing> User Identity = <nothing> Processes that match the criteria C:\Patrol\PatrolAgent.exe C:\Patrol\PatrolAgent. At each polling.53 Criteria User Identity = <nothing> Example 2 Process name MUST BE EXACTLY patrolagent.exe Step 2 .6. the process PID is dynamically allocated. The process PID number should be at the very beginning of the file’s content.Monitoring Studio KM for PATROL Version 8.exe -p 13181 PatrolAgent.c: PID files If you choose to specify a PID file.exe PatProcess.exe PatrolPerf. Monitoring Features 129 . the following dialog box is shown: Pro ce s s M o nito ring W iza rd — Pro v id e a PID file p a th Path to the file containing the Process PID: Enter the path for the file with the process PID. Monitoring Studio reads this file. retrieves the PID number and checks whether this process PID exists or not. Normally.

6. Unit: Percentage (%) Displays the number of threads of the matching process(es). Unit: Processes Displays the processor time percent used by the matching process(es). Unit: Megabytes Displays the working set size of the matching process(es). Unit: Page fault/sec Displays the page file used by the matching process(es).Monitoring Studio KM for PATROL Version 8. On multi. Unit: Megabytes Displays the processor time percent used by the matching process(es).processor computers.53 Step 3: Select parameters Pro ce s s M o nito ring W iza rd — Pro ce s s PID: Pa ra m e te r Se le ctio n Here’s a table that describes the parameters available for process monitoring: Name Count ChildCount ProcessorTime HandleCount (Windows only) PageFaultsPerSec (Windows only) PageFileBytes (Windows only) PrivateBytes (Windows only) ThreadCount (Windows only) VirtualBytes WorkingSet (Windows only) Description Displays the number of processes that match the criteria. Unit: Processes Displays the number of children of the matching process(es). Unit: Percentage (%) Displays the number of handles opened by the matching process(es). this parameter may go over 100%. Unit: Handles Displays the number of page faults per second caused by the matching process(es). Unit: Megabytes Monitoring Features 130 . Unit: Threads Displays the virtual memory used by the matching process(es).

You can then customize (any /all) the thresholds of the parameters as per y our specific needs.Monitoring Studio KM for PATROL Version 8. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. Monitoring Features 131 . and certain parameters for the instance may appear with an asterisk sy mbol . on clicking F inish.6.53 Step 4: Monitoring Studio settings Pro ce s s M o nito ring W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console. the Set Thresholds panel will appear. and leave the default settings for the others. What thresholds do you want to set for the newly created object? The drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. If y ou select Use default thresholds and customize them. Object internal identifier (ID): PATROL internal identifier of this process monitoring.indicating that they already hav e thresholds.

Method (summary) The SNMP agent collects critical information about the middleware. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. or the values of an SNMP table. port and community string Specify the OID to be polled or values from an SNMP Table Result Monitoring Studio will get the value and allow you to store it in a graph. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . and as a result no alerts will be triggered. All the operator has to do is interrogate the MIB and interpret the value of the OID retrieved by Monitoring Studio. directly polls the agent and retrieves the value of a given OID (object identifier).6. and Monitoring Studio. Process monitoring objects are instances of the SW_PROCESSES class. or search for strings in the OID content… Create or edit a SNMP polling To create a new SNMP polling: Right-click the Application/Container icon in the PATROL Console and select KM Commands > New > SNMP polling. SNMP Polling Objective The aim of this tool is to poll the SNMP agent and retrieve the values of a given OID (object identifier). The 3 basic steps to poll the SNMP agent are: Launch the SNMP polling wizard Identify the host (SNMP agent).53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. To edit an existing SNMP polling: Right-click the SNMP polling icon in the PATROL Console and select Monitoring Features 132 .Monitoring Studio KM for PATROL Version 8. These objects are arranged in a Management Information Base (MIB). Many applications rely on middleware instrumented with SNMP (Simple Network Management Protocol) agents. thereby enabling the operator to easily identify the source of the problem or just be informed of the status of the monitored device/parameter. which contain managed objects that provide information related to the current state of its operation. SNMP is an Application Layer protocol that allows external tools to communicate with the agent and read the values of the objects.

6. Monitoring Features 133 .53 KM Commands > Edit.Monitoring Studio KM for PATROL Version 8. Step 1: Select the type of value you want to poll: Single OID value or SNMP table values SNM P Po lling W iza rd — W e lco m e Pa g e A single value from one OID: Select this option to poll a value from one OID Multiple values from rows of an SNMP table: Select this option to poll several values from an SNMP table Click Next to launch the corresponding set-up wizard.

R ight-click the main Monitoring Studio icon > KM C ommands > Tools > SNMP Browser.1 Port: Enter the port used by the SNMP agent to communicate Community: Enter the name of the community used by the SNMP agent OID to poll: Enter the OID (object identifier) to poll.0. as given by the Management Information Base (MIB) After clicking Next.0. either “String” or “Integer. Step 3: Parameter Selection Monitoring Features 134 . You can also use the Monitoring Studio built-in SNMP Browser tool to list the av ailable O ID v ariables and their v alues. If it is the same server as the one the PATROL agent runs on. y ou should use a SNMP MIB Browser tool to identify which O ID corresponds to which v ariable. If you are not sure about the OID type.6. a warning message is displayed. for some reason.” If y ou are unsure about the ex act O ID to poll. The user must select an OID type.53 Single value from one OID Step 2: Identifying the SNMP agent and the OID to poll SNM P Po lling W iza rd — SNM P a g e nt a nd OID s e le ctio n Pa g e Host: Enter the IP of the computer running the SNMP agent that will be polled. the wizard will try to poll the OID to identify its type. the OID cannot be polled.” to let Monitoring Studio know what kind of value is expected.Monitoring Studio KM for PATROL Version 8. it is recommended to select “The OID returns a string. it is possible to use the following IP: 127. If.

Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console.Monitoring Studio KM for PATROL Version 8. Click Next to display the last panel of the wizard. Monitoring Features 135 . In such a case. The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes.6. you would divide the values by 1048576 (1024*1024). DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of seconds elapsed between the collection times Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph.53 Select the parameter you wish to collect: SNM P Po lling W iza rd — Pa ra m e te r Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Delta: Calculates the difference between values collected during two consecutive polling.

6.Monitoring Studio KM for PATROL Version 8.53 Step 4: Monitoring Studio settings SNM P Po lling W iza rd — Se tting s Pa g e Multiple values from an SNMP Table Step 2: Identifying the SNMP agent and the list of columns from the SNMP table to poll Monitoring Features 136 .

the O ID cannot be polled.Monitoring Studio KM for PATROL Version 8.53 SNM P Po lling W iza rd — SNM P a g e nt id e ntifica tio n Pa g e Host: Enter the IP of the computer running the SNMP agent that will be polled. In such a case.6.1 Port: Enter the port used by the SNMP agent to communicate Community: Enter the name of the community string used by the SNMP agent SNMP Table OID: Enter the Table OID (object identifier) to poll.0. Step 3: Monitoring Studio settings SNM P Po lling W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this SNMP polling object Object internal identifier (ID): PATROL internal identifier of this SNMP polling monitoring What thresholds do you want to set for the newly created object? The drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 137 .0.8. a message is display ed stating that the table seems to be empty . it is possible to use the following IP: 127. Enter “ID” to retrieve the row identifier. If for some reason. v erify that y ou hav e entered the right O ID and/or that the table really ex ists and has v alues.9. Leave the field blank to retrieve all values. If it is the same server as the one the PATROL agent runs on. Example: 4. as given by the Management Information Base (MIB) List of table columns to poll: Enter the column numbers whose values should be retrieved. or enter the column numbers separated by commas.

Result Once an SNMP trap containing the right information is received.indicating that they already hav e thresholds. and as a result no alerts will be triggered. Many applications use SNMP traps to communicate information about their state. If y ou select Use default thresholds and customize them.Monitoring Studio KM for PATROL Version 8. on clicking F inish. They are generated by an SNMP agent when certain conditions are met and then sent to an SNMP Trap listener. You can: Monitoring Features 138 . and certain parameters for the instance will appear with an asterisk sy mbol . Thresholds can be set or modified at any time by right-clicking on the instance > KM commands > Set Thresholds. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. SNMP Trap Listening Objective The aim of this tool is to monitor and listen for SNMP traps and enable rapid recovery actions depending on the traps received. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. Method (summary) Listening for these SNMP traps is an essential way of ensuring the proper functioning of such applications. Launch the SNMP trap listening wizard Identify the SNMP agent Specify which trap to listen to by giving its Enterprise OID or trap number Set automatic acknowledgements of the traps and alert thresholds. Do not set any thresholds: No thresholds will be set on any parameter of the instance. thereby ensuring optimal functioning of applications or devices that use SNMP traps. please refer to the Reference Guide.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. and leave the default settings for the others. SNMP Polling objects are instances of the SW_SNMP_POLLING class. but will not raise any alerts until you set thresholds. SNMP Traps are network packets containing data about a component of the system. the Set Thresholds panel will appear. it is possible to run recovery actions to quickly take care of the problem. For details on the parameters discovered. Monitoring Studio will poll the object and return the output of the polling.6.

6. right-click the Application/Container icon in the PATROL Console and select KM Commands > New > SNMP Trap listening.Monitoring Studio KM for PATROL Version 8.. Monitoring Features 139 . SNM P T ra p Lis te ning W iza rd — W e lco m e Pa g e To edit an existing SNMP Trap listening. right-click the SNMP Trap listening icon in the PATROL Console and select KM Commands > Edit...53 Wait for a specific SNMP trap matching up to two "varbinds" OIDs containing specific strings Acknowledge a previously received SNMP trap with another trap Create or edit a SNMP Trap listening To create a new SNMP trap listening.

Case sensitive: Indicates whether or not the search for the content that should be found within the attached variable content will be case sensitive. Trap number: Trap number contained in the SNMP Trap (optional). You can also use the Monitoring Studio built-in SNMP trap listener tool to v iew in real time the SNMP traps and their characteristics that are receiv ed by the PA TR O L A gent. All other SNMP Traps will be ignored. If y ou are unsure about the characteristics of the SNMP trap y ou want to detect. Public is usually the default community used. OID 1 & 2: First and second attached variables OID that should be contained within the SNMP trap (optional). You may use wildcards. It is also possible to enter the text that should be found (or not) within the OID content. You can leave this field empty to listen to SNMP traps from multiple computers or devices. Enterprise ID: Enterprise ID of the SNMP Trap. Monitoring Features 140 . Community: Specifies the SNMP community name in which the Agent will be listening. The SNMP trap listening port is actually a Patrol A gent configuration v ariable: /snmp/trap_port= 162. You can set this v ariable to whatev er port y ou want Monitoring Studio to listen on.Monitoring Studio KM for PATROL Version 8. R ight-click on the main Monitoring Studio icon > KM commands > Tools > R eal-time SNMP Trap Listener.53 Step 1: Identifying the agent and the traps to listen to SNM P T ra p Lis te ning W iza rd — A g e nt id e ntifica tio n Pa g e IP address: IP address of the computer or device where the SNMP agent is running and that will send the SNMP traps. Monitoring Studio will react to the SNMP Trap received only if this information is found within the SNMP Trap. y ou will need to use a SNMP MIB Browser tool to understand the ex act meaning of each trap.6. All these pieces of information define the SNMP Trap that is expected.

will be acknowledged.e. i. after which the matching SNMP Trap received. in minutes. Step 2: Automatic acknowledgement SNM P T ra p Lis te ning W iza rd — A uto m a tic a ck no wle d g e m e nt Pa g e Acknowledge alert(s) if the following SNMP Trap is received: Check the box if you wish to acknowledge an alert thanks to an SNMP trap received that matches the criteria set. clear the previous alert Monitoring Features 141 . This value is only applicable if you have checked the "Acknowledge alert(s) if the following timeout is reached" box. i.Monitoring Studio KM for PATROL Version 8.6. clear all previous alerts Decrease the MatchingTrapCount by one. Monitoring Studio will not receiv e any SNMP trap. If the SNMP agent is not properly configured. Acknowledge alert(s) if the following timeout is reached: Check the box if you wish to acknowledge a matching SNMP trap after a certain time has been reached.53 The SNMP A gent emitting the traps should be configured to send them to the PA TR O L A gent where Monitoring Studio is installed and running.e. Action to be taken when the condition above is reached: Reset the MatchingTrapCount parameter to zero. Timeout value: Time. OID1 & 2: Definition of the attached variables OID that should be contained within the SNMP trap to acknowledge a matching trap received. Trap number: Enter the trap number that will acknowledge the alerts triggered by the specified trap.

53 Step 3: Monitoring Studio settings SNM P T ra p Lis te ning W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console. Monitoring Features 142 . certain parameters for the instance may appear with an asterisk sy mbol . on clicking F inish. Object internal identifier (ID): PATROL internal identifier of this monitored object. and as a result no alerts will be triggered.indicating that they already hav e thresholds.6. Monitoring Studio will poll the object and return the output of the polling.Monitoring Studio KM for PATROL Version 8. SNMP Trap listening objects are instances of the SW_SNMP_TRAPS class. and leave the default settings for the others. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. but will not raise any alerts until you set thresholds. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . If y ou select Use default thresholds and customize them. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. the Set Thresholds panel will appear.

a script to be executed) and then search for strings that must be found or not be found in the information source. for LO G files and "nev er-ending" O S commands. Most log monitoring tools do not offer acknowledgement/recovery actions.6. a Web request.) The string search engine parses the information source line-by -line. This is feasible owing to the Tex t Preprocessing tool.Monitoring Studio KM for PATROL Version 8. This is one of Monitoring Studio’s key features. ): O n "running sources" (LO G files and nev er ending O S commands). a database query. you can specify a string search in a very detailed way. In addition.53 String search Objective The aim of this tool is to enable you to run fast and powerful searches for strings. Method (summary) First specify an information source (a flat or LOG file. etc. It is possible to run string searches on multi-line records. This is where the string search feature makes a difference: it not only allows you to search the LOG file for specified strings. F or a string search in a running source. Once you have defined the information source. See topic Tex t pre-processing for more details. You use the Tex t Pre-processing tool to transform "complex " content. O S commands. Monitoring Features 143 . after which y ou can run string searches on it or ex tract numeric v alues from it. See Tex t Pre-processing for details. XML or HTML content. with the following options: A combination of two regular expressions with and/or/not Where to search in the line (which column. A "must not be found" string search triggers an alert when the specified string is found. two graphs are built: Number of matches since the last acknowledgement and Number of matches per minute since the last polling. LOG file analysis The most commonly used method to monitor an application is still LOG files analysis. Monitoring this information helps in understanding the behavior and performance of the application. W eb requests. ex cept if y ou hav e already pre-processed this tex t and hav e conv erted multi-line records to single lines. Applications log problems in a file as they occur. a SNMP agent. The string searching function works a bit differently on "running sources" (LO G files and nev er-ending O S commands) than on flat sources (flat files. Therefore. the strings are searched only in new lines since the last polling. A "must be found" string search looks through the specified file and triggers an alert if the specified string is not found. the criteria y ou specify should apply to one line. but it is also enable automatic or manual acknowledgement of these errors. character offset etc. y ou can specify auto-acknowledging strings that will automatically reset the graph to the "number of matches".

) in the PATROL Console and select KM Commands > New > String Search. Create or edit a string search To create a new string search. Web request. W eb requests. etc. O S commands. the strings are searched in the entire source ev ery time (the whole file.6. but y ou can specify : Location/area of the source in which to search: n lines. the whole dataset). etc.Monitoring Studio KM for PATROL Version 8. The string search is case sensitive: Check the box or leave it unchecked as per your need Select where to search: For each entered string. and decide whether or not those strings should be contained in the line. database queries).. the whole standard output. pre-filter. or if only one of the two strings is sufficient (OR). one graph is built: Number of matches at the current polling. To edit an existing string search. the whole HTTP response.53 O n "flat sources" (flat files. Step 1: Specifying what to search for String Se a rch W iza rd — Se a rch d e finitio n Pa g e Search for lines that: Contain/do not contain: You can enter up to two strings (regular expressions) to look for. right-click the information source icon (file.. It is also possible to specify if the two strings should be found together (AND). you can specify where in the line to search for the string Monitoring Features 144 . F or a string search in a flat source. right-click the String Search icon in the PATROL Console and select KM Commands > Edit. You cannot use auto-acknowledging strings in flat sources (it is not applicable because the parameter restarts from ‘0’ at each polling).

it indicates that consecutive separators must be treated as a single separator. For example. semicolon.6.53 Anywhere in the line (default) At the following character offset: if you choose to search for the string from a character offset in the line. For custom separators. comma. you enter the digit 7 as the character offset. Consecutive separators mean empty columns: Each separator is treated as an individual column separator and the column is considered empty. tabulation. you must specify how to identify that column by entering the column number and specifying the separator.Monitoring Studio KM for PATROL Version 8. to search for a string that starts from the seventh character in the line. The above two options are especially useful for data separated by blanks. enter the character in the field for Other. Monitoring Features 145 . Character offset is nothing but the character number. you must specify the offset in this field. In the following column number: Enter the column number Specify column separators if applicable: If you choose to search for the string from a specific column in the line. The following panel shows the available default separators: blank space. Consecutive separators must be treated as a single one: Typically. Click the column separator tab in order to select the appropriate field separator. and pipe. String Se a rch W iza rd — Co lum n s e p a ra to r d e finitio n Select or de-select applicable separators.

Select which lines of the source should be scanned Search for the String(s) in all lines: The string(s) will be searched for in all the lines of the specified source.53 Step 2: Line selection (flat source only) String Se a rch W iza rd — Line s e le ctio n (fo r fla t s o urce o nly ) This window is only displayed when a string search in a flat source (flat file.6. command line. y: line x and line y x-y: all lines from x to y inclusive x: all lines from 1 to x inclusive x-: all lines from x to the end of the file inclusive Monitoring Features 146 . Search for the String(s) only in the following line numbers: Enter the list of line numbers you wish to scan separated by ‘. Web request.) is added. etc.’.Monitoring Studio KM for PATROL Version 8. Lines are specified as follows: x.

the MatchingLineCount parameter increases and triggers an alert. enter the value (default is set to 120 minutes). When the above condition is reached: When this occurs.53 Step 2: Automatic acknowledgement of alerts (LOG files and "neverending" command lines only) String Se a rch W iza rd — A uto m a tic a ck no wle d g e m e nt This dialog-box is displayed only for a string search on a "running source" (LOG file and never-ending OS commands). In such a case. or if only one alert should be acknowledged (the MatchingLineCount parameter is decreased by one) Monitoring Features 147 .6. Specify the string Indicate whether or not it is case-sensitive Select where to search: specify the location of the string. each time the specified strings are found. Acknowledge alert(s) if the string below is found: Check the box to acknowledge the alert. you can either specify if all alerts previously triggered by this string search should be acknowledged at one time (the MatchingLineCount parameter goes back to zero). A timeout expires since the last matching line found. enter the column separators if any Acknowledge alert(s) if a timeout of "x" minutes is reached: Check the box to enable alert acknowledgement. You can select both the above options.Monitoring Studio KM for PATROL Version 8. The automatic acknowledgement feature allows you to reset MatchingLineCount value to zero and status to 'normal'.

Monitoring Studio KM for PATROL Version 8.6. and certain parameters for the instance may appear with an asterisk sy mbol .53 Reset the MatchingLineCount parameter to zero (clear all previous alerts) Decrease the MatchingLineCount by one (clear the previous alert) Step 3: Monitoring Studio settings String Se a rch W iza rd — Se tting s Pa g e Object display name: Label that will be displayed in the PATROL Console for this string search object. Object internal identifier (ID): PATROL internal identifier of this monitored object. on clicking F inish. the Set Thresholds panel will appear. Monitoring Features 148 . You can then customize (any /all) the thresholds of the parameters as per y our specific needs. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. and leave the default settings for the others.indicating that they already hav e thresholds. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. If y ou select Use default thresholds and customize them.

it is not possible to run string or numeric value searches in multi-line. For instance. and as it is not possible to perform normal string or numeric value searches on paragraphs.53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. Text Pre-processing Objective The aim of this tool is to process multi-line. and as a result no alerts will be triggered.6. String Search and Numeric Value Extraction objects are then created from the Text Transform object (and not from the original parent object. it limits the monitoring and analyzing capabilities of such content. XML or HTML content. the output of commands is in paragraph form. XML or HTML content and convert it to "line-by-line" text in order to be able to run string searches and/or numeric value searches on this content and then analyze and monitor the result. A brief example to illustrate the usefulness of this tool Example of converting multi-line records to single lines The "ipconfig /all" command under Windows reports various information about each network card. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .Monitoring Studio KM for PATROL Version 8. but will not raise any alerts until you set thresholds. and each "paragraph" is about one network card: Monitoring Features 149 . Monitoring Studio will poll the object and return the output of the polling. String search objects are instances of the SW_STRINGS class. Monitoring Studio allows you to transform the paragraphs of the text into single lines for easy parsing with the String Search and Numeric Values Extraction tools. Most often.

an Web request.. Text Transform objects have only one text parameter. comma separated values Extraction of text from HTML Text processing through an external command Result The text is transformed as per your selection. In the screenshot below.e. TransformResult. a direct string search will not get the desired result in this case – which is why we run the Text pre-processing tool to convert the multi-line text to single lines. Monitoring Features 150 ..6. Create or edit a Text Preprocessing object To create a new Text Pre-Processing object.53 The aim here is to detect any disconnected cards.. right-click the Application/Container icon in the PATROL Console and select KM Commands > New > Text Preprocessing. the output of a command. etc. Select the type of pre-processing you wish to perform: Convert multi-line records to single records Convert XML to CSV i. which is the result of the text transformation done on the original content (a file. Method (summary) Right-click on the object whose content you require to preprocess in order to run string or numeric value searches on the output.Monitoring Studio KM for PATROL Version 8. which in turn enables an efficient parsing with a String search that looks for "disconnected" network cards. But as the text is in paragraphs. You can run string and/or numeric value searches on this "pre-processed" output.). the "ipconfig /all" command is executed and its output is pre-processed to transform its paragraphs into single lines. So we add a monitoring instance for the OS command ipconfig/all.

The example of the OS command shown above is taken here.).6. etc.Monitoring Studio KM for PATROL Version 8. In the output of the "ipconfig /all" command. Monitoring Features 151 . right-click this object > KM Commands > New > Text PreProcessing….Convert Multi-line records to single lines Once you have defined the text source containing paragraphs that you need to parse (a LOG file. A . we identify the paragraphs corresponding to a network interface. a Command Line analysis. right-click the Text Preprocessing icon in the PATROL Console and select KM Commands > Edit.53 T e x t Pre -Pro ce s s ing W iza rd — W e lco m e Pa g e To edit an existing Text preprocessing object.

Monitoring Features 152 .6. In our example each network card paragraph starts with "NEW" and ends with "END".Monitoring Studio KM for PATROL Version 8. Step 2: Define the first and/or last lines of the paragraphs.53 Step 1: Select the "Convert multi-line records into single lines" option T e x t Pre -Pro ce s s ing W iza rd : Co nv e rt m ulti-line re co rd s into s ing le line s — Co nv e rs io n T y p e Se le ctio n Click Next.

Concatenation of multiple lines into a single line using this separator: Leave the semicolon to separate each record or enter the character you wish as a separator. A gain.Monitoring Studio KM for PATROL Version 8. Use the second tex t field if y ou can prov ide a regular ex pression that identifies the last line of each paragraph. between the start line and the end line). Monitoring Studio skips the content until it finds a line matching with the specified criteria. You can specify only a regular ex pression that identifies the beginning of a new paragraph (record). this regular ex pression can match with any part of the last line of each paragraph. Each line in the original content that matches with this regular ex pression produces a new line in the result content. Step 3: Monitoring Studio settings You arrive at the last dialogue box with the newly-created object display name and internal identifier. Include the first line in the result: Check the case to include the first line in the result. Use the first field if y ou can prov ide a regular ex pression that identifies the first line of each paragraph.6.53 T e x t Pre -Pro ce s s ing W iza rd : Co nv e rt m ulti-line re co rd s into s ing le line s — Sta rt/End o f line d e finitio n This RegExp marks the beginning of a new record: Enter the word/regular expression or string that marks the beginning of a new record. If y ou specify both regular ex pressions to identify the beginning and the end of a record. e. Monitoring Features 153 . In this case. Monitoring Studio will only take into account the tex t content that is in between lines that matches these regular ex pressions (i. This RegExp marks the end of a new record: Enter the word/regular expression or string that marks the end of a new record Include the first line in the result: Check the case to include the last line in the result. until Monitoring Studio finds another line that matches with the specified regular ex pression. Click Next. The tex t that follows this line (and optionally including this first line) is concatenated in a single line by using the specified separator. Lines in the original tex t between a line matching the end marker and the nex t line matching the beginning marker will be skipped and not integrated in the tex t result. The same is true for the regular ex pression that marks the end of a paragraph (or record). Please note that this regular ex pression can match with any part of the first line of each paragraph. You can change the label as well as the ID.

the parameter TransformResult will have the output. Step 4: Run a string search on the "transformed" output and/or extract numeric values from it.Convert XML to CSV (comma separated values) ( see example) Right-click the file object > KM Commands > New > Text Pre-Processing…. Monitoring Features 154 . B .6.Monitoring Studio KM for PATROL Version 8.53 T e x t Pre -Pro ce s s ing W iza rd : Co nv e rt m ulti-line re co rd s into s ing le line s — Obje ct Id e ntifica tio n Click Finish and at the next discovery.

Monitoring Studio KM for PATROL Version 8.53 Step 1: Select "Convert XML to CSV" T e x t Pre -Pro ce s s ing W iza rd : Co nv e rt XM L to CSV — Co nv e rs io n T y p e Se le ctio n Click Next. the sub-objects and properties T e x t Pre -Pro ce s s ing W iza rd : Co nv e rt XM L to CSV — Obje ct De finitio n Monitoring Features 155 .6. Step 2: Define the record.

You can change the label as well as the ID.6.Extract text from HTML This allows you to extract text from an HTML source and then run string or numeric value searches on the output. the parameter TransformResult will have the output. Step 3: Monitoring Studio settings You arrive at the last dialogue box with the newly-created object display name and internal identifier. T e x t Pre -Pro ce s s ing W iza rd : Co nv e rt XM L to CSV — Obje ct Id e ntifica tio n Click Finish and at the next discovery. Step 4: Run a string search on the "transformed" output and/or extract numeric values from it. web farm Monitoring Features 156 . Right-click on a an instance with an HTML source/file (HTML file monitoring or web request.Monitoring Studio KM for PATROL Version 8. C .53 This XML tag defines a record: Enter the XML tag that defines the record Include sub-objects and properties defined for the XML tag: Enter its sub-objects and properties Concatenation of sub-objects and properties into a single line: Enter a separator to concatenate Click Next.

6. Step 2: Panel confirms extraction of text from HTML source Monitoring Features 157 . Step 1: Select "Extract text from HTML" T e x t Pre -Pro ce s s ing W iza rd : Ex tra ct te x t fro m HT M L — Co nv e rs io n T y p e Se le ctio n Click Next.53 etc) > New > Text pre-processing.Monitoring Studio KM for PATROL Version 8.

Monitoring Features 158 .53 T e x t Pre -Pro ce s s ing W iza rd : Ex tra ct te x t fro m HT M L — Ex tra ctio n Co nfirm a tio n There are no options to select here. It then displays the output in the parameter TransformResult.e. If the built-in text transformation features of Monitoring Studio cannot handle such "specially formatted" text. the parameter TransformResult displays the output. Step 4: Run a string search on the "transformed" output and/or extract numeric values from it. etc. Click Next. Click Finish and at the next discovery.6. output of commands.Text processing through an external command Some text inputs (files. Web requests.Monitoring Studio KM for PATROL Version 8. D . it simplifies to process the content and makes it "string search-ready"). The main advantage of processing the text through an external command feature is that it enables you to customize the processing of almost any source of information important to your application.) may need to be transformed in a special way in order to be parsed with Monitoring Studio’s String Searches and Numeric Value Extractions. You can change the label as well as the ID. Step 3: Monitoring Studio settings T e x t Pre -Pro ce s s ing W iza rd : Ex tra ct te x t fro m HT M L — Obje ct Id e ntifica tio n You arrive at the last dialogue box with the newly-created object display name and internal identifier. you then have the possibility to process the content through a custom script or utility that performs the required transformation (i. as Monitoring Studio is simply going to transform the HTML source by removing the HTML tags.

Step 2: Specify OS command to be executed to transform the text Monitoring Features 159 .6.53 Right click the File/Command Line/Web request/etc.Monitoring Studio KM for PATROL Version 8. object > New > KM commands > Text Pre-processing… Step 1: Select " Text processing through an external command " T e x t Pre -Pro ce s s ing W iza rd : T e x t p ro ce s s ing thro ug h a n e x te rna l co m m a nd — Co nv e rs io n T y p e Se le ctio n Click Next.

Monitoring Studio KM for PATROL
Version 8.6.53

T e x t Pre -Pro ce s s ing W iza rd : T e x t p ro ce s s ing thro ug h a n e x te rna l co m m a nd — Co m m a nd De finitio n

Command to be executed: Enter the command

The principle is v ery similar to the "pipe" mechanism of the UNIX shell ex cept that the content is not passed directly but is stored in a temporary file and then the result needs to be stored in another temporary file.

Hence the command line y ou specify needs to take the % {INPUTF ILE} macro as an argument (the % {INPUTF ILE} macro is replaced by the real temporary input file location at run time) as well as % {O UTPUTF ILE}.

The output of the command must match this RegExp to be considered as successful: Enter a RegExp to avoid typical path problems such as getting ""... not found" error messages instead of the properly transformed text

If y our command line redirects its output to % {O UTPUTF ILE}, the v alidation regular ex pression is likely to fail because the standard output is empty and thus matches with nothing. Use a v alidation regular ex pression only if y our command line is able to produce both the % {O UTPUTF ILE} and some tex t to its standard output.

Step 3: Monitoring Studio settings

T e x t Pre -Pro ce s s ing W iza rd : T e x t p ro ce s s ing thro ug h a n e x te rna l co m m a nd — Obje ct Id e ntifica tio n

You arrive at the last dialogue box with the newly-created object display name and internal identifier. You can change the label as well as the ID. Click Finish and at the next discovery, the parameter TransformResult displays the output.

Monitoring Features

160

Monitoring Studio KM for PATROL
Version 8.6.53

Step 4: Run a string search on the "transformed" output and/or extract numeric values from it.
All text preprocessing objects are instances of the SW_Transform class.

WMI Query Analysis
Objective
The aim of this tool is to execute WMI queries on your system and consolidate these queries within your PATROL environment along with the application monitoring under a single icon. It has the ability to query the WMI repository for class and instance information. For example, you can request that WMI return all the objects representing shut-down events from your desktop system. You can also retrieve class, instance, or schema data. Monitoring Studio enables you to run WMI queries remotely and you can also search for regular expressions and numeric values in the query output.

Definition
Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems. WMI is the Microsoft implementation of Web Based Enterprise Management (WBEM), which is built on the Common Information Model (CIM), a computer industry standard for defining device and application characteristics so that system administrators and management programs can control devices and applications from multiple manufacturers or sources in the same way.

What does WMI do?
WMI provides users with information about the status of local or remote computer systems. It also supports such actions as the configuration of security settings, setting and changing system properties, setting and changing permissions for authorized users and user groups, assigning and changing drive labels, scheduling processes to run at specific times, backing up the object repository, and enabling or disabling error logging. You can use WMI to manage both local and remote computers. The word "Instrumentation" in WMI refers to the fact that WMI can get information about the internal state of computer systems, much like the dashboard instruments of cars can retrieve and display information about the state of the engine. WMI "instruments" by modeling objects such as disks, processes, or other objects found in Windows systems. For more information on WMI, please refer to About WMI in the Reference section.

Monitoring Features

161

Monitoring Studio KM for PATROL
Version 8.6.53

Method (summary)
Launch the WMI query wizard Identify the host of the remote element, enter a namespace Enter the WMI query and user credentials

Result
An icon representing the WMI query appears in the console with two parameters: ReturnOutput and QueryStatus under it. You can now run String Searches and Extract Numeric Values from this output.

Create or edit a WMI query analysis
To setup WMI query analysis, right-click the main Monitoring Studio icon > KM Commands > New > WMI Query analysis

W M I Que ry A na ly s is W iza rd — W e lco m e Pa g e

To edit a WMI query analysis, right-click the WMI query icon > KM Commands > Edit.

Monitoring Features

162

Monitoring Studio KM for PATROL
Version 8.6.53

Step 1: After launching the WMI wizard, identify the host

W M I Que ry A na ly s is W iza rd — De finitio n Pa g e

Hostname: Enter the host name or IP address. Name space: Enter the WMI namespace. A namespace is a logical group of related classes representing a specific technology or area of management. Example: root\cimv2 WMI Query: Enter your query. Example: SELECT * FROM Win32 process. In case you need help to build your WMI query, you could download WMI CIM Studio, which is one of the WMI Administrative tools on the Microsoft site. Username and Password: Enter your credentials: username and password Click Next.

Monitoring Features

163

Monitoring Studio KM for PATROL
Version 8.6.53

Step 2: Monitoring Studio settings

W M I Que ry A na ly s is W iza rd — Se tting s Pa g e

Object display name: Label displayed in the PATROL Console for this WMI query object Object internal identifier (ID): PATROL internal identifier. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance, and leave the default settings for the others.

If y ou select Use default thresholds and customize them; on clicking F inish, the Set Thresholds panel will appear, and certain parameters for the instance may appear with an asterisk sy mbol - indicating that they already hav e thresholds. You can then customize (any /all) the thresholds of the parameters as per y our specific needs.

Monitoring Features

164

Monitoring Studio KM for PATROL
Version 8.6.53

Do not set any thresholds for now: No thresholds will be set on any parameter of the instance, and as a result no alerts will be triggered. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds.

Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .

Click Finish. You can then add a string or numeric value search if you wish. An icon labeled WMI: [object name] will appear, with icons under it for QueryStatus, ReturnOutput. You can add numeric value extraction or string searches on this object. WMI query analysis objects are instances of the SW_NT_WMI class.

WBEM Query Analysis
Objective
The aim of this tool is to execute WBEM queries on your system and consolidate these queries within your PATROL environment along with the application monitoring under a single icon. It has the ability to query the WBEM repository for class and instance information.

Definition
Web-Based Enterprise Management (WBEM) is a set of systems management technologies developed to unify the management of distributed computing environments. WBEM is based on Internet standards and Distributed Management Task Force (DMTF) open standards: Common Information Model (CIM) infrastructure and schema, CIM-XML, CIM operations over HTTP, and WS-Management. Although the name refers to WBEM as being "Web-Based", it is not necessarily tied in any way to a particular user interface (see below). Other systems management approaches are remote shells, proprietary solutions and network management architectures like SNMP.

What does WBEM do?
WBEM provides users with information about the status of local or remote computer systems. It also supports such actions as the configuration of security settings, setting and changing system properties, setting and changing permissions for authorized users and user groups, assigning and changing drive labels, scheduling processes to run at specific times, backing up the object repository, and enabling or disabling error logging.

Monitoring Features

165

Monitoring Studio KM for PATROL
Version 8.6.53

Method (summary)
Launch the WBEM Query Wizard Identify the host of the remote element, enter a namespace Enter the WBEM query and user credentials

Result
An icon representing the WBEM query appears in the console with two parameters: ReturnOutput and QueryStatus under it. You can now run String Searches and Extract Numeric Values from this output.

Create or edit a WBEM query analysis
To setup WBEM query analysis, right-click the Application/Container icon > KM Commands > New > WBEM Query analysis

W BEM Que ry A na ly s is W iza rd — W e lco m e Pa g e

To edit a WBEM query analysis, right-click the WBEM query icon > KM Commands > Edit.

Monitoring Features

166

Monitoring Features 167 . Name space: Enter the WBEM namespace. SSL creates a secure connection between a client and a server. By default. identify the host W BEM Que ry A na ly s is W iza rd — Ho s t Id e ntifica tio n Pa g e Hostname: Enter the host name or IP address Connect through port: Enter the port number you wish to use for the connection.Monitoring Studio KM for PATROL Version 8.53 Step 1: After launching the WBEM wizard. the port 5988 is used for non-encrypted data. WBEM Query: Enter your WBEM query Username and Password: Enter your credentials: username and password The v ariable used to specify the path to the jar file used to perform W BEM queries is: /MA SA I/SENTR Y8/ wbemJarPath Click Next. over which any amount of data can be sent securely. in standard environments. while port 5989 is used for0 encrypted data.6. A namespace is a logical group of related classes representing a specific technology or area of management (Ex: root\cimv2) Encrypt data using the HTTPS protocol: Select this option to encrypt the query with the HTTPS protocol. Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (http) based on the SSL (Secure Sockets Layer) protocol.

Monitoring Features 168 .indicating that they already hav e thresholds. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. on clicking F inish. and leave the default settings for the others. If y ou select Use default thresholds and customize them. and certain parameters for the instance may appear with an asterisk sy mbol .6. the Set Thresholds panel will appear.Monitoring Studio KM for PATROL Version 8.53 Step 2: Monitoring Studio settings W BEM Que ry A na ly s is W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this WBEM query object Object internal identifier (ID): PATROL internal identifier What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them.

6. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds. WBEM query analysis objects are instances of the SW_WBEM class. ReturnOutput. You can add numeric value extraction or string searches on this object. An icon labeled WBEM: [object name] will appear. and drive its improvement. Create a web farm monitoring To create a new web farm monitoring. and as a result no alerts will be triggered. with icons under it for QueryStatus.Monitoring Studio KM for PATROL Version 8. allowing you to use all the tools of the SW_HTTP_REQUESTS class to monitor your web-farms. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . Click Finish. You can then add a string or numeric value search if you wish. Monitoring Studio essentially groups HTTP requests all together. The biggest challenge is to successfully measure and monitor the web farm’s overall availability to determine its success.53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. One of the main goals of web farms is to assure availability of the web site. right-click the application icon in the PATROL Console and select KM Commands > New > Web farm monitoring… Monitoring Features 169 . Web-farm Monitoring Objective The aim of the Web farm tool is to ensure availability of your web farms by letting you know how many of your servers are responding with the correct web content.

6. you are asked to enter the URL to query and the type of HTTP request. select the type of HTTP request and specify desired output After the welcome panel of the Web farm monitoring wizard. Step 1: Enter the URL. You can add. but y ou can edit indiv idual hosts (web –requests) under this web farm. Monitoring Features 170 .Monitoring Studio KM for PATROL Version 8.53 W e b-Fa rm M o nito ring W iza rd — W e lco m e Pa g e Editing the webfarm instance is not feasible. edit and delete the hosts grouped under the webfarm icon at any time.

Some W eb forms can be passed to the serv er with the HTTP GET method. When this timeout is reached. If you choose this mode. Monitor Studio considers the host to be unreachable and triggers an alert on the ServerConnectionState parameter. From a Windows agent. The default is set to 30 seconds. php"> Timeout after: Enter the connection timeout period. A gain. The "GET" mode (HTTP GET method) is the standard way to query a Web page from a Web server. In such case.Monitoring Studio KM for PATROL Version 8. W hen posting a form to a W eb serv er. The "POST" mode (HTTP POST method) is classically used to post a form to a Web server and obtain the result of the processing of the form data. which may be different from the W eb page UR L that shows the form itself. y ou hav e to enter the UR L of the script/C GI/page that will actually process the data. A W eb form HTML source should contain a statement like the following one: < F O R M METHO D= "PO ST" A C TIO N= "/ urlToQ uery . HTTP Request type: Enter the HTTP request. it is possible to poll a secure web site by using the "https" method. y ou need to check the W eb form HTML source to identify the UR L to query . Monitoring Features 171 . php?v arA = v alueA &v arB= v alueB&… ).53 W e b R e q ue s t A na ly s is W iza rd — De finitio n Pa g e URL to query: Enter the URL of the web site that needs to be monitored. You must check the W eb form HTML source to know which method needs to be used (GET or PO ST). you must specify the variables and values to be transmitted to the Web server. there are two different modes: "GET" and "POST".6. the form data is passed through the UR L (http://serv er/form.

00. click to enter the proxy settings required to execute the HTTP request. HTTP authentication has nothing to do with an authentication sy stem of a W eb page with a form asking for user credentials like on Hotmail or Yahoo mail or any public webmail serv ice. A Web server that requires an HTTP authentication will result in the following dialog box in Internet Explorer: Monitoring Features 172 . Specify what should be shown in the ReturnOutput parameter: Select what you would like to retrieve from the Web page returned by the Web server: the entire HTTP response.5. HTTP Authentication Some Web applications request a user name and password in order to access resources available on the Web server.53 Proxy settings (optional): If your environment uses a proxy server. Port: Select the port number Web Server Authentication (optional): See section below on HTTP authentication for details.6. Monitoring Studio supports HTTP authentication. only the Web page (with HTML tags) or only the content text (no HTMP tags). Proxy server: Enter proxy server details. Starting with version 8. Authenticate as: Enter the user name as required by the HTTP server (see note below for more information) Password: Enter the password. The HTTP authentication is a login/password-based mechanism implemented in the HTTP protocol itself.Monitoring Studio KM for PATROL Version 8.

very easily decoded). Monitoring Studio only supports Basic HTTP authentication (password is sent in a base 64-encoded form. and not on the platform the W eb serv er is running on. Monitoring Studio supports Basic. Step 2-a: GET method . Monitoring Features 173 . On a Windows machine. you can enter up to 10 hosts that makeup the web-farm.entering Host information If the "GET" method is selected in the first panel. If you need to test a Web page or retrieve information from a Web server that requires HTTP Digest or NTLM authentication. i.53 HT T P a uthe ntica tio n There are 3 different HTTP authentication schemes: Basic (Windows.Monitoring Studio KM for PATROL Version 8. Digest and NTLM authentication schemes. we recommend that you install Monitoring Studio on a Windows system and set up the Web requests from this machine (Web requests can be sent to remote systems). UNIX.e. in this panel.6. On UNIX or Linux. the following panel comes up: W e b R e q ue s t A na ly s is W iza rd — GET M e tho d Info rm a tio n Pa g e Since a web-farm is composed of several servers. Linux) Digest (Windows) NTLM (Windows) Please note that this depends on where Monitoring Studio is running.

entering the variables to post If the "POST" method is selected in the first panel. right-click the web farm icon > KM commands > Add host. enter its name in the first box and its value in the second one. Step 3-b: POST method -entering Host information This is the same as for the GET method: Monitoring Features 174 . the following panel comes up: W e b R e q ue s t A na ly s is W iza rd — POST Va ria ble s De finitio n Pa g e Here. For each variable. up to eight variables to post can be entered.53 To add a host later. To edit or delete a host. right-click the host icon > KM commands > Edit host or Delete as the case may be.6. Step 2-b: POST method .Monitoring Studio KM for PATROL Version 8.

right-click the host icon > KM commands > Edit host or Delete as the case may be.Monitoring Studio KM for PATROL Version 8. in this panel. To add a host later. you can enter up to 10 hosts that makeup the web-farm. Monitoring Features 175 . To edit or delete a host.6.53 W e b R e q ue s t A na ly s is W iza rd — POST M e tho d Info rm a tio n Pa g e Since a web-farm is composed of several servers. right-click the web farm icon > KM commands > Add host.

What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. the Set Thresholds panel will appear. and leave the default settings for the others. and certain parameters for the instance may appear with an asterisk sy mbol . This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. and as a result no alerts will be triggered. Web-farm monitoring objects are instances of the SW_HTTP_WEBFARM class. but will not raise any alerts until you set thresholds. on clicking F inish.Monitoring Studio KM for PATROL Version 8. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. Object internal identifier (ID): PATROL internal identifier. If y ou select Use default thresholds and customize them. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .53 Last Step for GET & POST methods: Monitoring Studio settings W e b R e q ue s t A na ly s is W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this web-farm monitoring. Monitoring Features 176 . Monitoring Studio will poll the object and return the output of the polling.indicating that they already hav e thresholds. You can then customize (any /all) the thresholds of the parameters as per y our specific needs.6.

the next panel (shown below) asks you to enter the URL to query and the method to be used. Step 1: enter the URL. Monitoring Studio enables you to ensure that endusers actually see what they should see on their browser! Create or edit a Web Request analysis To create a new Web Request analysis. select the HTTP request type and specify desired output After the welcome panel of the wizard.send HTTP requests.53 Web Request Analysis Objective The aim of this HTTP request tool is to monitor your web-based applications . Monitoring Features 177 . right-click the Application/Container icon in the PATROL Console and select KM Commands > New > Web Request analysis… W e b R e q ue s t A na ly s is W iza rd — W e lco m e Pa g e To edit an existing Web Request analysis. etc.Monitoring Studio KM for PATROL Version 8. right-click the Web Request analysis icon in the PATROL Console and select KM Commands > Edit.6. post forms. parse the HTML page that is returned.

select your mode. When this timeout is Monitoring Features 178 . the form data goes through the UR L (http://serv er/form. y ou need to check the W eb form HTML source to identify the UR L to query . Some W eb forms can be passed to the serv er with the HTTP GET method. A W eb form HTML source should contain a statement like the following one: < F O R M METHO D= "PO ST" A C TIO N= "/ urlToQ uery .53 W e b R e q ue s t A na ly s is W iza rd — De finitio n Pa g e URL to query: Enter the URL of the web site that needs to be monitored. The "GET" mode (HTTP GET method) is the standard way to query a W eb page from a W eb serv er.Monitoring Studio KM for PATROL Version 8.6. The default is set to 30 seconds. y ou need to enter the UR L of the script/C GI/page that will actually process the data. You must check the Web form HTML source to know which method needs to be used (GET or POST). In this case. A gain. it is possible to poll a secure web site by using the "https" method. php?v arA = v alueA &v arB= v alueB&… ). To post a form to a W eb serv er. If y ou choose this mode y ou need to specify which v ariables with what v alues must be passed to the W eb serv er. which may be different from the W eb page UR L that shows the form itself. The "PO ST" mode (HTTP PO ST method) is classically used to post a form to a W eb serv er and obtain the result of the processing of the form data. php"> Timeout after: Enter the timeout period. HTTP Request type: There are two different modes: "GET" and "POST". From a Windows agent.

pstSelect what you would like to retrieve from the Web page returned by the Web server: the entire HTTP response. The HTTP authentication is a login/password-based mechanism implemented in the HTTP protocol itself. Click Next and you arrive at the last step of Monitoring Studio settings for this web request object. Proxy server: Enter proxy server details. Monitor Studio considers the host to be unreachable and triggers an alert on the ServerConnectionState parameter. C:\Documents and Settings\veronique\Local Settings\Application Data\Microsoft\Outlook\archive. Port: Select the port number Web Server Authentication: (optional) See section below on HTTP authentication for details. click to enter the proxy settings required to execute the HTTP request. A Web server that requires an HTTP authentication results in the following dialog box in Internet Explorer: Monitoring Features 179 . only the Web page (with HTML tags) or only the content text (no HTML tags). y ahoo.00. Authenticate as: enter the user name as required by the HTTP server (see note below for more information) Password: Enter the password.5. HTTP Authentication Some Web applications request a user name and password in order to access resources available on the Web server. HTTP authentication has nothing to do with an authentication sy stem of a W eb page with a form asking for user credentials like on www. Proxy settings (optional): If your environment uses a proxy server.53 reached. com or any public W ebmail serv ice.6. hotmail. Starting with version 8. Monitoring Studio supports HTTP authentication. com or www.Monitoring Studio KM for PATROL Version 8.

we recommend that you install Monitoring Studio on a Windows system and set up the Web requests from this machine (Web requests can be sent to remote systems). i. Linux) Digest (Windows) NTLM (Windows) Please note that this depends on where Monitoring Studio is running.Monitoring Studio KM for PATROL Version 8.6. If you need to test a Web page or retrieve information from a Web server that requires HTTP Digest or NTLM authentication. Monitoring Studio only supports Basic HTTP authentication (password is sent in a base64-encoded form. the following panel comes up: Monitoring Features 180 . Step 2: Entering the variables to post (POST method only) If the "POST" method is selected in the first panel.53 There are 3 different HTTP authentication schemes: Basic (Windows. Monitoring Studio supports Basic. When running on UNIX or Linux.e. When running on a Windows machine. UNIX. very easily decoded). and not on the platform the W eb serv er is running on. Digest and NTLM authentication schemes.

For each variable.53 W e b R e q ue s t A na ly s is W iza rd — Va ria ble s De finitio n Pa g e Here. enter its name in the first box and its value in the second one.6. The v ariable used to specify the path to the VB script used to perform web requests on W indows serv ers is: /MA SA I/ SENTR Y8/windowsW ebR equestScriptPath Click Next and you arrive at the last step of Monitoring Studio settings for this web request object Monitoring Features 181 . up to eight variables to post can be entered.Monitoring Studio KM for PATROL Version 8.

and certain parameters for the instance may appear with an asterisk sy mbol .indicating that they already hav e thresholds. on clicking F inish. the Set Thresholds panel will appear.6. Object internal identifier (ID): PATROL internal identifier of this monitored object.Monitoring Studio KM for PATROL Version 8.53 Last Step GET and POST methods: Monitoring Studio settings W e b R e q ue s t A na ly s is W iza rd — Se tting s Pa g e Object display name: Label that will be displayed in the PATROL Console for this web request monitoring. and leave the default settings for the others. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. If y ou select Use default thresholds and customize them. Monitoring Features 182 . What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them.

To edit an existing NT Event monitoring.. and as a result no alerts will be triggered. Monitoring Features 183 . Monitoring Studio will poll the object and return the output of the polling.. You can set alert thresholds and automatic acknowledgements for the events found. right-click the Windows Event icon in the PATROL Console and select KM Commands > Edit. Method (summary) Select the category of events you wish to monitor (ACEEventLog/application/internet explorer/ security/system) Identify the event Configure automatic acknowledgement and then set alert thresholds Result An icon representing the Windows event appears in the console under which are displayed the parameters MatchingEventRate and MatchingEventCount.6. right-click the Application/Container icon in the PATROL Console and select KM Commands > New > NT event monitoring. It also enables you to define automatic acknowledgment of previously triggered alerts by specifying the Windows event that will acknowledge the alert. Windows Event Monitoring Objective The aim of the Windows Events tool is to monitor events posted by your application with a view to consolidating the application monitoring under just one icon (and not have to additionally look up Windows EventLog). but will not raise any alerts until you set thresholds. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . Create or edit a Windows Create or edit a Windows event monitoring To create a new NT event.53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance.Monitoring Studio KM for PATROL Version 8. Web Request analysis objects are instances of the SW_HTTP_REQUESTS class.

the events shown in the dropdown list will depend on each system.53 Step 1: Selecting the Windows Event log to monitor W ind o ws Ev e nt M o nito ring W iza rd — W e lco m e Pa g e Select the Windows Event log to monitor: Application: Any event related to an application Security: Security events that are specified in the audit policy System: Any event related to the operating system Apart from the above three categories. Step 2: Identifying the Windows Event to monitor This panel is used to identify the Windows Event to monitor. Monitoring Features 184 .Monitoring Studio KM for PATROL Version 8.6.

" or a component of the system or of a large program such as a driver name. See the documentation of the NT Event you are monitoring for more information about these arguments. or Warning in the system and application logs. these are represented by a symbol.53 W ind o ws Ev e nt M o nito ring W iza rd — Ev e nt Id e ntifica tio n Pa g e Source: The software that logged the event.6. The argument number specifies where in the description the information should be found.Monitoring Studio KM for PATROL Version 8. The first line of the description of such an event is "The Event log service was started. For example. Information. Optional information: Arguments (insertion strings) that create a description of the NT Event. Success Audit or Failure Audit in the security log." The Event ID and the Source can be used by product support representatives to troubleshoot system problems. In the Event Viewer normal list view. "Elnkii" indicates an EtherLink II driver. Up to two Monitoring Features 185 . Example 6005 is the ID of the event that occurs when the Event log service is started. which can be either a program name such as "SQL Server. Enter the searched Windows Event ID: A number identifying the particular event type. The first line of the description usually contains the name of the event type. Windows Event Types to monitor: A classification of the event severity: Error.

53 arguments can be chosen and it is possible to indicate whether the information entered in the text bound is to be found within the argument ("must contain") or actually indicates the entire argument ("must exactly be"). If y ou are unsure about the characteristics of the W indows ev ent y ou want to detect. right-click on the main Monitoring Studio icon > KM commands > Tools > W indows Ev entLog R eader. acknowledging the alert. This can be done in the following two cases: Acknowledge alert(s)if the following timeout is reached: A timeout since the last found matching Event Acknowledge alert(s)if the following NT Event is found: Specify the Windows Event Monitoring Features 186 . including their arguments (insertion strings).6.Monitoring Studio KM for PATROL Version 8.. y ou will need to use the Monitoring Studio built-in W indows Ev entLog R eader tool to v iew content of the Ev entLogs and the characteristics of the ev ents. Case sensitive: Indicates whether or not the search for the Argument that is to be found within the Windows Event description will be case sensitive. Step 3: Automatic acknowledgement configuration The automatic acknowledging feature allows you to reset the MatchingEventCount parameter to zero and its status to 'normal' – thereby.

previously triggered by this Windows Event monitoring: All the previous alerts are acknowledged in one action and the MatchingEventCount parameter is reset.6.53 W ind o ws Ev e nt M o nito ring W iza rd — A le rt A ck no wle d g e m e nt De finitio n Pa g e When this occurs. Object internal identifier (ID): PATROL internal identifier. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 187 . Acknowledge only one alert triggered by this NT Event search: Just one alert should be acknowledged (the MatchingEventCount parameter is thus decreased by one).Monitoring Studio KM for PATROL Version 8. Click Next and you arrive at the last panel with the Monitoring Studio settings. you can specify whether to: Acknowledge all alerts. Step 4: Monitoring Studio settings W ind o ws Ev e nt M o nito ring W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this Windows Event monitoring.

but others will only be accessible if the associated software has been installed.6. A Windows performance is defined by a performance object name and a counter name. threads.Monitoring Studio KM for PATROL Version 8. typically corresponding to the major hardware components. Alerts can be set to provide immediate notification in case one of the parameters you are monitoring is above or below a given range. Here are some definitions of the items as described by Microsoft: Monitoring Features 188 . and certain parameters for the instance may appear with an asterisk sy mbol . memory. but will not raise any alerts until you set thresholds. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. on clicking F inish. important to the proper functioning of your applications. Furthermore. processes. The data gathered by the Windows performances about specific components can be used to identify problems and bottlenecks within your application and plan ahead for your future needs. and leave the default settings for the others.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. with each one having an associate set of counters and possibly instances.. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. within your PATROL environment. Monitoring Studio will poll the object and return the output of the polling. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . the Set Thresholds panel will appear. If y ou select Use default thresholds and customize them.indicating that they already hav e thresholds. Some objects are built into the system. Windows Performance Monitoring Objective The aim of this tool is to incorporate Windows performance data. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. and as a result no alerts will be triggered. each performance counter contains a unique set of counters and instances. Performance monitor collects information about objects on your Windows NT/2000/2003 computer and measures them. Theses objects can be processors. Windows Event monitoring objects are instances of the SW_NTEVENTS class. as well as anything from none to several instances. etc.

6. process. a Windows performance counter is composed of two or three items: A performance object A counter Anywhere from none to several instances Since counters and instances are specific to a Windows performance object. objects. right-click the Windows Performance monitoring icon in the PATROL Console and select KM Commands > Edit. paging file. Create or edit a Windows Performance monitoring To create a Windows Performance monitoring. In the latter case.53 Performance object: A logical collection of counters that is associated with a resource or service that can be monitored. memory. Counter: A value corresponding to a particular aspect of the performance defined for the performance object. Monitoring Features 189 . server.Monitoring Studio KM for PATROL Version 8. If an object has several instances. Step 1: Selecting the Windows Performance object As explained above. the first thing you have to do is select an object from the list of available performances on your system. average or total value of the instances. processor. you can choose to monitor the minimum. Instance: A term used to distinguish between multiple performance objects of the same type on a computer. physical disk. it is possible to monitor them either individually or all at once. right-click the Application/Container icon in the PATROL Console and select KM Commands > New > Windows Performance monitoring. To edit an existing Windows Performance monitoring.. maximum. system and thread. The objects that are typically installed on a system are: cache..

To do so. type "1024" in the field for scale.53 W ind o ws Pe rfo rm a nce M o nito ring W iza rd — W e lco m e Pa g e Step 2: Counter and instances W ind o ws Pe rfo rm a nce M o nito ring W iza rd — De finitio n Pa g e This panel is displayed if one or more instances of the selected Windows Performance is found. Select one or more instances: This list displays the selected Windows Performance object instances.: the committed memory is expressed in bytes.6.Monitoring Studio KM for PATROL Version 8. Select the one you wish to monitor Scale: A scale can be used to divide the Windows performance value by this number.g. Otherwise. The radio buttons at the bottom of the panel can be used to select the creation mode of the Windows performance PATROL object instance: Monitoring Features 190 . PATROL object creation and type of value obtained: This is only relevant if more than one instance is selected. a much simpler panel is shown displaying only the list of counters and the scale. so. Select a counter: The counters available for the selected Windows Performance object are listed here. enter the number you wish the value to be divided by (e. Select which one(s) you wish to monitor from the list. the scale value is 1 (no scale). to obtain the value in mega-bytes (MB). By default.

What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 191 . Step 3: Monitoring Studio settings W ind o ws Pe rfo rm a nce M o nito ring W iza rd — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this Windows Performance monitoring.Monitoring Studio KM for PATROL Version 8. Use maximum value of all selected instances for selected counter: The maximum value of the different selected instances will be monitored. Calculate total value of all selected instances for selected counter: The value of each selected instance is added so the total value of all selected instances will be monitored.53 Create one PATROL object per instance: All selected instances will have their own PATROL object and will be monitored separately. Group all selected instances into one PATROL object: All selected instances are grouped into one PATROL object and are monitored all together.6. Use minimum value of all selected instances for selected counter: The minimum value of the different selected instances will be monitored. So the average value of all the selected instances will be monitored. you must choose one of the following: Calculate average of all selected instances for selected counter: Each value will be added then divided by the number of instances. If you select this option. Object internal identifier (ID): PATROL internal identifier.

but will not raise any alerts until you set thresholds. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance.. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. and leave the default settings for the others. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . This function is only available for agents running on Windows systems. on clicking F inish. Create or edit a Windows service monitoring To create a new windows service monitoring. Monitoring Features 192 . Monitoring Studio will poll the object and return the output of the polling.. certain parameters for the instance may appear with an asterisk sy mbol .53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. Windows Service Monitoring Objective The aim of this tool is to consolidate the monitoring of the Windows services needed by your application under a single icon. If y ou select Use default thresholds and customize them.6. the Set Thresholds panel will appear.Monitoring Studio KM for PATROL Version 8.indicating that they already hav e thresholds. right-click the application icon in the PATROL Console and select KM Commands > New > Windows Service Monitoring. Windows Performance counter monitoring objects are instances of the SW_NTPERFORMANCE class. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. and as a result no alerts will be triggered.

Step 1a: Selecting the Windows Service to monitor If you have selected the Select a service from the existing list of service option at the previous step.Monitoring Studio KM for PATROL Version 8. Monitoring Features 193 . Select one of the two available options: Select a service from the existing list of services: To display a list of services currently installed services from which you can select the service you wish to monitor Enter manually the short name of a service: To enter manually the short name of a Windows service that is not currently installed on the managed system. right-click the Windows service icon in the PATROL Console and select KM Commands > Edit.6. Select the Windows Service you wish to monitor and click Next. Monitoring Studio builds and displays a list of services currently installed on the server. To edit an existing Windows service monitoring.53 W ind o ws Se rv ice M o nito ring W iza rd — W e lco m e Pa g e Monitoring Studio allows you to select a service from a list or to enter a service name manually.

Monitoring Studio lets you type the service name.6. Make sure to use the Service Short Name which is one of the two names that can identify a service and which is how the service configuration is stored in the registry. Monitoring Features 194 .Monitoring Studio KM for PATROL Version 8.53 W ind o ws Se rv ice M o nito ring W iza rd — Se rv ice Se le ctio n Pa g e Step 1b: Entering Manually the Windows Service Name to monitor If you have selected the Enter manually the short name of a service option at the previous step.

Monitoring Studio KM for PATROL Version 8.6.53 Click Next to continue. Step 2: Monitoring Studio settings W ind o ws Se rv ice M o nito ring W iza rd — Se tting s Pa g e Monitoring Features 195 .

Monitoring Studio will poll the object and return the output of the polling. printers) and service oriented networks.53 Object display name: Label displayed in the PATROL Console for this Windows Services monitoring. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them.Monitoring Studio KM for PATROL Version 8. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. JMX Java MBean Polling (JMX) Objective The aim of the JavaMBean Polling (JMX) tool is to enable JMX polling to access and monitor the following MBean application servers: JBoss JOnAS BEA WebLogic IBM WebSphere Generic JMX client Java Management Extensions (JMX) a trademark of Sun Microsystems. Those resources are represented by objects called MBeans (for Managed Bean). and leave the default settings for the others.g. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . Monitoring Features 196 . but will not raise any alerts until you set thresholds. Windows Service monitoring objects are instances of the SW_NTSERVICES class. If y ou select Use default thresholds and customize them. system objects.indicating that they already hav e thresholds. is a Java technology that supplies tools for managing and monitoring applications. and as a result no alerts will be triggered. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. and certain parameters for the instance may appear with an asterisk sy mbol .6. the Set Thresholds panel will appear. Object internal identifier (ID): PATROL internal identifier. devices (e. on clicking F inish.

An MBean server implements the interface javax. An MBean is nothing but a java object that represents a manageable resource. such as an application. but instead access them through the MBean server with their unique ObjectName. modular and dynamic solutions for managing and monitoring devices. while an adaptor adapts the API to another protocol (SNMP) or to Web-based GUI (HTML/HTTP.6. The Agent level: the MBeanServer is the core of JMX. Applications do not access MBeans directly. IIOP.management. JMX is based on 3-level architecture: The Probe level: contains the probes (called MBeans) instrumenting the resources.Monitoring Studio KM for PATROL Version 8. applications. providing the MBean's ObjectName and the attribute name as parameters. MBeans and Platform MBean Servers An MBean server is a repository of MBeans that provides management applications access to MBeans.53 JMX Architecture Java Management Extensions (JMX) technology provides the tools for building distributed. MBeanServer Monitoring Studio and MBeans With the JMX polling feature of Monitoring Studio. It is an intermediary between the MBean and the applications. The Remote Management level: enables remote applications to access the MBeanServer through Connectors and Adaptors. JMS. WS-*. Starting with J2SE 5. WML/HTTP…) Applications can be generic consoles (such as JConsole and MC4J). For example you could represent your laptop as an MBean and then "monitor" it. In this method. Web-based.0. JMX technology is included in Java SE. A connector provides full remote access to the MBeanServer API using various communication frameworks such as RMI. a service. a component. you can easily monitor the above-mentioned application servers and consolidate the monitoring of these MBeanServers along with the application monitoring under a single icon. You need no longer interrogate the various application servers through their respective interfaces just to view the status of the MBeans. and service-driven networks. It is also known as the instrumentation level. or domain-specific (monitoring) applications. you use the getAttribute () method of MBeanServerConnection to get an attribute of a platform MBean. or a device. Monitoring Features 197 . connecting to the platform MBeanServer of a running JVM. A management application can access platform MBeans in different ways: Using ManagementFactory Using and MXBean Proxy Using MBean ServerConnection Monitoring Studio uses the MBeanServerConnection method.

The abov e-mentioned instructions giv e an ov erv iew of the procedure to poll a JMX serv er.6. Method (summary) To setup the monitoring and consolidate the querying of resources represented by Mbeans within your PATROL environment. O nce a JMX polling is configured. Enter the connection account credentials: principle(username) and credentials (password) 6. Right-click the main Monitoring Studio icon > KM Commands > New > Java MBean polling (JMX) 2. Enter the server connection information: host name and the port number 4. 9. You can add a string or numeric value search if you wish. ensure that all the settings are accurate. If the credentials entered are correct. This way . all you need to do is go through the JMX wizard of Monitoring Studio. Select the attribute from the list and click Next. Click Next. You can also consult the Input v ariables for JMX polling wizards section to know what input is required for which ty pe of application serv er.53 Monitoring Studio can only poll the application serv ers and display the MBeans attributes and v alues. 3. To monitor several attributes of the same key property. y ou do not hav e to re-enter the configuration settings each time. you are required to go through the wizard each time. Please refer to the section on a specific application serv er for ex act details and procedure. y ou are required to do so using the specific application serv er interface. 1.Monitoring Studio KM for PATROL Version 8. 11. The wizard panels differ for each type of JMX application server. Select the domain to monitor and click Next. select the environment: JBoss/WebLogic/WebSphere/generic JMX client. 7. From the drop-down list. Click Finish. 10. To create and register new MBeans or modify ex isting ones. Select the key property to monitor from this domain and click Next. 8. Monitoring Studio uses that JMX Polling configuration by default whenev er y ou add a new Jav a MBean Polling. You can only select one attribute a time. the following is just a summary of the overall method. Monitoring Features 198 . Monitoring Studio connects to the application server and presents a list of domains for you to select from. Enter the additional information: initial context factory and JNDI name 5.

jmx remote.Monitoring Studio KM for PATROL Version 8. management. port= portNumber Using the abov e option starts a dedicated JMX agent for this particular application.6. right-click the main Monitoring Studio icon > KM Commands > New > Java MBean polling (JMX) and select the environment Generic from the dropdown list: J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — W e lco m e Pa g e The application serv er should be started with the option: -Dcom. sun. Monitoring Features 199 .53 Generic JMX client using RMI or IIOP Protocols To set-up the monitoring of a generic JMX client. The Monitoring Studio generic JMX client needs to use this port number to establish a connection.

6. If y ou use the protocol R MI the default serv er name is “jmx rmi” and if y ou use the IIO P protocol then the default serv er name is “jmx iiop”. Monitoring Features 200 .53 Step 1: Enter the generic environment connection information J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — Co nne ctio n Info rm a tio n Pa g e Host: Name of host server where the generic JMX application server is installed. Server name: Enter the server name Protocol: Select the relevant protocol: RMI / IIOP The Monitoring Studio generic client connects to the JMX agent using the protocol R MI or IIO P. Port: Enter the port number.Monitoring Studio KM for PATROL Version 8.

Select the domain to monitor and click Next.6. Monitor Studio considers the host to be unreachable and triggers an alert on the ExecutionStatus parameter. Monitoring Studio connects to the application server and presents a list of domains for you to select from.53 Step 2: Enter the connection account credentials: J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — Co nne ctio n A cco unt Cre d e ntia ls Pa g e Principle: Enter the username Credentials: Enter the password Path to Java on the local server: Enter your java home path and ensure that all the settings are correct. Connection timeout period: Default is set to 120 seconds.Monitoring Studio KM for PATROL Version 8. When this timeout is reached. Monitoring Features 201 . Step 3: Select domain If the credentials entered are correct. Click Next. you can change this if you wish.

6.53 J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — Do m a in Se le ctio n Pa g e Step 4: Select the key property J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — Ke y Pro p e rty Pa g e Select the key property to monitor in this domain and click Next.Monitoring Studio KM for PATROL Version 8. Monitoring Features 202 .

number) at the previous step.Monitoring Studio KM for PATROL Version 8. DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of seconds elapsed between the collection times Monitoring Features 203 . Step 5a: Select parameters to collect When you select a numeric attribute (boolean.53 Step 5: Select the attribute J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — A ttribute Se le ctio n Pa g e Select the attribute to monitor and click Next. J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — Pa ra m e te rs Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Delta: Calculates the difference between values collected during two consecutive polling. You can only select one attribute at a time. you are required to go through the wizard each time. To monitor several attributes of the same key property. an additional panel is displayed to allow you to select the parameters to collect. integer.6.

The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes.6. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 204 . Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console. Step 6: Monitoring Studio settings You arrive at the final step of the wizard that displays the object display name.Monitoring Studio KM for PATROL Version 8. J a v a M Be a n Po lling W iza rd (Ge ne ric Env iro nm e nt) — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this generic JMX application monitoring. Object internal identifier (ID): PATROL internal identifier.53 Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph. ID and threshold options. you would divide the values by 1048576 (1024*1024). In such a case.

but will not raise any alerts until you set thresholds.Monitoring Studio KM for PATROL Version 8. the Set Thresholds panel will appear. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. If y ou select Use default thresholds and customize them. and at the next collect you will see values for the newly monitored object. Input variables for JMX polling Wizards Here is a recapitulative table with the input variables required to connect to the various JMX application servers. You can add a string or numeric value search if you wish. (1099 by default). and as a result no alerts will be triggered.interfaces (by default). Do not set any thresholds for now: No thresholds will be set on any parameter of the instance.jnp.indicating that they already hav e thresholds.jboss. certain parameters for the instance may appear with an asterisk sy mbol . and leave the default settings for the others.naming:org. Generic JMX application objects are instances of the SW_JMX class. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . Click Finish. on clicking F inish.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. Can be modified Additional information Monitoring Features 205 . Can be modified Connection Account Principle: Username Credentials: Password Path to Java on the local server: java home path JOnAS Connection Information Host: Name of host server where the JOnAs application server is installed Port: Port number.6. An icon for the monitored instance will appear under the main Monitoring Studio icon bearing the name entered/displayed in the PATROL Label field.interfaces. This is linked to the protocol used. Can be modified Additional information Initial context factory: org.NamingContextFactory by default. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. (By default: 1099). JMX Application Server JBoss by Redhat Input Variables Connection Information Host: Name of host server where the JBoss application server is installed Port: JBoss port number. Can be modified URL package prefixes: org. Monitoring Studio will poll the object and return the output of the polling.jnp.

domainruntime (by default).sun. These files are profile-specific and are created and stored by W ebSphere under % IBM_HO ME% \profile\profilename\etc.jks KeyStore password: Enter the password created on WebSphere for your profile (default WebAS) Server name: Name of the WebSphere application server. or. jks.registry. Can be modified Additional information Initial context factory: weblogic.jndi. To connect to the W ebSphere A S.jndi.mbeanservers. Connection Account Principle: Username Credentials: Password Path to Java on the local server: java home path Monitoring Features 206 .6. copy them from there to y our local file-sy stem.53 JMX Application Server Input Variables Server name: Name given to the JOnAS application server Initial context factory: com.jonas.WLInitialContextFactory (by default) Can be modified For WebLogic 9. (By default: 7001). TrustStore password: Enter the password created on WebSphere for your profile (default WebAS) KeyStoreFile path: Enter the path to the file ClientKeyFile. jks and C lientTrustF ile. Node name: Enter node name allotted to your profile.naming (by default) Can be modified Connection Account Principle: Username Credentials: Password Path to Java on the local server: java home path BEA WebLogic Connection Information Host: Name of host server where the WebLogic application server is installed Port: Port number.jks. This can be modified. The first profile created on WebSphere is by default given the number 8880 and every profile created on WebSphere is allotted a new SOAP port number by increasing the count from 8880.x JNDI: weblogic. Depending on the security of y our env ironment.objectweb.management.RegistryContextFactory (by default).rmi.Monitoring Studio KM for PATROL Version 8. Can be modified URL package prefixes: org. either giv e the path to these files to where the W ebSphere A S resides. TrustStoreFile path: Enter the path to the file ClientTrustFile. it is essential to connect to certain credential files: C lientKey F ile.x Server name: Name given to WebLogic application server Connection Account Principle: Username Credentials: Password Path to Java on the local server: java home path IBM WebSphere Connection Information Host: Name of host server where the WebSphere application server is installed SOAP port: Enter port number. Can be modified For WebLogic 8. By default WebSphere assigns a unique node name to each profile created.

x or 4.Monitoring Studio KM for PATROL Version 8.53 JMX Application Server Generic JMX applications Input Variables Connection Information Host: Name of host server where the generic JMX application server is installed Port: Enter port number Generic environment additional information Server name: Name of generic server Protocol: Name of protocol The Monitoring Studio generic client connects to the JMX agent using the protocol R MI or IIO P. Microsoft Windows.management.jmxremote. right-click the main Monitoring Studio icon > KM Commands > New > Java MBean polling (JMX) and from the drop-down list.2. Monitoring Features 207 .x. If y ou use the protocol R MI the default serv er name is “jmx rmi” and if y ou use the IIO P protocol then the default serv er name is “jmx iiop”. HP-UX. The Monitoring Studio generic JMX client needs to use this port number to establish a connection. Connection Account Principle: Username Credentials: Password Path to Java on the local server: java home path The application server should be started with the option: Dcom. including Red Hat Enterprise Linux. Sun Solaris. select the environment: JBoss 3.port=portNumber Using this option starts a dedicated JMX agent for this particular application.sun. As the JBoss Application Server is 100% pure Java. JBoss JBoss is an open source Java EE-based application server implemented in Java. SUSE Linux.6. and others. To monitor your JBoss AS within your PATROL environment. it is interoperable with most operating systems that are capable of running a Java Virtual Machine (JVM).

Can be modified JBoss additional information: Monitoring Features 208 .Monitoring Studio KM for PATROL Version 8.53 J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — W e lco m e Pa g e Step 1: Enter the server connection information and the additional information J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — Co nne ctio n Info rm a tio n Pa g e JBoss connection information: Host: Name of host server where the JBoss application server is installed Port: JBoss port number. (1099 by default).6.

jnp. Can be modified URL package prefixes: org. When this timeout is reached.Monitoring Studio KM for PATROL Version 8. If the credentials entered are correct. Monitor Studio considers the host to be unreachable and triggers an alert on the ExecutionStatus parameter.jboss.naming:org.53 Initial context factory: org.6. you can change this if you wish. Monitoring Studio connects to the application server and presents a list of domains for you to select from. Connection timeout period: Default is set to 120 seconds.interfaces. Click Next.NamingContextFactory (by default).interfaces (by default) Can be modified Step 2: Enter the connection account credentials J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — Co nne ctio n A cco unt Cre d e ntia ls Pa g e Connection account: Principle: Enter the username Credentials: Enter the password Path to Java on the local server: Enter your java home path and ensure that all the settings are correct.jnp. You can choose to execute additional JAR files by clicking the External JAR files button and enter the JAR files names and locations. Monitoring Features 209 .

Monitoring Studio KM for PATROL Version 8. Monitoring Features 210 .6.53 Step 3: Select the domain J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — Do m a in Se le ctio n Pa g e Select the domain to monitor and click Next.

Step 5: Select the attribute J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — A ttribute Se le ctio n Pa g e Monitoring Features 211 .Monitoring Studio KM for PATROL Version 8.53 Step 4: Select the key property J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — Ke y Pro p e rty Pa g e Select the key property to monitor from this domain and click Next.6.

number) at the previous step. You can only select one attribute at a time. you are required to go through the wizard for each attribute. Step 5a: Select parameters to collect When you select a numeric attribute (boolean. an additional panel is displayed to allow you to select the parameters to collect. DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of seconds elapsed between the collection times Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph. integer. Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console. J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — Pa ra m e te rs Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Delta: Calculates the difference between values collected during two consecutive polling.6.Monitoring Studio KM for PATROL Version 8. The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor Monitoring Features 212 . To monitor several attributes of the same key property.53 Select the attribute from the list and click Next.

Monitoring Studio KM for PATROL Version 8. on clicking F inish. you would divide the values by 1048576 (1024*1024). What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. Step 6: Monitoring Studio settings J a v a M Be a n Po lling W iza rd (J Bo s s Env iro nm e nt) — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this JBoss monitoring.6. Object internal identifier (ID): PATROL internal identifier. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance.indicating that they already hav e thresholds. If y ou select Use default thresholds and customize them. In such a case. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. and leave the default settings for the others. certain parameters for the instance may appear with an asterisk sy mbol .53 This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes. the Set Thresholds panel will appear. Monitoring Features 213 .

right-click the main Monitoring Studio icon > KM Commands > New > Java MBean polling (JMX) and from the drop-down list. WebSphere IBM® WebSphere Application Server is the foundation of the IBM WebSphere software platform. y ou need to download the W ebSphere. JBoss objects are instances of the SW_JMX class. To monitor a WebSphere application server within your PATROL environment: Before setting-up the monitoring of a W ebSphere A S. These files are essential in order to connect to y our W ebSphere A S through Monitoring Studio. but will not raise any alerts until you set thresholds. integrate and manage dynamic On Demand Business™ applications. Monitoring Studio will poll the object and return the output of the polling. x . select the environment: WebSphere 5.6. After ensuring that the required files are present on the local host. run. x are different from those for W ebSphere 6. and at the next collect you will see values for the newly monitored object. The files for W ebSphere 5. Monitoring Features 214 . so please ensure y ou download the correct files from the Sentry Software website. You can add a string or numeric value search if you wish. jar files created to work with Monitoring Studio from the Sentry Software website and store them in (% Patrol_Home% \bin).53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. 6.Monitoring Studio KM for PATROL Version 8. As the premier Java™ 2 Enterprise Edition (J2EE™) and Web services application platform. An icon for the monitored instance will appear in the Console bearing the name entered/ displayed in the PATROL Label field. Click Finish. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .x or 7. WebSphere Application Server delivers a high performance transaction engine that can help you build.x. and as a result no alerts will be triggered. and a key building block for a Service Oriented Architecture (SOA).x.

Monitoring Features 215 . x requires Sun JVM 1. Please ensure y ou hav e the right jav a v irtual machine depending on the v ersion of y our W ebSphere application serv ers. x : The main difference between the 5.53 J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — W e lco m e Pa g e Difference in connecting to 5. x v ersions is that W ebSphere 5. x v ersus 6.6.Monitoring Studio KM for PATROL Version 8. x and 6. 5 and abov e. x requires IBM JVM whereas W ebSphere 6.

or.Monitoring Studio KM for PATROL Version 8. These files are profile-specific and are created and stored by W ebSphere under % IBM_HO ME% \profile\profilename\etc. TrustStore password: Enter the password created on WebSphere for your profile (default WebAS) KeyStoreFile path: Enter the path to the file ClientKeyFile. Depending on the security of y our env ironment. The first profile created on WebSphere is by default given the number 8880 and every profile created on WebSphere is allotted a new SOAP port number by increasing the count from 8880. To connect to the W ebSphere A S. TrustStoreFile path: Enter the path to the file ClientTrustFile.53 Step 1: Enter the environment connection information and the additional information J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — Co nne ctio n Info rm a tio n Pa g e Host: Name of host server where the WebSphere application server is installed SOAP Port: Enter port number.jks KeyStore password: Enter the password created on WebSphere for your profile (default WebAS) Monitoring Features 216 . jks and C lientTrustF ile. This can be modified. jks. y ou can either giv e the path to these files on where the W ebSphere A S resides.jks. it is essential to connect to certain credential files: C lientKey F ile.6. just copy them from there to y our local file-sy stem.

Monitoring Studio KM for PATROL Version 8. Step 2: Enter the connection account credentials J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — Co nne ctio n A cco unt Cre d e ntia ls Pa g e Principle: Enter the username Credentials: Enter the password Path to Java on the local server: Enter your java home path and ensure that all the settings are correct. Node name: Enter node name allotted to your profile. you can change this if you wish.6. Click Next. Monitoring Monitoring Features 217 . If the credentials entered are correct. Ensure that all the settings are correct.53 Server name: Name of the WebSphere application server. Monitor Studio considers the host to be unreachable and triggers an alert on the ExecutionStatus parameter. Click Next. By default WebSphere assigns a unique node name to each profile created. When this timeout is reached. Connection timeout period: Default is set to 120 seconds.

6.Monitoring Studio KM for PATROL Version 8. Step 4: Select the key property J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — Ke y Pro p e rty Pa g e Select the key property to monitor from this domain and click Next.53 Studio connects to the application server and presents a list of domains for you to select from. Monitoring Features 218 . Step 3: Select the domain J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — Do m a in Se le ctio n Pa g e Select the domain to monitor and click Next.

Monitoring Studio KM for PATROL Version 8. You can only select one attribute at a time. J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — Pa ra m e te rs Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Monitoring Features 219 . an additional panel is displayed to allow you to select the parameters to collect. To monitor several attributes of the same key property. number) at the previous step.6.53 Step 5: Select the attribute J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — A ttribute Se le ctio n Pa g e Select the attribute from the list and click Next. Step 5a: Select parameters to collect When you select a numeric attribute (boolean. you are required to go through the wizard each time. integer.

Object internal identifier (ID): PATROL internal identifier.Monitoring Studio KM for PATROL Version 8. DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of seconds elapsed between the collection times Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph.53 Delta: Calculates the difference between values collected during two consecutive polling. Step 6: Monitoring Studio settings J a v a M Be a n Po lling W iza rd (W e bSp he re Env iro nm e nt) — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this WebSphere monitoring.6. The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes. Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console. you would divide the values by 1048576 (1024*1024). What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 220 . In such a case.

Monitoring Studio will poll the object and return the output of the polling. An icon for the monitored instance will appear under the main Monitoring Studio icon bearing the name entered/displayed in the Object display name field. and as a result no alerts will be triggered. Monitoring Features 221 . JOnAs JOnAS is a leading edge Open Source implementation by OW2 of the Java EE specification. Monitoring Studio KM for PA TR O L requires applications classes av ailable only with JVM 1. the Set Thresholds panel will appear. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. and leave the default settings for the others. Click Finish.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. To monitor your JOnAs application server within your PATROL environment. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. select the environment: JOnAs 4.Monitoring Studio KM for PATROL Version 8. WebSphere objects are instances of the SW_JMX class. You can add a string or numeric value search if you wish. 5.indicating that they already hav e thresholds. on clicking F inish. If y ou select Use default thresholds and customize them. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. Prev ious v ersions of JVM are not supported. and at the next collect you will see values for the newly monitored object. right-click the main Monitoring Studio icon > KM Commands > New > Java MBean polling (JMX). certain parameters for the instance may appear with an asterisk sy mbol .x. From the dropdown list. but will not raise any alerts until you set thresholds.6.

Monitoring Studio KM for PATROL Version 8.53 J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — W e lco m e Pa g e Step 1: Enter the server connection information and the additional information J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — Co nne ctio n Info rm a tio n Pa g e Host: Name of host server where the JOnAS application server is installed Monitoring Features 222 .6.

53 Port: Port number.sun. Connection timeout period: Default is set to 120 seconds.6. Step 2: Enter the connection account credentials J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — Co nne ctio n A cco unt Cre d e ntia ls Pa g e Principle: Enter the username Credentials: Enter the password Path to Java on the local server: Enter your java home path and ensure that all the settings are correct. The protocol & the port number to be used is defined in the "carol.properties" file that can be found in %jonas_home%/conf Initial context factory: com.objectweb.naming (by default). (By default: 1099).jndi. Can be modified. you can change this if you wish.registry. This is linked to the protocol used. Can be modified Server name: Name given to Jonas application server Protocol: JRMP or IIOP.rmi. When this Monitoring Features 223 .Monitoring Studio KM for PATROL Version 8. Can be modified URL package prefixes: org.RegistryContextFactory (by default.jonas.

Monitor Studio considers the host to be unreachable and triggers an alert on the ExecutionStatus parameter.53 timeout is reached. If the credentials entered are correct. Monitoring Features 224 . Click Next.Monitoring Studio KM for PATROL Version 8. Monitoring Studio connects to the application server and presents a list of domains for you to select from. Step 3: Select the domain J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — Do m a in Se le ctio n Pa g e Select the domain to monitor and click Next.6.

You can only select one attribute at a time.53 Step 4: Select the key property J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — Ke y Pro p e rty Pa g e Select the key property to monitor from this domain and click Next.Monitoring Studio KM for PATROL Version 8. you are required to go through the wizard each time. Monitoring Features 225 . Step 5: Select the attribute J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — A ttribute Se le ctio n Pa g e Select the attribute from the list and click Next.6. To monitor several attributes of the same key property.

53 Step 5a: Select parameters to collect When you select a numeric attribute (boolean.Monitoring Studio KM for PATROL Version 8. DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of seconds elapsed between the collection times Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph. an additional panel is displayed to allow you to select the parameters to collect. number) at the previous step. J a v a M Be a n Po lling W iza rd (J OnA S Env iro nm e nt) — Pa ra m e te rs Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Delta: Calculates the difference between values collected during two consecutive polling.6. integer. Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console. The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor Monitoring Features 226 .

certain parameters for the instance may appear with an asterisk sy mbol . In such a case. Step 6: Monitoring Studio settings J a v a M Be a n Po lling W iza rd (J OnA s Env iro nm e nt) — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this JonAS monitoring. If y ou select Use default thresholds and customize them.Monitoring Studio KM for PATROL Version 8. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. and leave the default settings for the others. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. you would divide the values by 1048576 (1024*1024).53 This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes. on clicking F inish. This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. the Set Thresholds panel will appear.indicating that they already hav e thresholds. Object internal identifier (ID): PATROL internal identifier.6. Monitoring Features 227 .

WebLogic Tuxedo.53 Do not set any thresholds for now: No thresholds will be set on any parameter of the instance. You can add a string or numeric value search if you wish. an Enterprise Portal . but will not raise any alerts until you set thresholds. WebLogic BEA WebLogic is a J2EE Platform product family that includes a J2EE application server.WebLogic Communication Platform and also an HTTP web server for Unix. select the environment: WebLogic "x" Monitoring Features 228 . An icon for the monitored instance will appear under the main Monitoring Studio icon bearing the name entered/displayed in the Object display name field. 4. therefore to run and poll W ebLogic 8. No other JVM v ersion will be able to run W ebLogic 8. x . Linux. x are different from those required for W ebLogic 8. To monitor your WebLogic application server within your PATROL environment. JOnAS client objects are instances of the SW_JMX class. Monitoring Studio will poll the object and return the output of the polling.WebLogic Server. 5 and abov e to connect to this serv er. y ou need to run JVM v 1. x was created using JDK v 1. The files required by W ebLogic9. and more. 4. a Telecommunication Platform .Monitoring Studio KM for PATROL Version 8. x was created using the JDK v 1. W ebLogic v 8. x . you first need to download certain WebLogic JAR files/zipped files from the Sentry Software download page and place them into: %PATROL_home%/bin. 5. and at the next collect you will see values for the newly monitored object. Right-click the main Monitoring Studio icon > KM Commands > New > Java MBean polling (JMX) From the drop-down list. Click Finish.6. Please ensure y ou download the correct files corresponding to y our W ebLogic serv er v ersion. an Enterprise Application Integration platform. Microsoft Windows.WebLogic Portal. y ou need JVM v 1. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s . a Transaction Server and Infrastructure . and as a result no alerts will be triggered. x . W ebLogic v 9.

Can be modified Monitoring Features 229 .Monitoring Studio KM for PATROL Version 8. Port: Port number.53 J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — W e lco m e Pa g e Step 1: Enter the server connection information and the additional information J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — Co nne ctio n Info rm a tio n Pa g e Host: Name of host server where the WebLogic application server is installed.6. (By default: 7001).

W LInitialC ontex tF actory (by default). x Initial contex t factory : weblogic. mbeanserv ers. W LInitialC ontex tF actory (by default). jndi. C an be modified Serv er name (optional): Enter the serv er name Step 2: Enter the connection account credentials J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — Co nne ctio n A cco unt Cre d e ntia ls Pa g e Principle: Enter the username Credentials: Enter the password Path to Java on the local server: Enter your java home path and ensure that all the settings are correct.Monitoring Studio KM for PATROL Version 8. Monitoring Features 230 . C an be modified F or W ebLogic 8. x : Initial contex t factory : weblogic. Monitor Studio considers the host to be unreachable and triggers an alert on the ExecutionStatus parameter. C an be modified JNDI: weblogic. Connection timeout period: Default is set to 120 seconds.53 F or W ebLogic 9. domainruntime (by default). When this timeout is reached.6. jndi. you can change this if you wish. management.

Monitoring Features 231 . Step 4: Select the key property J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — Ke y Pro p e rty Pa g e Select the key property to monitor from this domain and click Next. Step 3: Select the domain J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — Do m a in Se le ctio n Pa g e Select the domain to monitor and click Next.6. Monitoring Studio connects to the application server and presents a list of domains for you to select from. If the credentials entered are correct.Monitoring Studio KM for PATROL Version 8.53 Click Next.

To monitor several attributes of the same key property.Monitoring Studio KM for PATROL Version 8. you are required to go through the wizard each time. integer. an additional panel is displayed to allow you to select the parameters to collect. Step 5a: Select parameters to collect When you select a numeric attribute (boolean. number) at the previous step. DeltaPerSecond: Reports the value resulting of the division of the Delta by the number of Monitoring Features 232 . You can only select one attribute at a time.6. J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — Pa ra m e te rs Se le ctio n Pa g e Value: Reports the actual value collected upon data polling Delta: Calculates the difference between values collected during two consecutive polling.53 Step 5: Select the attribute J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — A ttribute Se le ctio n Pa g e Select the attribute from the list and click Next.

you would divide the values by 1048576 (1024*1024). Use the Rescaling option to configure Monitoring Studio to rescale the value that is being extracted in order to have a more readable graph in the PATROL Console.Monitoring Studio KM for PATROL Version 8.6.53 seconds elapsed between the collection times Select the option "Discard negative Delta values" if you do not want negative values to be reported on the graph. Step 6: Monitoring Studio settings J a v a M Be a n Po lling W iza rd (W e bLo g ic Env iro nm e nt) — Se tting s Pa g e Object display name: Label displayed in the PATROL Console for this WebLogic monitoring. What thresholds do you want to set for the newly created instance? A drop-down list allows you to select the mode of setting alert thresholds: Monitoring Features 233 . The available rescaling options are: No rescaling Divide the value by a value that then gives you the reading in terms best suited to you Multiply the extracted value by a constant factor This can be useful if you extract numeric values in bytes but prefer to show a graph in megabytes. Object internal identifier (ID): PATROL internal identifier. In such a case.

Monitoring Studio fully supports PATROL for Event Management and is able to manage its thresholds through this new mechanism. BMC Software started to push another way to set thresholds. Thresholds can be set or modified at any time by right-clicking on the instance > KM co m m a nd s > Se t T hre s ho ld s .4. often known as the Override parameters feature. formerly known as AgentSpring). This is mainly intended to help save time if you wish to customize the thresholds of just one of many parameters for the instance. Do not set any thresholds for now: No thresholds will be set on any parameter of the instance.11 of the PATROL Agent. you can set alert thresholds on various parameters. Monitoring Studio will poll the object and return the output of the polling – but will not raise any alerts until you set thresholds.Monitoring Studio KM for PATROL Version 8. This new method is known as PATROL for Event Management (formerly known as EventSpring) or PATROL Configuration Manager (PCM.indicating that they already hav e thresholds. Thresholds and Alert Actions Managing Thresholds Choosing the thresholds mechanism mode When you set up the monitoring of your environment with Monitoring Studio. which is becoming the new thresholds standard in PATROL. and at the next collect you will see values for the newly monitored object. You can add a string or numeric value search if you wish. If y ou select Use default thresholds and customize them. It sets the alarm and warning thresholds you entered by setting a specially formatted variable under the /___tuning___ tree in the PATROL Agent configuration. Monitoring Studio uses a standard internal PATROL mechanism. and as a result no alerts will be triggered. With the 3.5 release of the PATROL Agent. certain parameters for the instance may appear with an asterisk sy mbol . on clicking F inish.53 Use default thresholds: Uses the default thresholds set by Monitoring Studio Set custom thresholds: Allows you to customize the thresholds for all parameters of the instance Use default thresholds and customize them: Sets the default Monitoring Studio thresholds on certain parameters (see list of parameters with default thresholds) and then allows you to customize any/all of them. Monitoring Features 234 . Click Finish. the Set Thresholds panel will appear. These alert thresholds typically depend on the application or devices you want to monitor. WebLogic objects are instances of the SW_JMX class. and leave the default settings for the others.6. This is the standard method to set thresholds and is supported by BMC Software since version 3. You can then customize (any /all) the thresholds of the parameters as per y our specific needs. An icon for the monitored instance will appear under the main Monitoring Studio icon bearing the name entered/displayed in the Object display name field.

Thresholds are stored in the PATROL Agent configuration under the /___tuning___ tree. Thresholds are stored in the PA TR O L A gent configuration under the /A S tree.. Tuning: Monitoring Studio manages its thresholds through the standard Override parameters mechanism. accordingly. PA TR O L for Ev ent Management has to be enabled and preloaded.. This option requires that y ou set up the PA TR O L for Ev ent Management KM on y our PA TR O L A gent. it is recommended that you use this option. The following dialog box appears: T hre s ho ld M e cha nis m Se le ctio n — De fa ult o p tio n Select one of the three following options: Automatic: Monitoring Studio automatically detects the way thresholds are managed by the PATROL Agent and uses the correct mode.Monitoring Studio KM for PATROL Version 8. Monitoring Studio is fully compatible with this mechanism. This option is set by default and does not require any additional software. either Tuning or PCM. Thresholds and Alert Actions 235 . Monitoring Studio will select PC M/Ev ent Management to manage thresholds if the "A S_EVENTSPR ING" class is statically loaded or preloaded on the PA TR O L agent. If you do not use PATROL for Event Management. Monitoring Studio will use the Tuning thresholds management mode. Monitoring Studio uses the Automatic method. This thresholds mode detects the type of thresholds used by the PATROL Agent and sets the thresholds accordingly. it is recommended that y ou use this option. O therwise. All classes are provided without any pre-set thresholds.53 By default.6. To choose the mode of Threshold Mechanism: Right-click the main Monitoring Studio icon > KM Commands > Options > Thresholds Mechanism Selection.. O nce y ou select the Ev ent Management threshold management method. Event Management: Monitoring Studio manages its thresholds through the Event Management mechanism. or through Ev ent Management. If y ou use PA TR O L for Ev ent Management in order to modify or customize y our thresholds. This is recommended if you are unsure of the way thresholds are managed. y ou can modify and manage y our thresholds either through the Monitoring Studio interface. W hen the A utomatic mode is used.

Thresholds are set and modified through the Threshold wizard accessible by right-clicking the instance > KM commands > Set Thresholds. 4. cfg") with any ty pe of thresholds. To Set or Modify Alert Thresholds Monitoring Studio offers you full flexibility to set and modify the alert thresholds on each parameter. under the /A S tree in the A gent configuration. To set or modify alert thresholds. modify ing them right away . if y ou change the thresholds management option. If necessary . Method (summary): 1. Thresholds and Alert Actions 236 . or setting them later. That is: if y ou select the Ev ent Management option. For details. 3. You may import a PA TR O L agent configuration (". please refer to Setting or Modifying Alert Thresholds.6. The Threshold Management wizard can also be prompted immediately following the setup of a new monitoring object. Select the parameter on which you wish to set/modify thresholds Select the threshold "type": Simple (2 alerts can be triggered) or Advanced (3 alerts can be triggered) Select the type of Alert Action you wish to trigger when an alert is raised. Monitoring Studio will automatically migrate the thresholds set through the prev ious method to the new method (only for its monitored objects). Monitoring Studio will automatically remov e all the thresholds (set for its monitored objects) stored in the /___tuning___ tree in the PA TR O L A gent configuration. The last panel of the wizard offers y ou the option of either accepting default thresholds. right-click the Application/Container icon > KM commands > Set thresholds and the threshold management wizard appears. 2. Monitoring Studio will conv ert the thresholds to the ty pe of thresholds currently used at the nex t discov ery (within an hour). Setting or Modifying Alert Thresholds Monitoring Studio enables you to set alert thresholds for each parameter through the command menu. and set the same under in the Ev ent Management database.Monitoring Studio KM for PATROL Version 8.53 In order to av oid side effects and unpredictable behav ior.

The Reference Guide lists all the classes with details on the menu commands and the parameters available for each class. you can set Alert Actions to be triggered when an alert is raised on a parameter. Depending on the user’s selection. Threshold Type and Alert actions BMC Performance Manager Monitoring Studio has two "types" of thresholds: Simple (2 alerts maximum) and Advanced (3 alerts maximum).53 T hre s ho ld M a na g e m e nt W iza rd — W e lco m e Pa g e A drop down list displays the parameters available for the instance.6. Please see the section: Alert Actions capabilities for more details on the same.Monitoring Studio KM for PATROL Version 8. Thresholds and Alert Actions 237 . A n asterisk sy mbol "*" display ed nex t to the parameter name signifies that the parameter already has thresholds. You can then choose to either keep the same thresholds or just v iew them or modify them… as per the requirement. both types of thresholds can raise the following alerts: Do not trigger any alert Trigger an INFORMATION Trigger a WARNING Trigger an ALARM In addition.

This type of threshold can raise a maximum of two alerts. All the user has to do is to enter actual "limits" as per the specific requirement.Monitoring Studio KM for PATROL Version 8. so the choice you can make can only be only one or the other – depending on the parameter itself. Advanced thresholds T hre s ho ld M a na g e r W iza rd – Pa ra m e te r Se le ctio n Thresholds and Alert Actions 238 . Basically these parameters are the ones with boolean values. Certain parameters have "pre-defined" values. and the frequency of occurrence.53 Simple Thresholds Sim p le T hre s ho ld s Se tting s This type of threshold is easy and very user-friendly: the threshold values are expressed in terms of "greater than/lower than".6.

This setting is like that of PATROL thresholds.53 To access the advanced threshold options. Note applicable to both Simple and A dv anced Thresholds: In general. it is possible to trigger A lert A ctions not just when thresholds are breached. If you select Execute the Alert Actions every time a matching line is found on the MatchingLineCount parameter. check the box for Use advanced thresholds… when you select the parameter > click Next. In this wizard you will find the option Execute the Alert Action as string search has the parameter MatchingLineCount. This option Ex ecute the A lert A ctions appears in the thresholds wizard for the parameters to which this feature is applicable under the section for A larms.6. T hre s ho ld M a na g e r W iza rd – T hre s ho ld s Se tting This type of threshold setting is a little more complex as it requires the user to enter specific ranges of values as thresholds. Thresholds and Alert Actions 239 . but also each time an SNMP trap is receiv ed or a matching line/ev ent is found. Alert 2: An alert will be triggered if the value is between "x" and "x" and occurs "x" times in a row. such as MatchingTrapC ount. Monitoring Studio will run the Alert Actions every time a line matching the string search is found. Alert 1: An alert will be triggered if the value is between "x" and "x" and occurs "x" times in a row. MatchingLineC ount and MatchingEv entC ount. The advanced thresholds mode allows you to set up to a maximum of 3 alerts. Howev er for certain parameters.Monitoring Studio KM for PATROL Version 8. A lert A ctions are triggered only when a parameter breaches its thresholds. Example Let’s say you are setting thresholds on a string search. where you have the possibility of raising three alerts: Border Alert: An alert can be triggered when the value polled is not between "x" and "x" and occurs "x" times in a row.

Monitoring Studio KM for PATROL Version 8. Step 1: Parameter Selection Select the parameter on which you wish to apply the parameter and click Next. Extracting numeric values can help you analyze the Dynamic Items output (the output of a command. that is Numeric Value Extractions performed on instances of a Dynamic Object.6. Templates apply to all the Dynamic Items' output within the Dynamic Container. The R eference Guide lists all the classes with details on the menu commands and the parameters av ailable for each class. the Dynamic Object Builder creates Templates instances of the feature. the result of a SQL query. or WBEM query etc. right-click the Numeric Value Extraction (Template) > KM commands > Set thresholds and the threshold management wizard appears. Thresholds and Alert Actions 240 .).53 Setting Thresholds on Dynamic Numeric Value Extractions Monitoring Studio enables you to set thresholds on Dynamic Numeric Value Extractions. To set or modify alert thresholds on Dynamic Numeric Value Extractions. While the standard Numeric Value Extraction feature apply to a single return output. Se t T hre s ho ld W iza rd — Pa ra m e te r Se le ctio n Pa g e A n asterisk (*) display ed nex t to the parameter name signifies that the parameter already has thresholds. a web page. In order to apply this feature to all the Dynamic Items in a single operation.

53 Step 2: Dynamic Threshold Setting Set the dynamic thresholds for the parameter previously selected. Thresholds and Alert Actions 241 .6. Since Monitoring Studio applies thresholds as defined in the Threshold wizard and to av oid inconsistent alarms.Monitoring Studio KM for PATROL Version 8. Dy namic Numeric Value Ex tractions can only be defined when the location of the numeric v alue in the Template is set to "in the column number "n"" Click Set thresholds to apply the thresholds to the parameter. Alert 2: An alert will be triggered if the value is between "x" and "y" and occurs "z" times in a row. or a regular static numeric threshold. make sure the Static and the Dy namic thresholds are in concordance with the v alues/columns of the ex tracted output. "x" and "y" may be the column number where the dynamic thresholds should be found –use the %{<Column Number>} syntax–. The available alert options are: Do not trigger any alert Trigger an INFORMATION Trigger a WARNING Trigger an ALARM Se t T hre s ho ld W iza rd — Dy na m ic T hre s ho ld Se tting Pa g e As for standard static thresholds. the following options are available: Border Alert: An alert can be triggered when the value polled is not between "x" and "y" and occurs "z" times in a row. Both dynamic and static thresholds can be mixed. For each alert option. Alert 1: An alert will be triggered if the value is between "x" and "y" and occurs "z" times in a row.

both settings will be taken into account for that particular parameter instance. Therefore. y ou cannot set global A lert A ctions on them.execute this recovery script). This means that any parameter within this application/root container that trigger an alert will perform the Alert Actions set at the global level. They specify the way in which the notification of a problem is done for all instances in the application/root container.53 Alert Actions Description Alert Actions enables the PATROL administrator to choose/configure the execution of certain actions when an application goes into a state of alert. this is also referred to as recovery actions. With the Alert Actions functionality.Monitoring Studio KM for PATROL Version 8. it is possible to do one of the following: Customize notifications Specify recovery actions Global vs Specific Alert Actions Alert Actions can be set at two different levels: Global Alert Actions are set for the overall application/root container. Set Global Alert Actions Right-click on an Application/Container icon > KM commands > Set global actions Select the Alert Actions you want to trigger each time the parameter(s) enter(s) a state of alert and click Next. If y ou setup monitoring objects under the main Monitoring Studio icon without creating an application or container icon. specific Alert Actions need to be set for each parameter as the need may be.: when this parameter goes into alarm . If a specific Alert Action is set on a parameter belonging to a root container already set to trigger Global Alert Actions. Specific Alert Actions are set individual parameters and generally indicate the actions to perform in order to recover from a particular problem (e.6. Thresholds and Alert Actions 242 .g. Global A lert A ctions can only be set on an application container and will apply to agent-less objects under it.

Thresholds and Alert Actions 243 . if the selection requires further input (as for PATROL Event command lines. or write a line to a LOG file etc.53 Glo ba l A le rt A ctio n W iza rd — A le rt A ctio n Se le ctio n Pa g e The next panel depends on your selection. enter the relevant text with the help of Alert Action macros.6.).Monitoring Studio KM for PATROL Version 8. Click Finish. as in the example shown below: Glo ba l A le rt A ctio n W iza rd — Inp ut De finitio n Pa g e Global Alert Actions have been set.

Specific Alert Actions set on parameters under this application container on which global Alert Actions have been set. Thresholds and Alert Actions 244 .Monitoring Studio KM for PATROL Version 8.53 Glo ba l A le rt A ctio n W iza rd — A le rt Ex e cutio n Co nfirm a tio n Pa g e You can set additional A lert A ctions on any /all of the monitored parameters by using "Specific A lert A ctions". Click Next. Set Specific Alert Actions Right-click on a Monitored Instance > KM commands > Set Alert Actions Select the parameters for which you wish to set specific Alert Actions. These Alert Actions will be triggered each time any parameter held under this application container goes into alert state. Example Let’s take the case of the "My Custom Application" application container. This helps customize the alerts as per the specific requirements of the corresponding monitored object. Two global Alert Actions: Trigger a PATROL Event and Annotate the parameters graph are set on this container. are triggered in addition to those set on the global level.6.

Make your selection and click Next.Monitoring Studio KM for PATROL Version 8.6. Sp e cific A le rt A ctio n W iza rd — A le rt A ctio n Se le ctio n Pa g e Thresholds and Alert Actions 245 .53 Sp e cific A le rt A ctio n W iza rd — Pa ra m e te r Se le ctio n Pa g e The panel lists all the available specific Alert Actions.

Click Finish. Alert Actions Capabilities Alert Actions offers a large choice of actions in order to notify the administrator of a problem with the application or to recover from a particular problem. with the help of A lert A ction macros as in the ex ample shown.Monitoring Studio KM for PATROL Version 8.6. it will trigger the specific Alert Action as configured. Sp e cific A le rt A ctio n W iza rd — A le rt Ex e cutio n Co nfirm a tio n Pa g e If/when the selected parameter goes into alert. Sp e cific A le rt A ctio n W iza rd — Inp ut De finitio n Pa g e The next panel will confirm the selected Alert Action specific to the chosen parameter. enter the relev ant tex t. Enter the required input.53 The nex t panel depends on the selection. Monitoring Studio can be configured to run one or several types of actions when an alert is triggered by PATROL. or write a line to a LO G file etc. If the selection requires further input (as for command lines. Click Next. ). The following types of Alert Actions can be performed by Monitoring Studio: Thresholds and Alert Actions 246 .

you need to enter the string that will be displayed with the event A le rt A ctio ns : T rig g e r a PA T R OL Ev e nt A PATROL Event can be viewed from: Standard PATROL Consoles (Classic Console. PATROL Central) PATROL Enterprise Manager BMC Impact Manager Other third-party products that interface with PATROL. you need to enter the string that will be displayed within the annotation point. Thresholds and Alert Actions 247 . Annotate the parameter's graph If you select the Annotate the parameter’s graph action.6.53 Trigger a PATROL event If you select the Trigger a PATROL Event action.Monitoring Studio KM for PATROL Version 8.

53 A le rt A ctio ns : A nno ta te the p a ra m e te r's g ra p h Execute an OS command If you select the Execute an OS command action. The command must be non-interactiv e (no window.6. The command can be a program utility or a script shell. and can have arguments. you need ton complete the following panel: A le rt A ctio ns : Ex e cute a n OS co m m a nd Enter a command line to be executed Enter the username and password used to run the command.Monitoring Studio KM for PATROL Version 8. no user input) Thresholds and Alert Actions 248 .

you need to enter the PSL statement to be executed by the PATROL Agent. you need to enter the message that will be displayed in the pop-up as well as the in title of the pop-up window. it can have several PSL instructions.6. Send a pop-up to the PATROL consoles If you select the Send a pop-up to the PATROL Consoles action. Thresholds and Alert Actions 249 . Although only a single line is permitted.53 Execute a PSL command If you select the Execute a PSL command action.Monitoring Studio KM for PATROL Version 8. A le rt A ctio ns : Ex e cute a PSL s ta te m e nt The PSL command is recommended for adv anced user of PA TR O L.

Monitoring Studio KM for PATROL
Version 8.6.53

A le rt A ctio ns : Se nd a p o p -up to the PA T R OL Co ns o le s

Too many pop-ups could may the operators.

Write a line to a LOG file
If you select the Write a line to a LOG file action, you need to enter the LOG file path and the content of the line.

A le rt A ctio ns : W rite a line to a LOG file

Thresholds and Alert Actions

250

Monitoring Studio KM for PATROL
Version 8.6.53

Send a basic SNMP trap (using the PATROL MIB)
If you select the Send a basic SNMP trap action, you need to complete the following panel:

A le rt A ctio ns : Se nd a ba s ic SNM P tra p

IP address or hostname of the SNMP trap destination SNMP port and community string Text that will be sent in the SNMP trap

Send a custom SNMP trap
If you select the Send a custom SNMP trap action, you need to complete the following panel:

Thresholds and Alert Actions

251

Monitoring Studio KM for PATROL
Version 8.6.53

A le rt A ctio ns : Se nd a cus to m SNM P tra p

IP address or hostname of the SNMP trap destination SNMP port and community string All the characteristics of the trap: Enterprise ID, trap number and up to 4 varbinds.

Send an E-mail
If you select the Send an E-mail action, you need to complete the following panel:

Thresholds and Alert Actions

252

Monitoring Studio KM for PATROL
Version 8.6.53

A le rt A ctio ns : Se nd a n E-m a il

Enter the sender and the recipient email address in the From an To field. To send the email to multiple recipients, use the comma (,) or the semi-column (;) to separate the recipients' email addresses (ex: RecipientAddress1;RecipientAddress2;RecipientAddress2 OR ReciptientAddress1, RecipientAddress2,RecipientAddress2) Enter the SMTP server name Type the email subject and the message you wish to send

Customizing an Alert Action
Alert Actions are highly customizable, you can: Customize the string sent through SNMP Set the username/password used to execute the OS Command Define the content of the PATROL event sent by Monitoring Studio, etc. In addition, some information regarding the alert, such as the parameter name or its value, is available through Alert Action macros. This information can be used to further customize the Alert Action triggered by Monitoring Studio and provide more details about the problems that occur.

Thresholds and Alert Actions

253

Monitoring Studio KM for PATROL
Version 8.6.53

Alert Action Macros
A macro is a variable whose value is replaced when an Alert Action is triggered. Macros can be used to customize the content of each Alert Action. For example: %{VALUE} is replaced by the actual current value of the parameter that triggered the alert. When used in the text field for a PATROL event Alert Action, the percentage value is replaced by the actual current value of the parameter that triggered the alert. Each macro listed in the tables below contains information about what triggered the PATROL alert. Some macros are "general" or "common" - these can be used for any object, and some are "objectspecific" macros that are specific to the object, such as databases or files or JMX applications etc.

General Macros
The macros given in the table below can be used on any object:

General Macros
%{PARAMETER_NAME} %{VALUE} %{ALARM_TYPE} %{OBJECT_ID} %{OBJECT_LABEL} %{OBJECT_CLASS} %{OBJECT_TYPE} %{PARENT_<PARENT MACRO>}

Description
Name of the parameter that triggered the alert Value of the parameter that triggered the alert Type of the alert triggered (ALARM, WARN or INFORMATION) PATROL ID of the object triggering the alert Display name of the object triggering the alert Class (".KM") of the object triggering the alert Type of the object triggering the alert ("Process", "String", etc.) Gets the parent's object of a macro. Example: In the case of String Search performed in Command Line, use the following macro to get complete command line return output: %{PARENT_OSCOMMAND_RETURN_OUTPUT} ID of the object’s parent triggering the alert (the parent of a String object could be a LOG file, e.g.) Display name of the object’s parent triggering the alert Class (".KM") of the object’s parent triggering the alert Type of the object’s parent triggering the alert ("File", "OSCommand", etc.) PATROL ID of the application triggering the alert Display name of the application triggering the alert Class (".KM") of the application triggering the alert Type of the application triggering the alert ("Application") Contact information in case of an application failure Description of the application

%{PARENT_ID} %{PARENT_LABEL} %{PARENT_CLASS} %{PARENT_TYPE} %{APPLICATION_ID} %{APPLICATION_LABEL} %{APPLICATION_CLASS} %{APPLICATION_TYPE} %{APPLICATION_CONTACT} % {APPLICATION_DESCRIPTION}

Thresholds and Alert Actions

254

Monitoring Studio KM for PATROL
Version 8.6.53

General Macros
% {APPLICATION_EXISTENCEFILE S} %{ASCTIME:…}

Description
List of files that identify the application as present

Current time when the Alert Action is performed. Specify a formatting as described under Format Symbols in the Reference section. Example: %{TIME:%H:%M:%S} will be replaced by 09:45:17 at run time Inserts carriage return Recommended for advanced users only Provides an internal instance variable name to be inserted. The path is relative to the object triggering the alert. Example: %{/worstParam} will be contain the name of the worst parameter on this instance, which is an application instance built-in variable (see the "PATROL Script Language Reference" document).

%{NEWLINE} %{/...}

Object Specific Macros
Database Macros
%{DATABASE_TYPE} %{DATABASE_QUERY} %{DATABASE_NAME}

Description
Type of the database. SQL Server or Oracle SQL statement sent for execution Name of the database the SQL query is sent to. May be the database name for SQL Server, or the Oracle SID for Oracle.

Dynamic Object Macros
%{DYNAMIC_RETUNR_OUTPUT}

Description
Returns the output of the dynamic object

File Macros
%{FILE_CURRENT_NAME} %{FILE_NAME}

Description
Current file being monitored when monitoring a file whose name changes over time) Name of the monitored file as entered in the GUI

File System Macro
%{FILESYSTEM_NAME}

Description
Name of the monitored file system

Folder Macro
%{FOLDER_PATH} %{FOLDER_OLDEST_REMAINING_FILE}

Description
Folder being monitored Folder with the oldest remaining file

HTTP Macros
%{HTTP_RETURN_OUTPUT} %{HTTP_METHOD} %{HTTP_URL}

Description
Result of the HTTP request GET or POST depending on what was selected in the GUI URL being tested

Thresholds and Alert Actions

255

Monitoring Studio KM for PATROL
Version 8.6.53

JMX Macros
%{JMXPOLLING_SERVER_TYPE} %{JMXPOLLING_HOST} %{JMXPOLLING_PORT} %{JMXPOLLING_DOMAIN} %{JMXPOLLING_KEY_PROPERTY} %{JMXPOLLING_ATTRIBUTE} %{JMXPOLLING_CONTENT}

Description
Type of JMX server being polled Host name of JMX server polled Port number of the JMX server polled Domain of the JMX server polled Key property of the JMX server polled Attribute of the JMX server polled Content of the result output of the JMX server polled

KM Watch Macros
%{KMWATCH_CLASS} %{KMWATCH_ID} %{KMWATCH_PARAMETER}

Description
Class of the PATROL object being monitored Instance ID of the PATROL object being monitored Parameter name of the PATROL object being monitored

MPF Macros
%{MPF_CLASS} %{MPF_ID} %{MPF_FORMULA}

Description
Class of the PATROL object being monitored Instance ID of the PATROL object being monitored User-defined formula used to rescale the parameter value

OS Command Macro
%{OSCOMMAND_OSCOMMAND} %{OSCOMMAND_RETURN_OUTPUT}

Description
Command line being executed and analyzed Return output of the OS command

Process Macros
%{PROCESS_NAME} %{PROCESS_COMMAND_LINE} %{PROCESS_USER_ID} %{PROCESS_PID_FILE}

Description
Process name being searched for, as entered in the GUI Process command line being searched for, as entered in the GUI Process user ID being searched for, as entered in the GUI Path to the PID file whose corresponding process is being monitored

SNMP Polling Macros
%{SNMPPOLLING_OID} %{SNMPPOLLING_HOST} %{SNMPPOLLING_COMMUNITY} %{SNMPPOLLING_PORT} %{SNMPPOLLING_CONTENT}

Description
SNMP OID being polled SNMP Agent’s host name being polled SNMP community string being used to query the SNMP agent UDP port being used to poll the SNMP agent. 161 by default Value of the OID being polled

Thresholds and Alert Actions

256

53 SNMP Trap Macros %{SNMPTRAP_IP} %{SNMPTRAP_FOUNDIP} %{SNMPTRAP_COMMUNITY} %{SNMPTRAP_ENTERPRISEID} %{SNMPTRAP_TRAPNUMBER} %{SNMPTRAP_FOUNDTRAPNUMBER} %{SNMPTRAP_CONTENT} Description Originating IP Address of the SNMP traps being looked for Actual originating IP address of the trap that has been received SNMP community string of the SNMP traps being looked for Enterprise ID (OID) of the SNMP traps being looked for SNMP Trap numbers (specific numbers) being looked for Actual SNMP trap number that has been received and matches the entered criteria Content of the found trap String search Macros %{STRING_SEARCHED_1} %{STRING_SEARCHED_2} %{STRING_LAST_MATCHING_LINE} Description First regular expression being searched for Second regular expressions being searched for Last line that match with the String search criteria WMI Macros %{WMI_HOST} %{WMI_NAME_SPACE} %{WMI_QUERY} %{WMI_USERNAME} %{WMI_RETURN_OUTPUT} Description Name of host where the WMI query is being run Namespace of the WMI query WMI statement sent for execution WMI execution username Content of the result output of the WMI query WBEM Macros %{WBEM_HOST} %{WBEM_NAME_SPACE} %{WBEM_QUERY} %{WBEM_USERNAME} %{WBEM_RETURN_OUTPUT} Description Name of host where the WBEM query is being run Namespace of the WBEM query WBEM statement sent for execution WBEM execution username Content of the result output of the WBEM query Windows Event Macros %{NTEVENT_LOG} %{NTEVENT_SOURCE} %{NTEVENT_ID} %{NTEVENT_LAST_MATCHING} %{NTEVENT_LAST_MATCHING_CONTENT} Description Name of the Windows event log being monitored Windows Event source whose new entries are monitored ID of the Windows events being searched for Last matching event found Content of the NT event Thresholds and Alert Actions 257 .6.Monitoring Studio KM for PATROL Version 8.

6.53 Windows Performance Macros %{PERFORMANCE_INSTANCELIST} %{PERFORMANCE_COUNTER} %{PERFORMANCE_PERFORMANCE} Description Windows performance object instances being monitored Windows performance counter being monitored Windows performance object name being monitored Windows Service Macros %{SERVICE_NAME} Description Name of the service of an NT service class Administration Features This section deals with common administrative features such as setting thresholds or alert actions. SNMP Browse and SNMP Trap Listener. Exporting Configuration to a File This feature provides a simple way to save the configuration of a PATROL Agent by exporting it to a file for reuse later.Monitoring Studio KM for PATROL Version 8. The main benefits are that it: Eliminates the trouble of manually configuring Monitoring Studio on another PATROL Agent all over again Ensures both configurations are identical Monitoring Studio offers you two options: To export the entire Monitoring Studio configuration To export an application monitoring configuration Exporting the entire Monitoring Studio configuration This option allows you to export the entire Monitoring Studio configuration to one or more configuration files. Right-click the main Monitoring Studio icon > KM commands > Configuration > Export Configuration Thresholds and Alert Actions 258 . The configuration saved in a file can then be loaded onto a different PATROL Agent through the PATROL interface. exporting/importing the monitoring configuration. Also described in this section are a few useful features of Monitoring Studio such as cut/copy/paste and how to temporarily suspend the monitoring of an object. It also describes tools like the Process Viewer. Windows EventLog Reader.

53 Co nfig ura tio n Ex p o rt W iza rd — A p p lica tio n/Co nta ine r Se le ctio n Pa g e If you select the option "Include Monitoring Studio global settings". Enter the path and file name of the file that will contain the PATROL Agent’s configuration: Administration Features 259 . you will arrive at this panel: Co nfig ura tio n Ex p o rt W iza rd — A p p lica tio n/Co nta ine r Se le ctio n Pa g e Select the settings you wish to export and click Next.6.Monitoring Studio KM for PATROL Version 8.

Monitoring Studio KM for PATROL Version 8. The main difference is that only the information relevant to the application monitoring will be saved. cfg".53 Co nfig ura tio n Ex p o rt W iza rd — Co nfig ura tio n File Lo ca tio n Pa g e Export configuration to: Enter the path and file name for the configuration file. Click Finish. Split the file in smaller parts if necessary: Select this option if you feel that your pconfig version may not support large files. Exporting an application monitoring configuration Exporting one or several application monitoring configurations works exactly the same way as exporting the entire application. the configuration file is created in the "% PA TR O L_HO ME% \config" directory and named "Ex port_SW _Sentry . A successful export of the configuration will bring-up this panel: Co nfig ura tio n Ex p o rt W iza rd — Ex p o rt Co nfirm a tio n M e s s a g e By default.6. Administration Features 260 .

Administration Features 261 . you import a configuration file that has been "exported" from another Agent and saved.Monitoring Studio KM for PATROL Version 8. Monitoring Studio offers you two options: To import the entire Monitoring Studio configuration To import an application monitoring configuration The options displayed by the import configuration wizard will depend on the file type exported and saved (entire Monitoring Studio configuration and/or application monitoring).6. It: Eliminates the trouble of manually configuring Monitoring Studio on another PATROL Agent all over again Ensures both configurations are identical Basically. as displayed above for exporting the entire configuration.53 Right-click the main Monitoring Studio icon > KM commands > Configuration > Export Configuration and select the application-monitoring to export from the drop down list: Co nfig ura tio n Ex p o rt W iza rd — A p p lica tio n/Co nta ine r Se le ctio n Pa g e Or right-click an application or sub-application container > KM commands > Export Configuration. Importing Configuration This feature provides a simple way configure a PATROL Agent by importing a configuration already in use on another PATROL agent. A confirmation message will pop-up once the configuration has been successfully exported. Go through the same procedure of entering the destination file path and file name etc.

right-click the Monitoring Studio icon > KM commands > Import and Export > Import configuration. Im p o rting Co nfig ura tio n W iza rd — W e lco m e Pa g e Step 2: Select config file to import Im p o rting Co nfig ura tio n W iza rd — File Se le ctio n Pa g e Select the configuration file and click Next. Monitoring Studio will detect the configuration files stored in Administration Features 262 .53 Step 1: Import Configuration To access the import configuration wizard.Monitoring Studio KM for PATROL Version 8.6.

These global v ariables would hav e been specified and selected/or not. and y ou accept the global settings during the import. this is the license key that will now be assigned to the host which is importing the configuration. Or click No if you do not wish to import global settings The next window will show if there are similar existing objects and will ask you to whether you wish to overwrite the existing objects or make a copy.53 the entered path. Administration Features 263 . It will ov erwrite the old global settings. If the imported configuration has License4. Importing global settings will impact the global settings on y our ex isting objects. take the case of the global v ariable for License. Step 3: Confirm import of global settings Im p o rting Co nfig ura tio n W iza rd — Glo ba l Se tting Im p o rt Pa g e Click Yes if you wish to import the global settings as well.Monitoring Studio KM for PATROL Version 8.6. during the ex port of this configuration. F or instance.

6.53 Im p o rting Co nfig ura tio n W iza rd — Ex is ting Obje cts Pa g e Clicking Overwrite will overwrite existing objects and then on clicking Finish the summary of the imported objects will pop up: Im p o rting Co nfig ura tio n W iza rd — Ov e rrid e Co nfirm a tio n Pa g e Or Administration Features 264 .Monitoring Studio KM for PATROL Version 8.

53 Im p o rting Co nfig ura tio n W iza rd — Im p o rt Co nfirm a tio n Pa g e (Ov e rrid e Op tio n) Selecting Make a copy instead of Overwrite will make a copy of the configuration in your console without overwriting current existing objects. The new panel will show a summary. Administration Features 265 . A panel will ask you to assign prefixes to these copied objects: Im p o rting Co nfig ura tio n W iza rd — Pre fix De finitio n Pa g e Enter the prefix.Monitoring Studio KM for PATROL Version 8.6.

To access the Process Viewer tool: Right-click on the main Monitoring Studio icon > KM commands > Tools > Process Viewer. Process Viewer Tool The Process Viewer built-in tool helps the Monitoring Studio administrator identify the characteristics of the currently running processes and therefore monitor them in the most efficient way. and a panel confirming the import will pop-up Im p o rting Co nfig ura tio n W iza rd — Co m p le te d Im p o rt Co nfirm a tio n Pa g e On completion of the discovery process.53 Im p o rting Co nfig ura tio n W iza rd — Im p o rt Co nfirm a tio n Pa g e (Co p y with Pre fix ) Click Finish.Monitoring Studio KM for PATROL Version 8. you will see all the objects of the imported configuration in your console. Administration Features 266 .6.

It helps you enter the criteria to identify the process you want to monitor (name.53 Pro ce s s Vie we r This window shows you how processes are currently seen by Monitoring Studio. click the Update button. running as and command line). Modifying Object Name and/or ID Once you have configured one or several monitoring tools.6. you may need to rename/modify some display names or IDs them. Administration Features 267 . right-click the desired object > KM commands > Rename. To refresh the process list.Monitoring Studio KM for PATROL Version 8. and click Close to close the Process Viewer tool. The Rename feature allows you to: Rename the Object display name Modify the Object internal identifier (ID) To rename an object.

click Yes. You will get a pop-up asking you to confirm the change of the object ID: M o d ifica tio n o f a n Obje ct Na m e a nd /o r ID W a rning If you are certain that the new ID will not cause any problems. Administration Features 268 . and the PATROL console will display the new label and will update the ID as well. Make the changes and click OK.6.Monitoring Studio KM for PATROL Version 8.53 M o d ify ing a n Obje ct Na m e a nd /o r ID The Rename feature allows you to edit the object display name as well as the object ID.

In order to gather all process information.. The "sudo" utility helps UNIX system administrators secure their environment by authorizing some users to execute only certain commands specified as another user account (typically root). On Unix/Linux Systems Depending on the targeted platform.53 Process Command Credentials Monitoring Studio KM for PATROL runs OS commands to collect process information. Enter a username and password or leave the fields blank if you want Monitoring Studio to automatically use the default Patrol Agent account. 2. advanced privileges are sometimes required.6. Monitoring Studio may use some external system utilities to gather information. In such case Monitoring Studio can use the "sudo" utility to execute external commands as "root".. Se tting Pro ce s s Co m m a nd Cre d e ntia ls o n W ind o ws Sy s te m s Monitoring Studio allows you to set or modify the process command credentials that will be used for running OS commands.Monitoring Studio KM for PATROL Version 8. On Windows Systems 1. the "sudo" options feature could be a good workaround. Right-click the Monitoring Studio icon > Options > Process Command Credentials. Click OK to save your settings. If this applies to you. Sometimes the PATROL Agent default account does not have sufficient privileges to execute these commands and it is not possible in your environment to give super-user rights to the PATROL Agent. Administration Features 269 .

and that the "/etc/sudoers" file is configured to allow the PA TR O L A gent to ex ecute the selected commands as root. Enter the command line to execute the sudo utility Ensure that the sudo utility is installed on the sy stem. Right-click the Monitoring Studio icon > Options > Process Command Credentials..6. SNMP Browser Tool The SNMP Browser built-in tool allows the Monitoring Studio administrator to easily visualize the variables (OID and values) available in an SNMP agent. This tool is very useful to identify which OID you need to poll in the SNMP Polling wizard.53 1.Monitoring Studio KM for PATROL Version 8.. To set the SNMP Browser tool: Administration Features 270 . or leave blank to use the default PATROL account 3. Se tting Pro ce s s Co m m a nd Cre d e ntia ls a nd Co m m a nd Line o n Unix /Linux Sy s te m s 2. Enter the user credentials to execute external "ps" command.

The newest (or latest arrived) trap is shown first in the list. If the information entered is correct. community. it is not possible to hav e more than one program on one computer listening to SNMP traps (handling the UDP/162 port). To access the SNMP Trap Listener tool: 1. You can view their main characteristics (originating IP address. Resume to resume the listening. if not. This will help you specify the search criteria in the SNMP Trap Listening wizard. Performing an SNMP walk on a remote SNMP agent that has thousands of v ariables may take a long time. 2.6. the result of the SNMP walk is shown a few seconds later. If another program is listening to SNMP traps.). processes. it is not possible to use this tool and listen for SNMP traps from a Monitoring Studio object in the PA TR O L C onsole. The incoming SNMP traps are shown in real time in this window as soon as they arrive. Right-click the main Monitoring Studio icon > KM commands > Tools > SNMP Browser Enter the hostname or IP address of the computer where the SNMP agent is running Enter its port (by default: 161) and its community Specify the root OID from which you want to perform a "SNMP walk" (sort of SNMP dump) Click the Update button. Due to an SNMP protocol limitation. an error message is displayed with some details about the failure. Close to quit the tool window. Pause if you wish to stop the reception of traps and have more time to analyze the characteristics of the previously arrived traps. 5. Polling intervals can be set for objects created by Monitoring Studio that collect data (files. to once in a day. 3. Enterprise OID and trap specific number) as well as their attached "varBinds" (attached variables). A new collect can be performed from once every second. Monitoring Studio allows you to set/modify the polling interval of each monitored object through the menu command: Set Polling Interval.53 1. which can be modified at any time. You can use the same settings when you setup a new SNMP Polling object in Monitoring Studio. By default. SNMP Trap Listener Tool The Real-time SNMP Trap Listener built-in tool allows you to visualize all of the SNMP traps and their characteristics received by the PATROL Agent and Monitoring Studio. This tool is pretty helpful when you want to setup a SNMP Trap listening object in Monitoring Studio.Monitoring Studio KM for PATROL Version 8. 3. the polling interval is set to 2 minutes on all objects. but you ignore the characteristics of the traps you want to detect. SNMP polling etc. OS commands. Right-click the main Monitoring Studio icon > KM commands > Tools > Real-time SNMP Trap Listener. Administration Features 271 . 4. 6. Setting Polling Interval A polling interval defines how often new data is collected. Monitoring Studio is not able to listen to SNMP traps and an error message is shown. 2. Click the Close button to quit the SNMP Browser tool. It may just be one or the other. 4. F or the same reason.

These objects are: Process. Windows Events. This is why certain classes/objects have "common collectors". Example: 14. X minutes. or as in the case of SNMP traps – hav e collectors that react to ev ents. A common collector fetches data for all the objects of its class at the same time. x seconds: Here the values selected indicate the time of day. Windows Systems and File Systems. Se tting a n A p p lica tio n Po lling Inte rv a ls The options available are either to: Collect every: X hour.53 To access this feature. The common collectors are listed under the SW_SENTRY class. the collector fetches data from all processes at the same time. X minutes. X seconds: Set the polling interval in hours/minutes/seconds. Behavior of polling interval for common collectors: Common collectors Certain collectors are "common collectors". right-click the Application/Container icon > KM commands > Set Polling Interval. x minutes. 0 would mean that the polling is done only once a week on <selected weekday> at 2:30pm (14:30 hrs) The option to set polling interv als is not av ailable for string searches. The collection would be very resource-intensive (especially on UNIX) if the collector were to look for data one-by-one for each running process. Example: 14.Monitoring Studio KM for PATROL Version 8. numeric v alues. For instance. for Processes. since either they do not hav e collectors. 30. X seconds: Here the values selected indicate the time of the selected weekday. 30. 0 would mean that the polling is done only once a day at 2:30pm (14:30 hrs) Collect once a week on <weekday> at: X hour. Administration Features 272 . application/containers and SNMP trap instances. tex t pre-processing. Or Collect once a day at: x hour (24 hours).6.

exe process that you are monitoring. Java Settings The Java Settings wizard enables you to define which Java instance is to be used by Monitoring Studio. To access the Java Settings wizard. You can either use the automatic detection.53 Polling interval for common collectors If you set/modify the polling interval for an object that has a common collector (Process. J a v a Se tting s W iza rd — W e lco m e Pa g e Select the Java executable detection method: Select one of the three following options: Administration Features 273 . all the process objects you are monitoring will also be polled every 5 minutes. since the SW_Process class has a common collector.6. Windows Services and File Systems) – the polling interval will be applicable to all objects of that particular class. Windows Events. select a pre-detected java path or enter manually the path leading to the Java executable directory to be used. right-click the main Monitoring Studio icon > KM commands > Options > Java Settings. Therefore.Monitoring Studio KM for PATROL Version 8. if you set the polling interval to "collect every 5 minutes" for a winlog.

Select a Java path detected by Monitoring Studio: Select this option if you wish to select a Java executable directory within a list of pre-detected executables. J a v a Se tting s W iza rd — A uto m a tic De te ctio n Click Finish to save your settings. Click Next to continue. Monitoring Studio displays a list of all the Java executable directory found on your machine. Automatic Detection If you have selected the automatic detection at the previous step of the wizard.6. Administration Features 274 . Enter manually the Java path to be used by Monitoring Studio: Select this option if you wish to manually enter the Java executable directory path.53 Let Monitoring Studio automatically detect the Java path: Select this option if you wish Monitoring Studio to detect the Java executable directory by itself upon each discovery.Monitoring Studio KM for PATROL Version 8. User Selection If you have selected the user selection option at the previous step of the wizard. Monitoring Studio displays the path of the Java executable directory that will be used when performing commands requiring Java features.

Administration Features 275 .6. Click Finish to save your settings.Monitoring Studio KM for PATROL Version 8.53 J a v a Se tting s W iza rd — Us e r Se le ctio n Select the Java executable directory you wish Monitoring Studio to use when performing commands requiring Java features and click Finish to save your settings. Monitoring Studio let you enter the path to the Java executable directory you wish Monitoring Studio to use when performing commands requiring Java features. Manual J a v a Se tting s W iza rd — M a nua l Se tting s If you have selected the Manual option at the previous step of the wizard.

6. the criteria required for monitoring EventLogs. The latest event is shown first in this list. the second argument line corresponds to the "Argument 2" field. A s opposed to other common Ev entLog R eader tools av ailable. click the Update button. Right-click the main Monitoring Studio icon > KM commands > Tools > Windows EventLog Reader. click the Close button. its ID and its arguments (or "insertion strings"). Monitoring Studio allows y ou to monitor really heav y Ev entLogs with no negativ e impact on performance. 5. Administration Features 276 . W ind o ws Ev e ntLo g R e a d e r 2. Select the EventLog you wish to view and click the Update button to refresh the window. By doing so. 4. etc. This may take a few seconds to complete. There is one line per argument: the first argument line corresponds to the "Argument 1" field in the Windows Event monitoring wizard.53 Windows EventLog Reader Tool The Windows EventLog Reader built-in tool shows the events registered in a specific Windows EventLog. 6. What is interesting with this feature is that it shows how each event is actually registered: its source. because these operations are resource-intensiv e. The last column in this window shows the arguments registered in each event. To refresh the window. To close the window.Monitoring Studio KM for PATROL Version 8. To access the Windows EventLog Reader tool: 1. this one shows neither the whole ev ent description string nor the username that has logged the ev en. 3.

This enables discovering and then monitoring any new objects added or removed etc. if necessary. 1.Monitoring Studio KM for PATROL Version 8. You can also force a discovery manually by right-clicking on the Monitoring Studio icon > KM Commands > Trigger a KM Discovery. Right-click the Monitoring Studio icon > Options > Discovery Interval. However. Trigger a KM Discovery Monitoring Studio automatically executes a discovery every hour of all objects for the monitored system.6. Click OK to save your settings..53 Setting the Discovery Interval By default. Se tting Dis co v e ry Inte rv a l 2. Monitoring Studio performs a discovery every hour to create. Use the arrows to customize the discovery interval from once every 5 minutes to once every 24 hours. modify and update monitored objects. 3. Administration Features 277 .. you can easily change the default discovery interval to meet your specific needs.

..6.Monitoring Studio KM for PATROL Version 8.53 Monitoring Studio Configuration Reports Instant Configuration Reports Monitoring Studio enables you to generate a report on the configuration of all monitored objects: To generate an Configuration Report Right-click the Monitoring Studio icon > KM Commands > Configuration > Report > Now. A cce s s ing Co nfig ura tio n R e p o rt Co m m a nd Administration Features 278 .

Monitoring Studio KM for PATROL Version 8. Ex a m p le o f a XM L Co nfig ura tio n R e p o rt Object Configuration Reports The Object Configuration menu command generates an instant report on the configuration of all objects Administration Features 279 .53 Se tting the Co nfig ura tio n R e p o rt Pa ra m e te rs The report is generated in the selected format and saved in the defined location.6.

There are two types of Object Configuration reports: 1.Monitoring Studio KM for PATROL Version 8. The report is generated and displayed instantly. 2. Administration Features 280 . The report is generated and displayed instantly. Configuration reports on all monitored objects under the Monitoring Studio icon or any container icon: Monitoring Studio/Container icon > KM Commands > Configuration > Display Object Configuration. Scheduling Configuration Reports Monitoring Studio enables you to schedule the generation of configuration reports for: All objects under the Monitoring Studio icon Containers All (includes both options above) To schedule a report Right-click the Monitoring Studio icon > KM Commands > Display Configuration > Report Scheduler. Entire Configuration Reports The Entire Configuration Report command enables you to generate an instant report of the configuration of all the monitored objects: Monitoring Studio icon > KM Commands > Configuration > Display Entire Configuration. The scheduling wizard appears. The report is generated and displayed instantly.53 under the selected object icon.6. Configuration reports on individual objects: Object icon > KM Commands > Display Object Configuration.

Monitoring Studio will create a report per class Plain English — to create a report where data is displayed in an unformatted style. R e p o rt Sche d ule r W iza rd — Sche d uling Op tio ns Pa g e The configuration report will include the entire configuration of all monitored objects under the Monitoring Studio icon. The following panels depend on the option selected: Never This option enables you to cancel a previously set schedule. Administration Features 281 .6. XML (Extensible Markup Language) — to create a report formatted as a standard XML file Scheduling options: allows you to select the frequency: Never Every hour Every day at a specific time Every week at a specific time and day Every month at a specific time and day Click Next. Click Next to validate and access the confirmation panel wizard.53 R e p o rt Sche d ule r W iza rd — W e lco m e Pa g e Click Next. Report Output formats: Select one of the three available formats in the list: CSV (Comma Separated Values) – to create delimited text files reports which use a comma to separate values.Monitoring Studio KM for PATROL Version 8. The next panel enables you select the report output format and to configure the scheduling options.

Click Next to continue. Use this filename template: Indicate the path and folder where the report is to be saved and its filename.6.53 Every hour R e p o rt Sche d ule r W iza rd — Ev e ry Ho ur Op tio n Save the report in the following folder: Enter the path and name of the folder. The last step of the Configuration Report Scheduling Wizard confirms the specified settings. Every day at a specific time Indicate the time at which the report is to be generated. Available macros are listed under Macros of the Reference section. Using the given macros will enable you to have reports that are properly named with the hostname and time the reports are generated.Monitoring Studio KM for PATROL Version 8. Administration Features 282 . Click Finish to close the wizard.

Proceed with the appropriate settings and click Next to continue. The last step of the Configuration Report Scheduling Wizard confirms the specified settings.6.53 R e p o rt Sche d ule r W iza rd — Ev e ry Da y a t a Sp e cific T im e Op tio n Click Next. Every week at a specific time and day Select the time and the day(s) of the week on which the report is to be generated. Administration Features 283 . the filename template you wish to use. The Settings Panel is displayed to allow you to define the folder in which the file must be saved. Click Finish to close the wizard.Monitoring Studio KM for PATROL Version 8.

the filename template you wish to use. Proceed with the appropriate settings and click Next to continue.Monitoring Studio KM for PATROL Version 8. The Settings Panel is displayed to allow you to define the folder in which the file must be saved. The last step of the Report Scheduler Wizard confirms the specified settings. the filename template you wish to use.6. The Settings Panel is displayed to allow you to define the folder in which the file must be saved. Click Finish to close the wizard. R e p o rt Sche d ule r W iza rd — Ev e ry M o nth a t a Sp e cific T im e a nd Da y Op tio n Click Next. Click Finish to quit the wizard. Every month at a specific time and day Indicate the day of each month and the time at which the report is to be generated. Administration Features 284 .53 R e p o rt Sche d ule r W iza rd — Ev e ry W e e k a t a Sp e cific T im e a nd Da y Op tio n Click Next. The last step of the Configuration Report Scheduling Wizard confirms the specified settings. Proceed with the appropriate settings and click Next to continue.

This menu command allows you to acknowledge all alerts triggered on a File security monitoring object. Acknowledge and Update This is applicable to File Security instances. To acknowledge all alerts for a specific instance : Operator Day-to-Day Tasks 285 . Acknowledge Alerts This option is applicable to all application classes except for String searches. SNMP traps and Windows events instances. how to stop or restart an application. It also describes the Acknowledge all and reset option that is available to the String search. Right-click File Security icon > KM commands > Acknowledge alerts and update. SNMP traps and Windows events instances for which a specific command Acknowledge Alerts and Reset can be used to acknowledge all alerts and reset parameters to zero. SNMP traps. such as. and update the settings to conform with the recently made changes to the security settings (user access rights etc).53 Operator Day-to-Day Tasks This section describes features that facilitate the daily tasks of the operator. and Windows Events tools.Monitoring Studio KM for PATROL Version 8. Right-click the object icon > KM commands > Acknowledge all and reset. how to view file content or restart the scanning from the beginning of a file. This menu command allows you to acknowledge all alerts and reset the MatchingTrapCount or MatchingEventCount parameter to zero. Acknowledge all and Reset This is applicable to String searches.6.

Cut and Paste features. Click a parameter to select it and click OK.. No new data can be collected upon an alert acknowledgment. right-click the desired object > KM commands > Copy or Cut or Paste.53 1. depending on what you want to do.6. An acknowledging event will automatically be triggered. Right-click the Object icon > KM Commands > Acknowledge Alerts.. This can be done easily with the Copy. Cut and Paste feature of Monitoring Studio: Copy or Cut any Monitoring Studio object and then Paste it in a new container.Monitoring Studio KM for PATROL Version 8. A ck no wle d g ing A le rts 2. Monitoring Studio displays the name of the parameters for which an alert can be acknowledged. Cut and Paste Once you have configured one or several monitoring tools. The selected parameter(s) will be deactivate and then reactivate. you may need to copy or move them under a new container. Operator Day-to-Day Tasks 286 . To access the Copy. Copy. or duplicate the String searches that you have setup on one command line execution on another one.

y ou can paste ev ery thing ev ery where that y ou would hav e been able to do with the regular wizards.6. Operator Day-to-Day Tasks 287 . y ou cannot paste a String search object in/under a Process monitoring object. Basically . Delete a Monitored Object Delete the monitoring of an object Monitoring Studio allows you to delete any monitored object: right-click the object icon > KM commands > Delete. This removes the icon and all dependencies from your console and it signifies that the object is no longer monitored.53 Cut/Co p y KM Co m m a nd s Some objects cannot be pasted in other objects. F or ex ample.Monitoring Studio KM for PATROL Version 8.

When in a paused state. 1. right-click the main Monitoring Studio icon > KM commands >Delete All.Monitoring Studio KM for PATROL Version 8. the object is still displayed in the PATROL Console but in an 'OFFLINE' status and no information is collected for that particular object. can easily be restarted by selecting the Resume monitoring option in the menu. The monitoring of the object. Temporarily suspend the monitoring of an object This is applicable to all monitored instances. Rename an Object Monitoring Studio provides two ways for renaming objects. O nce y ou click on Delete/Delete all – y ou cannot undo the action. however. Right-click on the object icon > KM commands > Edit and follow the wizard steps until you arrive at the last panel shown below: Operator Day-to-Day Tasks 288 . Deletion of objects is irrev ersible.6. In order to perform maintenance tasks.53 Delete the monitoring of all objects Monitoring Studio allows you to delete the monitoring of all objects under the main Monitoring Studio icon in one step. Right-click the object icon > Pause monitoring. it is often useful to pause the monitoring (by Monitoring Studio) of an object: Right click the object icon > KM commands > Pause monitoring.

A message asks for confirmation. the file content is scanned as new content is added. This option offers the possibility to restart the scanning from the beginning of the file. At the next polling.Monitoring Studio KM for PATROL Version 8. Change the object label/display name.6. click Yes and the PATROL console will display the new label and will update the ID as well.53 R e na m ing a n o bje ct 2. you need to use the method shown below in step 2. 2. Operator Day-to-Day Tasks 289 . However. This means that the information that is in the file is only scanned once and then skipped over by the next polling. Right-click the LOG File icon > KM commands > Restart scan from the Beginning of file. 3. it cannot be canceled. and click Finish. The object icon will now display the new label in the PATROL console. the entire file will be scanned. you cannot change the object ID through this method. O nce this option has been selected and confirmed. Right-click on the object icon > KM commands > Rename. A pop-up will ask you to confirm the change of the object ID: M o d ify ing a n o bje ct ID If you are certain that the new ID will not cause any problems. Restart Scan from the Beginning of the File When looking for strings or numbers in a LOG file. To do so: 1. To edit the object ID as well. Click OK. The Rename feature allows you to edit the object display name as well as the object ID. Click the Yes button to proceed.

This runs the command line entered in the Start--Stop option of the New/Edit Application icons (container) wizard. the following message pops-up: Ca nno t Sta rt the A p p lica tio n M e s s a g e If the execution of the Start application command is confirmed. If no stopping command line is provided.Monitoring Studio KM for PATROL Version 8. If no starting command line is provided. it is possible to relaunch the application by using the Application/Container icon> KM commands > Manage > Start the application command menu. a window comes up with the output of the command being executed. This runs the command line entered in the "Start--Stop" option of New/Edit Application icon (container) wizard. Stop an Application It is possible to stop an application that you are monitoring by using the Application/Container icon> KM commands > Manage > Stop the application command menu. the following message pops-up: Operator Day-to-Day Tasks 290 . This option should be used by adv anced users only .53 Restart an Application If Monitoring Studio warns you that the application you are monitoring is down.6.

To see the file’s content.6. right-click the File monitoring icon > KM commands > View File content.53 Sto p the A p p lica tio n Co nfirm a tio n M e s s a g e If the execution of the Stop application command is confirmed. you need to enter the details in field for the File path. This option should be used by adv anced users only . The panel that opens offers you the options shown below: Operator Day-to-Day Tasks 291 . See Also How to restart an application SW_APPLICATIONS SW_SENTRY View the Content of a File Monitoring Studio provides an easy way to check the content of a file that is being monitored. a window comes up with the output of the command being executed. You can also view the content of any monitored file by right-clicking the main Monitoring Studio icon > KM commands > Tools > File Viewer.Monitoring Studio KM for PATROL Version 8. In this case.

File content: This is the where the content is displayed. Operator Day-to-Day Tasks 292 .Monitoring Studio KM for PATROL Version 8.53 File Vie we r When this panel first opens the File Content window displays the first 64 KB of the file. To view other sections of the file. Show me: The first/last: X KB: You can select what part of the file you wish to view. File path: This displays the path of the file you are currently viewing. Make your selection and click Update Only lines matching with (RegExp): Enter a regular expression and only the lines matching this regular expression are displayed in the File content field. you select the options and click Update. You can also enter another file path and click Update to view another file.6.

Examples .

we want to trigger a standard PATROL event containing the name of the parameter. that of the LOG file and the name of the application that triggered the alert. we monitor a LOG file and look for the string "error" in the lines. Select the Set Alert Actions… command from the menu to run the Alert Actions wizard as shown below. 1. Se tting a n A le rt A ctio n o n a String Se a rch Obje ct 294 .Monitoring Studio KM for PATROL Version 8. Every time an "error" is found. Alert Actions Example In this example.53 This section shows two examples: one is about checking the availability of a website using the Command Line analysis tool.6. and the other illustrates the Alert Actions feature.

This launches the wizard to set specific Alert Actions. as shown in the screenshot below.53 2. Click Next to carry on with the Alert Actions wizard.Monitoring Studio KM for PATROL Version 8. Alert Actions Example 295 . you want to run an Alert Action every time the matching line is found: Select the MatchingLineCount parameter from the list of parameters related to the String search Ensure that the thresholds for this parameter are set to ‘1’ so that an alert is triggered every time a line containing the word "error" is found.6. At this step. Se le cting the M a tching Line Co unt Pa ra m e te r 3.

%{NEWLINE}Error message: %{MORE_INFORMATION} %{APPLICATION_LABEL} contains the application display name in the PATROL Console. The text sent with the PATROL event will look like this: Application myApplication: error found in LOG File: /opt/myApplication/log/myApp*. %{PARENT_LABEL} contains the LOG file display name (it is the parent of the String search in the PATROL Console). Select the type of action to be executed when the MatchingLineCount parameter goes into alert state: Check the Trigger a PATROL event box and click Next. Error message: [line content] Alert Actions Example 296 . %{MORE_INFORMATION} contains the entire line in the LOG file that triggered the alert. %{NEWLINE} will create a new line in the message.e.53 Se le cting a n A le rt 4.log. Enter the message of the PATROL event: Name of the application .6. the line in the LOG file that triggered the alert) Enter the text below in the box called Enter the text to be sent with the PATROL Event: Application %{APPLICATION_LABEL}: error found in %{PARENT_LABEL}. Se tting the A le rt Pa ra m e te rs 5. Name of the log file .Monitoring Studio KM for PATROL Version 8. The error message (i.

Alert Actions Example 297 . Trigger a PATROL Event. Monitoring Studio monitors the most recently updated file which matches with the specified path.Monitoring Studio KM for PATROL Version 8. In such case. such as an OS command that runs a recovery action for the monitored application or writes an annotation to the graph built by the MatchingLineCount parameter with the content of the matching line. You have successfully setup the monitoring of an XML log file. Co nfirm ing a n A le rt A ctio n In this example you set just one Alert Action. XML LOG File Parsing Monitoring the content of an XML LOG file with Monitoring Studio Specifying the file to monitor 1. you first need to preprocess the XML text in order to then run string searches or perform numeric value extraction on the result. Specify that file is a LOG file.6. Specify the path to the file. You can use wildcards (* and ?) if the name of the file changes over time (like a time-stamped LOG file). click the Next button to get to the final panel of the Alert Actions wizard that summarizes the Alert Actions set for the MatchingLineCount parameter. but it would have been possible to set several Alert Actions. 3. Right-click the main Monitoring Studio icon or your previously-created application icon > KM Commands > New > File monitoring and analysis… 2. Now to parse this file. 4.53 6. that Monitoring Studio needs to monitor only the new lines that are being added to the file. i.e. Enter a label and ID for the icon which is going to be created in the PATROL Console.

6.getDefaultUserRole</cname> <reqid>2</reqid> <sesid>1uEPHTdRG2mM6GCfhv1EkwcBrCi68ffGizgIEtGHWFMt5Hc7lwE7!-1625978434!-1455528670! 7501!7502!1064223951289</sesid> <thrid>ExecuteThread: '68' for queue: 'default'-f7c8b25c01</thrid> <cthid>ExecuteThread: '68' for queue: 'default'-f7c8b1696c</cthid> XML LOG File Parsing 298 . the records in this XML LOG file are in the following format: <rec> <vm>su37sr72</vm> <ts>2003-09-22 11:47:35. Se le cting a T y p e o f Co nv e rs io n to A p p ly to a Lo g File In this example.Monitoring Studio KM for PATROL Version 8.53 Pre-processing the content of the file (converting XML to CSV) Right-click the File object which has been created > KM Commands > New > Text PreProcessing… Select the Convert XML to CSV option.511 CEST</ts> <level>ERROR</level> <class></class> <method></method> <ctx> <pid>A141607</pid> <appid>frontnet</appid> <cname>User_3_0.

FNNotAuthorizedException: No authorization to execute service operation at com.ReplicaAwareRemoteRef.509 CEST</ts> <sev>ERROR</sev> <ctx> <pid>A141607</pid> <appid>frontnet</appid> <cname>User_3_0.rmi.UserBean_3_0_3c05dc_EOImpl_WLSkel.cluster.invoke (Unknown Source) at weblogic.csg.getDefaultUserRole</cname> <reqid>2</reqid> <sesid>1uEPHTdRG2mM6GCfhv1EkwcBrCi68ffGizgIEtGHWFMt5Hc7lwE7!-1625978434!-1455528670! 7501!7502!1064223951289</sesid> <thrid>ExecuteThread: '68' for queue: 'default'-f7c8b25c01</thrid> <cthid>ExecuteThread: '68' for queue: 'default'-f7c8b1696c</cthid> </ctx> <stack> <![CDATA[com.csg.java:145) at com.user_3_0.user_3_0.java:360) at weblogic.getDefaultUserRole (UserBean_3_0_3c05dc_EOImpl.rmi.UserBean_3_0.internal.csg.rmi.services.handleRequest(BasicServerRef.java:112) at weblogic.csg.ReplicaAwareServerRef.java:263) at weblogic.rmi.frontnet.getDefaultUserRole(Unknown Source) at com.bean.sendOneWayRaw(ServerRequest.user_3_0.internal.ProxyStub.services.getDefaultUserRole(UserCA_3_0.internal.internal.UserCA_3_0.53 </ctx> <msg> <![CDATA[FNNotAuthorizedException.rmi.rmi.csg. XML LOG File Parsing 299 .invoke(ReplicaAwareRemoteRef.6.dispatch(BasicServerRef.pb.invoke(BasicServerRef.services.BasicServerRef.BasicServerRef.bean.invoke(ReplicaAwareRemoteRef.sendReceive(ServerRequest.pb.BasicServerRef.rmi.calx.internal.pb.pb.bean.bean.invoke(ProxyStub.java:178) at weblogic.frontnet.FEA002002.No authorization to execute service operation]]> </msg> <exc> <ts>2003-09-22 11:47:35.frontnet.rmi.pb.java:230) at weblogic.invoke(ReplicaAwareServerRef.cluster.Monitoring Studio KM for PATROL Version 8.java:93) at weblogic.services.frontnet.frontnet.exec_arch.getDefaultUserRole(UserBean_3_0.cluster. java:345) at com.java:35) at $Proxy1401.java:92) at weblogic.user_3_0.ServerRequest.java:329) at weblogic.ServerRequest.rmi.UserBean_3_0_3c05dc_EOImpl.internal.ReplicaAwareRemoteRef.

internal.common.wls.internal.common.cs.servlet.base.java:174) XML LOG File Parsing 300 .service(HttpServlet.internal.portals.java:459) at com.RequestDispatcherImpl.FNServlet.forward(RequestForwarder.frontnet.resetBusinessUnitParam (DefaultAuthorizationStrategy.csg.frontnet.pb.security.base.invokeServlet(ServletStubImpl.base.java:27) at com.CSServlet.java:49) at com.servlet.http.PortalSelectionController.enforce.frontnet.util.pb.RequestForwarder.servlet.java:27) at com.CSServlet.java:56) at com.servlet.frontnet.csg.doFilter(IntranetPLEnfFilter.java:853) at weblogic.java:21) at weblogic.doGetManaged(AuthorizationServlet.frontnet.java:740) at com.frontnet.pb.servlet.common.servlet. java:99) at com.java:72) at com.pb.common.java:66) at javax.frontnet.servlet.brokers.servlet.doFilter(TailFilter.internal.forward(RequestDispatcherImpl.FnUserBroker.TailFilter.service(HttpServlet.csg. java:280) at com.csg.csg.service(HttpServlet.FilterChainImpl.CSServlet.HttpServlet.wls.java:27) at weblogic.java:48) at com.ServletStubImpl.apps.csg.java:740) at com.java:262) at weblogic.HttpServlet.servlet.servlet.processSelectionPage (PortalSelectionController.HttpServlet.java:174) at weblogic.FnUserBroker.internal.frontnet.http.portals.servlet.servlet.servlet.6.pb.doGetManaged (PortalSelectionController.service(CSServlet.apps.java:48) at com.java:82) at javax.java:287) at com.java:262) at weblogic.service(FNServlet.cs.servlet.csg.http.servlet.frontnet.pb.brokers.CSServlet.cs.csg.common.http.internal.util.IntranetPLEnfFilter.pb.53 java:244) at com.assertAvailableBusinessUnit (DefaultAuthorizationStrategy.doFilter(TailFilter.base.getDefaultMandant(FnUserBroker.doGet(CSServlet.java:334) at com.FNServlet.java:334) at javax.java:82) at javax.DefaultAuthorizationStrategy.cs.apps.csg.csg.doFilter(FilterChainImpl.doFilter(FilterChainImpl.pb.doGet(CSServlet.cs.servlet.base.base.pb.servlet.cs.apps.util.invokeServlet(ServletStubImpl.Monitoring Studio KM for PATROL Version 8.apps.csg.csg.java:21) at weblogic.doFilter(IntranetPLEnfFilter.FilterChainImpl.csg.DefaultAuthorizationStrategy.common.getDefaultPortalUserSettings (FnUserBroker.java:29) at com.internal.servlet.csg.CommonServlet.csg.java:853) at weblogic.HttpServlet.ServletStubImpl.doFilter(FilterChainImpl.apps.apps.apps.java:459) at com.frontnet.csg.internal.FilterChainImpl.IntranetPLEnfFilter.pb.service(FNServlet.common.AuthorizationServlet.apps.frontnet.service(HttpServlet.service(CommonServlet.enforce.service(CSServlet.TailFilter.security.PortalSelectionController.pb.csg.

internal.java:121) ]]> </stack> </exc> </rec> So.53 at weblogic.internal.CNAME" which means the value of CNAME under the CTX tag.6.doFilter(FilterChainImpl.CNAME MSG.internal.kernel.execute(ExecuteThread. the <CNAME> value under <CTX> and the <MSG> value.WebAppServletContext. Please note the syntax "CTX. we are specifying that REC is the XML tag for a new record and that we would like to include the value for the following properties and sub-tags:TS LEVEL CTX.Monitoring Studio KM for PATROL Version 8. XML LOG File Parsing 301 .servlet.execute(ServletRequestImpl. Therefore.servlet.ExecuteThread.java:2684) at weblogic. Let’s say that we would like to retrieve the <TS> value. specify a label and ID for the text pre-processing object that will be created under the file icon.invokeServlet(WebAppServletContext.java:140) at weblogic.java:2412) at weblogic. the <LEVEL> value.ExecuteThread.java:27) at weblogic.FilterChainImpl. <REC> is the XML tag for each new record.kernel.servlet.ServletRequestImpl. De fining the Co nv e rs io n Pa ra m e te rs Then.run(ExecuteThread.

User_3_0. 2003-09-22 11:52:05.User_3_0. 2003-09-22 12:09:53. FNNotAuthorizedException.ERROR. FEA002002.No authorization to execute service operation]]>.No authorization to execute service operation]]>.272 CEST.6.53 De fining the Obje ct As a result. corresponding to the XML to CSV preprocessing: A cce s s ing the R e s ult File This object has a single TransformResult text parameter as a result of the XML to CSV pre-processing: 2003-09-22 11:47:35.ERROR.getDefaultUserRole.Monitoring Studio KM for PATROL Version 8. 2003-09-22 12:10:39.No authorization to execute service operation]]>.getDefaultUserRole. 2003-09-22 12:06:18.ERROR.ERROR. FEA002002.getDefaultUserRole.KycBeneficialOwnerProfiles. XML LOG File Parsing 302 . FEA002002.User_3_0. FNNotAuthorizedException.920 CEST.getDefaultUserRole. we get a new icon in the PATROL Console.511 CEST.557 CEST.ERROR.User_3_0. FNNotAuthorizedException.No authorization to execute service operation]]>. FNNotAuthorizedException. FEA002002.984 CEST.

ERROR.RDS001002.FEA000001.ERROR.RDS001003.53 FNDBDataAccessFailureException. Code: 001]]>.Service not available .TableName: Landcode_1_RefTableObject. 2003-09-22 12:10:39. 2003-09-22 12:10:56.566 CEST.Service FNServiceState. FNDBDataAccessFailureException.CIFS_Customer_1. 2003-09-22 12:21:30.Service FNServiceState.No authorization to execute service operation]]>.RDS001002.BPST_UserProfile_3.getUsers.FEA000001.KycBeneficialOwnerProfiles. FNServiceNotAvailableException. Language: 891.TableName: Service_Status_InfoRefTableObject.getCustomer. FNDBDataAccessFailureException.6.User_3_0.945 CEST. BusinessUnit: 0000. corresponding to XML records whose <LEVEL> is "SEVERE".SEVERE.SEVERE.TableName: Service_Status_InfoRefTableObject.Service not available .643 CEST. Language: 891. we are going to search for lines that contain the string "SEVERE" in the second column.Code not Found . 2003-09-22 12:10:56. 2003-09-22 12:10:56. Code: CIFS_Customer_1_0]]>.637 CEST. Code: 001]]>. BusinessUnit: 0012. FEA002002. Searching for strings in the result of the XML-to-CSV pre-processing Right-click the Text-Pre-Processing icon > KM Commands > New > String search… Now.getState]] >. BusinessUnit: 0012.004 CEST. FNServiceNotAvailableException.getState]] >.Code not Found . XML LOG File Parsing 303 .getUsers.RDS001003. FNDBDataAccessFailureException.950 CEST.getCustomer.Monitoring Studio KM for PATROL Version 8.TableName: Landcode_1_RefTableObject. BusinessUnit: 0000.ERROR.Code not Found .Code not Found .ERROR. 2003-09-22 12:10:56.BPST_UserProfile_3.CIFS_Customer_1. FNNotAuthorizedException.getDefaultUserRole. Code: BPST_UserProfile_3_0]]>.

where we select the I want to use the default thresholds option. keeping the default values shown. and select the option in the following column number and enter 2.53 Pe rfo rm ing a String Se a rch Co m m a nd o n a Co nv e rte d File We enter SEVERE in the field for the string to search for. Then we click the column separator tab and uncheck all except the semicolon and click Accept.6. XML LOG File Parsing 304 . we click Next and follow the wizard steps as for any normal string search on a LOG file. Finally.Monitoring Studio KM for PATROL Version 8. This brings us to the last panel.

Monitoring Studio KM for PATROL
Version 8.6.53

String Se a rch Co nfirm a tio n

As a result, we get the following String search object: SEVERE under the XML-to-CSV pre-processing object.

A cce s s ing the String Se a rch R e s ults

You can create as many string searches as y ou want on a file and on a tex t-processing object, and y ou can create sev eral different tex t-processing objects on the same file object.

XML LOG File Parsing

305

Troubleshooting

Monitoring Studio KM for PATROL
Version 8.6.53

This section deals with troubleshooting. It tells you how to enable the debug mode and then states the most frequently asked questions based on issues encountered by customers.

Enabling the Debug Mode
By default, Monitoring Studio sends only the most critical information, such as warning and error messages to the System Output Window of the PATROL Consoles. Most often, this information is accurate enough to ensure that Monitoring Studio is properly working. If you encounter an issue, and want to report it to Sentry Software, you will be asked to enable the Debug Mode and provide the debug output to the Sentry Software support team.

Ena bling De bug M o d e

To enable the debug mode: 1. Right-click the main Monitoring Studio icon 2. Select KM commands> Options > Debug... 3. The panel show above pops-up. Check the Enable debug box. By default, Monitoring Studio will send its debug output to the System Output Window of the PATROL Consoles. When debugging the discovery process of Monitoring Studio at the starting time of the Agent, some debugging information may be lost by the PATROL Console, which is not yet connected to the PATROL

307

Monitoring Studio KM for PATROL
Version 8.6.53

Agent. In some other cases, such as when you want to trace the activity of Monitoring Studio for a few minutes, some debugging information may also be lost by the PATROL Console because its buffer is full. In these cases, it can be useful to send the debug output of Monitoring Studio to a specified file.

The debug file is stored on the computer where the A gent is running.

Pay attention to the file size! The debug output of Monitoring Studio may make the file v ery large after running for sev eral day s. Do not forget to turn off the debug mode once the necessary information is collected.

Enabling the Debug Mode

308

Reference Guide

Monitoring Studio KM for PATROL
Version 8.6.53

Introduction
This chapter gives you some additional information on Processes, WMI, Regular expression and Format symbols for macros.

About Processes
What’s a process
In practice, a process is basically a binary code being executed by processors. Processes are launched by the operating system (since the operating system controls the execution flow) and have several properties: PID (unique identifier of a process); Name; User ID; Command line that was used to launch the process (arguments passed to the binary); Environment; CPU and memory usage; Other various OS-specific properties.

How to identify a process
When you monitor an application, you typically want to check that the application's processes are running properly. The problem lies in how to identify the processes of this application, how to recognize them amongst all of the running processes. The only thing that really identifies a process is its PID (Process ID). But since the PID is an integer number randomly set upon the process startup, most often we cannot use it to identify the processes of an application (unless the application gives you its PID in a so-called PID file). In general, you recognize application processes by their name if this criterion is enough to distinguish them from other processes. If the name of the process is not sufficient, you can identify application processes by parsing the process’s command lines. This is typically useful with scripts and java processes, whose process names are the same: java, CSCRIPT.EXE, etc.

Process name
Under Windows, the name of a process is basically the file name of the binary file which is being executed: Java.exe, IisAdmin.Exe. It always includes the ".EXE" extension. Process names can easily be shown in Windows Task Manager. Under UNIX, the process name could be either the file name of the binary being executed, including the path or not, or something completely different (e.g. Oracle processes).

The naming of processes is highly platform dependant. Linux processes are not named in the same way as on HP-UX serv ers, for ex ample. Under UNIX, process names can be shown by ex ecuting the "ps –e –o name" command line.

310

Monitoring Studio KM for PATROL
Version 8.6.53

Process command line
Every process is launched through a command line, which consists of the file path to the binary which has to be executed, and arguments that have to be passed to the binary: <path to the binary file> <argument1> <argument2> etc. If the directory of the binary file is in the PATH environment variable, the path may not be included in the command line: <binary file name> <argument1> <argument2> etc. This is the only way to distinguish Java processes and scripts from others, because their process names are all identical (Java.EXE). Unfortunately, in Windows, there is no easy way to see the command lines of the currently running processes. Under UNIX, processes command lines can be shown by executing the "ps –e –o comm" command.

Process user ID
On both Windows and UNIX systems, processes run "as" a user. Depending on this, the process may be allowed to access various system resources (files, network, databases, etc.). In secured environments, most applications processes have to run as a specific user to let them access the application resources. If the processes run as another user, the application is very likely to fail and not run properly. This is why it could be important to check that the processes of the application you want to monitor are running as the appropriate user.

PID file
A classic way for applications to indicate they are running is to write the PID of their process into a given file. In this case we only need to read this file and check whether the PID written in the file corresponds to a running process. Please note that not the PID file is not provided for all the applications and most Windows applications do not provide PIDs.

About WMI
Definition
Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems. WMI is the Microsoft implementation of Web Based Enterprise Management (WBEM), which is built on the Common Information Model (CIM), a computer industry standard for defining device and application characteristics so that system administrators and management programs can control devices and applications from multiple manufacturers or sources in the same way.

About Processes

311

querying. This contains the classes with the Win32_ prefix representing various components of the Windows operating system and hosting computer. a namespace must be specified. setting and changing system properties. It is this schema that allows the wide variety of different resources to be uniformly managed.53 What does it do? WMI provides users with information about the status of local or remote computer systems. remoting.Monitoring Studio KM for PATROL Version 8. and more. assigning and changing drive labels. WMI "instruments" by modeling objects such as disks. Win32_LogicalDisk (Windows logical disk drives). It also supports such actions as the configuration of security settings. The namespace also includes the CIM_DataFile class which can be used to monitor files and folders. user extensions to the schema. and Win32_ComputerSystem (the computer hosting Windows). The word "Instrumentation" in WMI refers to the fact that WMI can get information about the internal state of computer systems.dmtf. Examples include Win32_Process (running processes in Windows). much like the dashboard instruments of cars can retrieve and display information about the state of the engine. You can use WMI to manage both local and remote computers. Only the classes contained within this namespace may be accessed by the connection. Classes are based on the extensible schema called the Common Information Model (CIM). Namespace CIM classes are organized into namespaces. setting and changing permissions for authorized users and user groups.6. WMI capabilities also include eventing. The following table lists common namespaces. instrumentation. It does not contain actual data about these resources since this data is dynamically retrieved as required. the Win32_LogicalDisk class models the logical disks installed on a computer. and enabling or disabling error logging. Anytime a connection is made to WMI. The CIM schema is a public standard of the Distributed Management Task Force (http://www. The repository holds the information required to work with live resources in the computing environment. Namespace root\cimv2 Description Contains the most useful classes including all Win32_ classes About WMI 312 . processes. These computer system objects are modeled using classes such as Win32_LogicalDisk or Win32_Process. or other objects found in Windows systems. as you might expect. backing up the object repository.org/). Each namespace in the CIM contains a logical group of related classes representing a specific technology or area of management. and the Win32_Process class models any processes currently running on a computer. WMI Concepts CIM Repository CIM stands for Common Information Model and the repository is the WMI schema that stores the class definitions that model WMI-managed resources. views. The most common namespace used for Windows management is root\cimv2. scheduling processes to run at specific times.

A class is a template for each type of resource and defines the properties that will be collected for that resource. Manual.Monitoring Studio KM for PATROL Version 8. or Disabled) Current state of the service (Running. WQL is a subset of About WMI 313 .exe -k netsvcs Auto Running Property A property is unique piece of information about an instance. Class Win32_Process Win32_ComputerSystem CIM_DataFile Description Processes running on a Windows computer The computer running a Windows operating system A file stored on a disk Instance An Instance is a unique occurrence of a particular class. Displayed name of the service. Startup type of the service (Auto.53 root\default Contains registry events Class Every resource managed by WMI is defined by a class. Stopping. The C: drive is an instance of the Win32_LogicalDrive class. All instances of a class will have the same set of properties although the values each instance’s properties may differ. Examples of common WMI classes are shown in the table below:. For example. or Stopped) Basic WMI Queries Queries may be issued against WMI resources using WMI Query Language (WQL).6. each service installed on a Windows computer is an instance of the Win32_Service class. Sample Properties of the Win32_Service class are shown in the table below: Property Name DisplayName PathName StartMode State Description Unique name of the service. The command line path that was executed to start the service. Instance Name DisplayName PathName StartMode State Description Winmgmt Windows Management Instrumentation C:\WINDOWS\system32\svchost.

the percentage value is replaced by the actual current value of the parameter that triggered the alert. Typically * is used to simply retrieve all. Macros can be used to customize the content of each Alert Action. or starting processes. For intrinsic events. and some are "objectspecific" macros that are specific to the object.these can be used for any object. In case you need help to build your WMI query. For example: %{VALUE} is replaced by the actual current value of the parameter that triggered the alert. will usually include the ISA keyword to specify the class of the TargetInstance.exe' Description Specifies what properties are returned. WMI queries of this type are often issued from a script using Windows Script Host or from any application or tool that can access WMI. Each macro listed in the tables below contains information about what triggered the PATROL alert.6.Monitoring Studio KM for PATROL Version 8. Alert Action Macros A macro is a variable whose value is replaced when an Alert Action is triggered. A simple example of a WMI query would be: SELECT * FROM Win32_Process. you could download WMI CIM Studio – which is one of the WMI Administrative tools on the Microsoft site. Name = 'notepad. Win32_Process is the name of the WMI class for Windows processes. Specifies the event class to query.53 SQL designed to retrieve information from WMI. This retrieves all attributes (the * is used as a wildcard) for all processes currently running on the computer. General Macros The macros given in the table below can be used on any object: General Macros %{PARAMETER_NAME} %{VALUE} %{ALARM_TYPE} %{OBJECT_ID} Description Name of the parameter that triggered the alert Value of the parameter that triggered the alert Type of the alert triggered (ALARM. Queries retrieve specific information from instances of WMI resources or execute methods against instances to perform such actions as stopping services. Keyword SELECT FROM WHERE Example code SELECT * FROM __InstanceCreationEvent WHERE TargetInstance ISA 'Win32_Process' AND TargetInstance. Filters the results. This will be the extrinsic or intrinsic event class. such as databases or files or JMX applications etc. WARN or INFORMATION) PATROL ID of the object triggering the alert About WMI 314 . When used in the text field for a PATROL event Alert Action. Some macros are "general" or "common" .

use the following macro to get complete command line return output: %{PARENT_OSCOMMAND_RETURN_OUTPUT} ID of the object’s parent triggering the alert (the parent of a String object could be a LOG file.) Gets the parent's object of a macro. "String". Example: %{/worstParam} will be contain the name of the worst parameter on this instance. etc. etc.) Display name of the object’s parent triggering the alert Class ("..6. %{NEWLINE} %{/. which is an application instance built-in variable (see the "PATROL Script Language Reference" document). May be the database name for SQL Server.KM") of the object’s parent triggering the alert Type of the object’s parent triggering the alert ("File".KM") of the application triggering the alert Type of the application triggering the alert ("Application") Contact information in case of an application failure Description of the application List of files that identify the application as present %{PARENT_ID} %{PARENT_LABEL} %{PARENT_CLASS} %{PARENT_TYPE} %{APPLICATION_ID} %{APPLICATION_LABEL} %{APPLICATION_CLASS} %{APPLICATION_TYPE} %{APPLICATION_CONTACT} % {APPLICATION_DESCRIPTION} % {APPLICATION_EXISTENCEFILE S} %{ASCTIME:…} Current time when the Alert Action is performed. Specify a formatting as described under Format Symbols in the Reference section.g.} Object Specific Macros Database Macros %{DATABASE_TYPE} %{DATABASE_QUERY} %{DATABASE_NAME} Description Type of the database. Example: %{TIME:%H:%M:%S} will be replaced by 09:45:17 at run time Inserts carriage return Recommended for advanced users only Provides an internal instance variable name to be inserted. The path is relative to the object triggering the alert. or the Oracle SID for Oracle.) PATROL ID of the application triggering the alert Display name of the application triggering the alert Class (".KM") of the object triggering the alert Type of the object triggering the alert ("Process". "OSCommand"..Monitoring Studio KM for PATROL Version 8. Dynamic Object Macros %{DYNAMIC_RETUNR_OUTPUT} Description Returns the output of the dynamic object Alert Action Macros 315 .53 General Macros %{OBJECT_LABEL} %{OBJECT_CLASS} %{OBJECT_TYPE} %{PARENT_<PARENT MACRO>} Description Display name of the object triggering the alert Class (". Example: In the case of String Search performed in Command Line. e. SQL Server or Oracle SQL statement sent for execution Name of the database the SQL query is sent to.

53 File Macros %{FILE_CURRENT_NAME} %{FILE_NAME} Description Current file being monitored when monitoring a file whose name changes over time) Name of the monitored file as entered in the GUI File System Macro %{FILESYSTEM_NAME} Description Name of the monitored file system Folder Macro %{FOLDER_PATH} %{FOLDER_OLDEST_REMAINING_FILE} Description Folder being monitored Folder with the oldest remaining file HTTP Macros %{HTTP_RETURN_OUTPUT} %{HTTP_METHOD} %{HTTP_URL} Description Result of the HTTP request GET or POST depending on what was selected in the GUI URL being tested JMX Macros %{JMXPOLLING_SERVER_TYPE} %{JMXPOLLING_HOST} %{JMXPOLLING_PORT} %{JMXPOLLING_DOMAIN} %{JMXPOLLING_KEY_PROPERTY} %{JMXPOLLING_ATTRIBUTE} %{JMXPOLLING_CONTENT} Description Type of JMX server being polled Host name of JMX server polled Port number of the JMX server polled Domain of the JMX server polled Key property of the JMX server polled Attribute of the JMX server polled Content of the result output of the JMX server polled KM Watch Macros %{KMWATCH_CLASS} %{KMWATCH_ID} %{KMWATCH_PARAMETER} Description Class of the PATROL object being monitored Instance ID of the PATROL object being monitored Parameter name of the PATROL object being monitored MPF Macros %{MPF_CLASS} %{MPF_ID} %{MPF_FORMULA} Description Class of the PATROL object being monitored Instance ID of the PATROL object being monitored User-defined formula used to rescale the parameter value OS Command Macro %{OSCOMMAND_OSCOMMAND} %{OSCOMMAND_RETURN_OUTPUT} Description Command line being executed and analyzed Return output of the OS command Alert Action Macros 316 .Monitoring Studio KM for PATROL Version 8.6.

Monitoring Studio KM for PATROL Version 8. 161 by default Value of the OID being polled SNMP Trap Macros %{SNMPTRAP_IP} %{SNMPTRAP_FOUNDIP} %{SNMPTRAP_COMMUNITY} %{SNMPTRAP_ENTERPRISEID} %{SNMPTRAP_TRAPNUMBER} %{SNMPTRAP_FOUNDTRAPNUMBER} %{SNMPTRAP_CONTENT} Description Originating IP Address of the SNMP traps being looked for Actual originating IP address of the trap that has been received SNMP community string of the SNMP traps being looked for Enterprise ID (OID) of the SNMP traps being looked for SNMP Trap numbers (specific numbers) being looked for Actual SNMP trap number that has been received and matches the entered criteria Content of the found trap String search Macros %{STRING_SEARCHED_1} %{STRING_SEARCHED_2} %{STRING_LAST_MATCHING_LINE} Description First regular expression being searched for Second regular expressions being searched for Last line that match with the String search criteria WMI Macros %{WMI_HOST} %{WMI_NAME_SPACE} %{WMI_QUERY} %{WMI_USERNAME} %{WMI_RETURN_OUTPUT} Description Name of host where the WMI query is being run Namespace of the WMI query WMI statement sent for execution WMI execution username Content of the result output of the WMI query Alert Action Macros 317 .53 Process Macros %{PROCESS_NAME} %{PROCESS_COMMAND_LINE} %{PROCESS_USER_ID} %{PROCESS_PID_FILE} Description Process name being searched for. as entered in the GUI Path to the PID file whose corresponding process is being monitored SNMP Polling Macros %{SNMPPOLLING_OID} %{SNMPPOLLING_HOST} %{SNMPPOLLING_COMMUNITY} %{SNMPPOLLING_PORT} %{SNMPPOLLING_CONTENT} Description SNMP OID being polled SNMP Agent’s host name being polled SNMP community string being used to query the SNMP agent UDP port being used to poll the SNMP agent.6. as entered in the GUI Process command line being searched for. as entered in the GUI Process user ID being searched for.

53 WBEM Macros %{WBEM_HOST} %{WBEM_NAME_SPACE} %{WBEM_QUERY} %{WBEM_USERNAME} %{WBEM_RETURN_OUTPUT} Description Name of host where the WBEM query is being run Namespace of the WBEM query WBEM statement sent for execution WBEM execution username Content of the result output of the WBEM query Windows Event Macros %{NTEVENT_LOG} %{NTEVENT_SOURCE} %{NTEVENT_ID} %{NTEVENT_LAST_MATCHING} %{NTEVENT_LAST_MATCHING_CONTENT} Description Name of the Windows event log being monitored Windows Event source whose new entries are monitored ID of the Windows events being searched for Last matching event found Content of the NT event Windows Performance Macros %{PERFORMANCE_INSTANCELIST} %{PERFORMANCE_COUNTER} %{PERFORMANCE_PERFORMANCE} Description Windows performance object instances being monitored Windows performance counter being monitored Windows performance object name being monitored Windows Service Macros %{SERVICE_NAME} Description Name of the service of an NT service class Format Symbols for %{ASCTIME:…} Macros The following table recapitulates all of the time formats available in the %{TIME:…}. %{ASCTIME:…} and %{LASTTIME:…} macros in the Command Line execution wizard. the File monitoring and analysis wizard.6.Monitoring Studio KM for PATROL Version 8. and the Alert Actions wizard. Format %% %a %A %b %B %c Description This symbol allows you to use a percent sign (%) in the format of a date string Locale's abbreviated name of the day of week Locale's full name of the day of week Locale's abbreviated name of the month Locale's full name of the month Locale's appropriate date and time representation Alert Action Macros 318 .

53].53 %C %d %D %e %h %H %I %j %k %l %m %M %n %p %r %R %S %t %T %u %U %V Data and time as %c Day of month [1. with 1 representing Monday Week of the year as a decimal number [0. with Sunday as the first day of week 1 Week of the year as a decimal number [01.53].23]. and the next week. it is week 53 of the previous year. single digits are preceded by 0 Date as %m/%d/%y Day of month [1.12]. single digits are preceded by a space Locale's abbreviated name of the month Hour (24-hour clock) [0. single digits are preceded by 0 Day of year [1. Day of week as a decimal number [0.59]. or no bytes if no information of the time zone exists Locale's alternative appropriate date and time representation Name of the base year (period) in the locale's alternative representation Locale's alternative date representation Locale's alternative time representation Offset from %EC (year only) in the locale's alternative representation Alternative representation of the year in full Day of the month using the locale's alternative numeric symbols %w %W %x %X %y %Y %Z %Ec %EC %Ex %EX %Ey %EY %Od Format Symbols for %{ASCTIME:…} Macros 319 . Appropriate time representation in 12-hour clock format with %p Time as %H:%M Seconds [0. with Monday as the first day of week 1 Locale's appropriate date representation Locale's appropriate time representation Year within century [0.31]. is.m. with Monday as the first day of the week If the week containing 1 January has four or more days in the new year. single digits are preceded by a space Hour (12-hour clock) [1. week 1.m. single digits are preceded by 0 Hour (24-hour clock) [0. leading zero is permitted but not required Insert a new line Locale's equivalent of either a.7]. including the century (for example 1993) Abbreviated or full name of time zone.12].23]. with 0 representing Sunday Week of the year as a decimal number [0. single digits are preceded by a space Month as a decimal number [1.53].6.61] Insert a tab Time as %H:%M:%S Day of week as a decimal number [1.366].6]. single digits are preceded by 0 Minute [0.12]. then it is considered week 1.99] Year. otherwise.Monitoring Studio KM for PATROL Version 8. Or p.31]. single digits are preceded by 0 Hour (12-hour clock) [1.

You can use regular expressions in Monitoring Studio in order to: Find a process Search for strings in a file Check a web page Parse a table in a database Retrieve numbers.. will match Err01. Err7. ErrA1. A regular expression is: A string formatted with a specific syntax. ErrZ0. Err02 or ErrAB. (dot) Meaning Match any single character Example: Err. Regular expressions are commonly used in pattern matching. which will match the regular expression. etc. but not Err1A Err[A-Z0-9] will match ErrA0. etc. Err2 or Err3 [Ee]rror will match either error or Error Match any character not in the brackets Example: Err[^12345] will match Err0. but not Err1 Match any character in the range in the brackets Example: Err[0-9] will match Err0. etc. The following table describes the regular expression syntax that is supported in Monitoring Studio. It is intended to select some lines in a text. awk and sed commands. etc. Match any character in the brackets Example: Err[123] will match Err1. Err1. ErrA1. Err6. etc.6. and Err9 Err[A-Z][0-9] will match ErrA0. ErrS9. etc.Monitoring Studio KM for PATROL Version 8. and Err1A [xyz] [^xyz] [a-z] Format Symbols for %{ASCTIME:…} Macros 320 . Character .53 %Oe %OH %OI %Om %OM %OS %OU %Ow %OW %Oy Same as %Od Hour (24-hour clock) using the locale's alternative numeric symbols Hour (12-hour clock) using the locale's alternative numeric symbols Month using the locale's alternative numeric symbols Minutes using the locale's alternative numeric symbols Seconds using the locale's alternative numeric symbols Week of the year (Sunday as the first day of the week) using the locale's alternative numeric symbols Day of week (Sunday=0) using the locale's alternative numeric symbols Week of the year (Monday as the first day of the week) using the locale's alternative numeric symbols Year (offset from %C) in the locale's alternative representation and using the locale's alternative numeric symbols Regular Expressions Regular expressions are used in Monitoring Studio to define strings to be searched for. and especially on UNIX systems with the grep.

+ and \| ) Example: \(_[a-zA-Z0-9]\)+ will match only sequences like _patrol. It will not match a line that only contains the word unset Match the end of a word Example: [Aa]pplication\> will match all lines that contain the word Application or application but not ApplicationAA * + ^ $ \< \> \(expression\ Defines an expression which has to be processed as a unit regarding the modifier *. exprA\| exprB \ Match either exprA or exprB Example: \(firewall\)\|\(antivirus\) will match all lines that contains either the word firewall or the word antivirus Avoid the meaning of the following character Example: \.53 [^a-z] Match any character not in the range in the brackets Example: Application[^0-9] will match ApplicationA. _patrol_console.Monitoring Studio KM for PATROL Version 8. List of Application Classes There are 28 application classes in Monitoring Studio KM for PATROL. _patrol_agent. Error. Err11.*ApplicationABC will match all lines that contains Error and ApplicationABC further (Critical Error 0x000295F0 on ApplicationABC) Match one or more repetitions of the preceding Example: Err[0-9A-F]+ will match Err0. etc. Err0. etc. If the KM is properly loaded. but not Err Match the beginning of the line Example: ^Err will match all lines that begin with Err Match the end of the line Example: [0-9]+ connections$ will match all lines that end with xxx connections where xxx is an integer Match the beginning of a word Example: \<set will match any line that contains a word that begins with set. ErrA. ApplicationB. will match the single character dot (. ErrBF0001. etc. Err11. ErrA. ErrBF0001.) C:\\Program Files will match C:\Program Files Application Classes This section lists the 22 application classes of Monitoring Studio KM for PATROL with details on the parameters discovered and the menu commands available for each application class. the following classes should be loaded on the monitored system and console: Application Class SW_APPLICATIONS SW_DB_QUERIES Description Monitors application/container icons Executes and monitors database queries Regular Expressions 321 .6. Application! but not Application1 Match zero or more repetitions of the preceding Example: Err[0-9A-F]* will match Err.

Monitoring Studio KM for PATROL Version 8. HTML. XML) text to enable string/numeric value searches Executes and monitors WBEM queries Application Classes 322 .6. monitors and parses command lines and scripts Monitors processes Main application class Polls and monitors SNMP devices Monitors and listens for SNMP traps Executes string searches Transforms complex (multi-line.53 SW_DYNAMIC SW_DYNAMIC_CONTAINER SW_DYNAMIC_DISCOVERY SW_DYNAMIC_NUMBERS SW_DYNAMIC_STRING SW_FILES SW_FILE_SECURITY SW_FILESYSTEMS SW_FOLDERS SW_HTTP_REQUESTS SW_HTTP_WEBFARM SW_JMX SW_KMWATCH SW_NTEVENTS SW_NTPERFORMANCE SW_NTSERVICES SW_NT_WMI SW_NUMBERS SW_OSCOMMANDS SW_PROCESSES SW_SENTRY SW_SNMP_POLLING SW_SNMP_TRAPS SW_STRINGS SW_TRANSFORM SW_WBEM Executes Dynamic Items Creates a Dynamic Object Container Creates a Dynamic Object Builder Performs dynamic numeric value extractions Executes dynamic string searches Monitors files and file content Monitors file security Monitors file-systems Monitors folders Monitors web-based applications and executes HTTP requests Monitors web farms Polls and monitors JMX-enabled application servers Monitors parameters of other KMs Monitors Windows Event Logs Monitors Windows Performance counters Monitors Windows Services Executes and monitors WMI queries Performs numeric value extractions Executes.

Monitoring Studio KM for PATROL Version 8. device.53 SW_APPLICATIONS You can create SW_APPLICATIONS instances (application/container icons) through the New > Application icon (container)… Menu Command of the Monitoring Studio icon. Infobox Name ID Parent ID Application ID First required file Second required file Third required file Fourth required file Constant 1 Constant 2 Constant 3 Constant 4 Constant 5 Contact Description Start command line Stop command line Description PATROL internal identifier of the application/container icon PATROL internal identifier of the parent icon PATROL internal identifier of the root parent icon File whose presence is required to activate the monitoring of this application/ container File whose presence is required to activate the monitoring of this application/ container File whose presence is required to activate the monitoring of this application/ container File whose presence is required to activate the monitoring of this application/ container Name of the first application constant Name of the second application constant Name of the third application constant Name of the fourth application constant Name of the fifth application constant Name or contact information of the person in charge of the application Description of the application Displays the command line that will be used to start the application by the "Manage > Start the application" Menu Command Displays the command line that will be used to stop the application by the "Manage > Stop the application" Menu Command Application Classes 323 . SW_APPLICATIONS instances may contain other SW_APPLICATIONS instances (containers and sub-containers). Parameters None. SW_APPLICATIONS instances are used to group different monitoring tools configured to monitor a given application. or any other IT component.6.

Adds an HTTP Request analysis using the New HTTP Request wizard Adds a Web-farm monitoring using the New web-farm wizard Adds an SNMP polling monitoring using the New SNMP polling wizard Adds an SNMP polling monitoring using the New SNMP Trap wizard Adds a Windows Event monitoring using the New Windows Event wizard (only available on Windows servers) Adds a Windows Performance counter monitoring using the New Windows Performance wizard (only available on Windows servers) Adds another KM parameter monitoring using the New KM Watch wizard Starts the new sub-container icon wizard Allows you to edit the Application monitoring Modifies the application constants Sets the polling interval Allows you to add Alert Actions that will be used for the application as well as its dependent objects Displays the Monitoring Studio configuration report of this Database Query instances and all dependent instances Cuts this application/container object Copies this application/container object Pastes a previously copied or cut object into this application/container Deletes the application monitoring and all its dependent objects Allows you to rename this application monitoring Allows you to start the application using the Start command line. Allows you to export the configuration of this application/container along with all of its dependent objects Application Classes 324 .6.Monitoring Studio KM for PATROL Version 8.53 Menu Commands Menu Command New > Process monitoring New> Windows Service monitoring New > File monitoring and analysis New > Folder monitoring New > File System monitoring New > Command line analysis New > Database Query analysis New> Java MBean Polling New> WMI Query analysis New > Web Request analysis New > Web-farm monitoring New > SNMP polling New > SNMP Trap listening New > Windows Event monitoring New > Windows Performance monitoring New > KM Watch New > Sub-container Edit Modify Application constants Set Polling Interval Set Global Alert Actions Display Object Configuration Cut Copy Paste Delete Rename Manage > Start Application Manage > Stop Application Export configuration Description Adds a Process monitoring using the New Process wizard Adds a Windows Service monitoring using the New Windows Service wizard (only available on Windows servers) Adds a File monitoring using the New File wizard Adds a Folder monitoring using the New Folder wizard Adds a File System monitoring using the File System wizard Adds an OS Command monitoring using the New OS Command wizard Adds a Database Query analysis using the New Database Request wizard. Allows you to stop the application using the Stop command line. Adds a JMX polling using the Java MBean polling wizard Adds a WMI Query analysis using the new WMI query wizard.

6.53 Menu Command Pause monitoring Resume monitoring Description Allows you to pause the monitoring of the application as well as all its dependent objects Allows you to resume the monitoring of the application as well as all its dependent objects after it has been paused Application Classes 325 .Monitoring Studio KM for PATROL Version 8.

1 =ALARM Value set by DbQueryColl every 2 minutes ReturnOutput Displays the output of the Database query execution Unit: N/A Value set by DbQueryColl every 2 minutes ExecutionTime Displays the SQL query execution time Unit: second(s) Value set by DbQueryColl every 2 minutes DbQueryColl Database Request collector Executes the SQL query Default polling interval: 2 minutes Infobox Name ID Parent ID Application ID Database Type Connection Type Hostname Database name Connect as SQL Query Description PATROL internal identifier of the Database query analysis PATROL internal identifier of the parent application PATROL internal identifier of the Database query’s root application Displays the Database type Displays the connection type Display the name of the host machine Displays the database name Login used to connect to the database server Displays the SQL query that will be executed Menu Commands Menu Command New > String search Description Creates a new String search for this Database Query analysis Application Classes 326 .Monitoring Studio KM for PATROL Version 8.6. 1 = ALARM Value set by DbQueryColl every 2 minutes QueryStatus Displays whether or not the query was successfully executed Unit: 0 = OK.53 SW_DB_QUERIES Parameters Name ConnectionStatus Description State of the server connection Unit: 0 = OK.

Monitoring Studio KM for PATROL Version 8.53 Menu Command New > Numeric value extraction New > Text Pre-Processing New > Dynamic Object Builder Edit Set Thresholds Set Polling Interval Set Alert actions Description Creates a new Numeric Value extraction for this Database Query analysis Creates a new Text pre-processing for this Database Query analysis Creates a new Dynamic Object Builder for this Database Query analysis Edits the Database Query monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this Database Query analysis monitoring Adds specific Alert Actions to the Database Query analysis monitoring Display Object Configuration Displays the Monitoring Studio configuration report of this Database Query object and all dependent objects Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Refresh parameters Cuts this object Copies this object Pastes a previously copied or cut Database Query analysis object Deletes the Database Query analysis monitoring and all its dependent objects Allows you to rename this Database Query analysis monitoring Pauses the monitoring of this Database Query analysis object Resumes the monitoring of this Database Query analysis object Refreshes all instance parameters of the Database Query analysis monitoring Application Classes 327 .6.

Monitoring Studio KM for PATROL Version 8.53 SW_DYNAMIC Parameters Name Status Description Instance missing status Unit: 0 = Present.6. 1 = Missing Default pooling interval: 1 minute ExtractedLine Displays the output of the dynamic object Infobox Name ID Description Dynamic object ID Application Classes 328 .

Monitoring Studio KM for PATROL Version 8.53 SW_DYNAMIC_CONTAINER Parameters None.6. Infobox Name ID Parent ID Application ID Description Dynamic container ID PATROL internal identifier of the KM command to which dynamics objects are linked PATROL internal identifier of the root parent icon Application Classes 329 .

53 SW_DYNAMIC_DISCOVERY Parameters None.Monitoring Studio KM for PATROL Version 8. Infobox Name ID Parent ID Type Dynamic Object Display Name Dynamic Object ID Column Separator Include Object Matching Exclude Object Matching Alarm on Missing Objects Description Dynamic discovery ID PATROL internal identifier of the parent application Dynamic object type Defines how dynamic object labels are generated Defines how dynamic object IDs are generated Defines symbols used to separate columns in the dynamic parent output file Keeps only lines matching a user-defined regular expression from the dynamic parent output file Discard lines matching a user-defined regular expression from the dynamic parent output file States the user-defined settings for alarm triggering on missing objects Menu Commands Menu Command New > String search New > Numeric value extraction Edit Set Alert actions Display Object Configuration Cut Copy Paste Delete Description Creates a new String search for this File Creates a new Numeric Value extraction for this File Edits the File monitoring settings Adds specific Alert Actions to the File monitoring Displays the Monitoring Studio configuration report of this File monitoring object and all dependent objects Cuts this object Copies this object Pastes a previously copied or cut File monitoring object Deletes the File monitoring and all its dependent objects Application Classes 330 .6.

Monitoring Studio KM for PATROL Version 8.53 SW_DYNAMIC_NUMBERS Parameters Name ValueFound Value Description States if a numeric valued has been found Value of the searched Numeric Value (no value will be given if no number is found) Value set by the collector of the parent’s object Infobox Name ID Parent ID Line Mode Column Mode Parameter Type Line numerics Regular Expression Skip blank lines After/Before Specified String Character Offset Field numeric Field Separators Description PATROL internal identifier of the numeric extraction PATROL internal identifier of the numeric extraction’s parent Method used to select lines to search for the numeric Method chosen to search and extraction the number in the line Type of the parameter Line numbers in which the numeric will be extracted from Regular expression used to select the lines where the number will be searched for Indicates whether or not blank lines are skipped when searching for the numeric Searches for the numeric either after or before the specified string Searches for the number before or after this specified string Character offset where the number is searched for Numeric of the field in which the numeric will be searched for Characters that separates the fields in a text line Application Classes 331 .6.

6.53 SW_DYNAMIC_STRINGS Parameters Name MatchingLineCount Description Indicate if a matching string has been found Value set by the collector of the parent object Infobox Name ID Parent ID Type Lines Run Alert Actions Description PATROL internal identifier of the Dynamic String search PATROL internal identifier of the Dynamic String search’s parent Dynamic String type Lines that are searched When Alert Actions have to be executed Application Classes 332 .Monitoring Studio KM for PATROL Version 8.

File name and path (with wildcards) List of parameters that are currently being used for the File monitoring File scan mode (either "From start" or "From last position") File name path of the file currently being monitored Menu Commands Menu Command Description Application Classes 333 .53 SW_FILES Parameters Name GrowthPercentage Description File growth percentage Unit: Percent per minute (%/min) Value set by fileColl FileColl Collects information about the file Default polling interval: 2 minutes GrowthSpeed File growth speed Unit: Kilobytes per minute (KB/min) Value set by fileColl Size File size Unit: Kilobytes (KB) Value set by fileColl LastChanged Elapsed time since the file was modified Unit: Minutes (min) Value set by fileColl Exists Determines whether the file exists or not Unit: 0 = Exists. 1 = Does not exist Value set by fileColl Infobox Name ID Parent ID Application ID File name & path Monitored parameters Scan mode Monitored file Description PATROL internal identifier of the File monitoring PATROL internal identifier of File’s parent PATROL internal identifier of the File’s root application.6.Monitoring Studio KM for PATROL Version 8.

Numeric value search is performed for this File.6.Monitoring Studio KM for PATROL Version 8. restart the File scan from the Beginning of the File (only relevant to "LOG" Files) Pauses the File monitoring Resumes the File monitoring as well as all its dependent objects Refreshes all instance parameters of the SW_FILES class Application Classes 334 .53 New > String search New > Numeric value extraction New > Text Pre-Processing New > File security check New > Dynamic Object Builder Edit Set Thresholds Set Polling Interval Set Alert actions Display Object Configuration Cut Copy Paste Delete Rename View file content Restart scan from start of file Pause monitoring Resume monitoring Refresh parameters Creates a new String search for this File Creates a new Numeric Value extraction for this File Creates a new Text pre-processing for this File Creates a new File security monitoring for the current File Creates a new Dynamic Object Builder for the current file Edits the File monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this File monitoring Adds specific Alert Actions to the File monitoring Displays the Monitoring Studio configuration report of this File monitoring object and all dependent objects Cuts this object Copies this object Pastes a previously copied or cut File monitoring object Deletes the File monitoring and all its dependent objects Allows you to rename this File monitoring Displays the File content If a String.

1 = File’s owner has changed Value set by fileSecurityColl every 2 minutes Infobox Name ID Parent ID Application ID Description PATROL internal identifier of the File security check PATROL internal identifier of the File security check’s parent PATROL internal identifier of the File security check’s root application Menu Commands Menu Command Edit Set Polling Interval Set Alert Actions Display Object Configuration Cut Copy Delete Description Edits the File security monitoring settings Sets the polling interval for this File monitoring Adds specific Alert Actions to the File security monitoring Displays the Monitoring Studio configuration report of this File security monitoring object and all dependent objects Cuts this File security monitoring object. Copies this File security monitoring object Deletes the File security monitoring and all its dependent objects Application Classes 335 . 1 = File’s group has changed Value set by fileSecurityColl every 2 minutes OwnerCheck File’s owner status. Unit: 0 = OK. 1 = File content has changed Value set by fileSecurityColl every 2 minutes GroupCheck File’s group status. no changes made to the content) Unit: 0 = OK.53 SW_FILE_SECURITY Parameters Name fileSecurityColl Description Collects the security information about the monitored file Default polling: 2 minutes AccessRightsCheck File’s access right status. 1 = File’s access rights have changed Value set by fileSecurityColl every 2 minutes Integrity File’s integrity status (i. Unit: 0 = OK.6.Monitoring Studio KM for PATROL Version 8. Unit: 0 = OK.e.

6.Monitoring Studio KM for PATROL Version 8.53 Menu Command Rename Acknowledge and Update Pause monitoring Resume monitoring Refresh parameters Description Renames this File security monitoring Acknowledges all the alerts on this File security object and updates its settings to reflect any security changes made Pauses the File security monitoring Resumes the File security monitoring Refreshes all instance parameters of the SW_FILE_SECURITY application class Application Classes 336 .

Unit: Megabytes (MB) Value set by FileSystemColl every 2 minutes Infobox Name ID Parent ID Application ID File system object Description PATROL internal identifier of the File systems monitoring PATROL internal identifier of File systems’ parent PATROL internal identifier of the File systems’ root application File System object monitored Menu Commands Menu Command Edit Set Thresholds Set Polling Interval Set Alert Actions Display Object Configuration Cut Copy Delete Description Edits the File system monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this File systems monitoring Adds specific Alert Actions to the File systems monitoring Displays the configuration report of this File system object and all dependent objects Cuts this File system monitoring object Copies this File system monitoring object Deletes the File systems monitoring and all its dependent objects Application Classes 337 .6. Unit: Percent (%) Value set by FileSystemColl every 2 minutes FreeMegabytes File system free space left in megabytes. in percentage of its size Unit: Percentage per hour (%/h) Value set by FileSystemColl every 2 minutes UsedSpaceGrowthSpeed How fast the file system is getting filled in Unit: Megabytes per hour (MB/h) Value set by FileSystemColl every 2 minutes FreeSpacePercent File system free space left in percentage.53 SW_FILESYSTEMS Parameters Name UsedSpaceGrowthPercentage Description How fast the file system is getting filled in.Monitoring Studio KM for PATROL Version 8.

6.53 Rename Pause monitoring Resume monitoring Refresh parameters Allows you to rename this File systems monitoring Pauses the File systems monitoring Resumes the File systems monitoring Refreshes all instance parameters of the SW_FILESYSTEMS application class Application Classes 338 .Monitoring Studio KM for PATROL Version 8.

the number of files is the sum of the number of files of every sub. If the option "Include sub-folders" is selected. Default polling interval: 2 minutes FileCount Displays the number of files in a folder.folders and the main folder Unit: file(s) Value set by FolderColl NewFileCount Displays the number of new files per minute Unit: Displays the number of new files per minute Value set by FolderColl DeletedFileCount Displays the number of deleted files per minute Unit: File(s) per minute (File(s)/min) Value set by FolderColl ModifiedFileCount Displays the number of modified files per minute Unit: File(s) per minute (File(s)/min) Value set by FolderColl GrowthSpeed Displays the folder size growth per minute Unit: Kilobyte(s) per minute (KB/min) Value set by FolderColl FolderSize Displays the folder size (include sub-folders) in MB Unit: Megabyte(s) (MB) Value set by FolderColl Application Classes 339 .6.53 SW_FOLDERS Parameters Name GrowthPercentage Description Displays the percentage of the folder size growth per minute Unit: Percent per minute (%/min) Value set by FolderColl LastModifiedFileElapsedTime Displays the elapsed time since the last modification of any file in this folder Unit: Minute(s) (min) Value set by FolderColl OldestModifiedFileElapsedTim e Displays the elapsed time since the oldest modification of any file in this folder or subfolder Unit: Minute(s) (min) Value set by FolderColl FolderColl Folder collector.Monitoring Studio KM for PATROL Version 8.

6.Monitoring Studio KM for PATROL Version 8. Copies this Folder monitoring object Deletes the Folder monitoring Renames the Folder monitoring Pauses the Folder monitoring Resumes the Folder monitoring Refreshes all instance parameters of the SW_FOLDERS class Application Classes 340 . Allows you to set or edit the thresholds Sets the polling interval for this Folder monitoring Adds specific Alert Actions to the Folder monitoring Displays the Monitoring Studio configuration report of this Folder monitoring object and all dependent objects Cuts this Folder monitoring object.53 Name LongestTimeFileRemainsInFol der Description Displays the longest time an existing file has been placed in the folder. Unit: Minutes (min) Infobox Name ID Parent ID Application ID Folder Include subfolders Description PATROL internal identifier of the Folder monitoring PATROL internal identifier of the Folder’s parent PATROL internal identifier of the Folder’s root application Path of the monitored folder Displays whether subfolders are monitored or not Menu Commands Menu Command Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Edits the Folder monitoring settings.

6. 1 = WARNING. 1 = ALARM Value set by httpRequestColl HTTPStatusCode HTTP Response Status code Unit: 200=OK. 2 = ALARM Value set by httpRequestColl Infobox Name ID Parent ID Application ID Used HTTP method Description PATROL internal identifier of the HTTP Request analysis PATROL internal identifier of the HTTP Request’s parent PATROL internal identifier of the HTTP Request’s root application HTTP method that is used for this HTTP Request analysis Menu Commands Menu Command New > String search New > Numeric value extraction Description Creates a new String search for this Web Request Creates a new Numeric Value extraction for this Web Request Application Classes 341 .53 SW_HTTP_REQUESTS Parameters Name httpRequestColl Description HTTP Request collector Default polling interval: 2 minutes ReturnOutput ExecutionTime Displays the returned output of the HTTP Request execution. 404 = Error Value set by httpRequestColl Status HTTP Request status.Monitoring Studio KM for PATROL Version 8. Unit: 0 = OK. Time taken by the HTTP request to execute Unit: Seconds(s) Value set by httpRequestColl ServerConnectionState State of the connection to the server Unit: 0 = OK.

53 Menu Command New > Text Pre-Processing New > Dynamic Object Builder Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Creates a new Text pre-processing for this Web Request Creates a new Dynamic Object Builder for this Web Request Edits the Web Request analysis settings. Allows you to set or edit the thresholds Sets the polling interval for this Web Request monitoring object Adds specific Alert Actions to the Web Request analysis Displays the Monitoring Studio configuration report of this Web request object and all dependent objects Cuts this Web request object Copies this Web request object Pastes a previously copied or cut String search or Numeric Value search object Deletes the Web Request analysis and all its dependent objects Renames the Web Request monitoring object Pauses the Web Request analysis as well as all its dependent objects Resumes the Web Request analysis as well as all its dependent objects Refreshes all parameters of this Web request object Application Classes 342 .Monitoring Studio KM for PATROL Version 8.6.

A new Web request monitoring will be created for each host added Adds specific Alert Actions to the Web-farm monitoring Displays the Monitoring Studio configuration report of this Web-farm monitoring object and all dependent objects Cuts this Web farm monitoring object Copies this Web farm monitoring object Pastes a previously copied or cut Web request monitoring object Deletes the Web-farm monitoring and all its dependent objects Renames the Web-farm monitoring object Application Classes 343 .53 SW_HTTP_WEBFARM Parameters Name OperationalServerPercent Description Number of servers that are operational Unit: Server(s) Value set by httpWebFarmColl OperationServerCount Percentage of operational servers Unit: Percent (%) Value set by httpWebFarmColl httpWebFarmColl HTTP Web-farm collector Polling interval: 1 minute Infobox Name ID Parent ID Application ID Description PATROL internal identifier of the Web-farm monitoring PATROL internal identifier of the Web-farm monitoring’s parent PATROL internal identifier of the Web-farm monitoring’s root application Menu Commands Menu Command New > String search New > Numeric value extraction New > Text Pre-Processing Edit Add hosts Set Alert actions Display Object Configuration Cut Copy Paste Delete Rename Description Creates a new String search for this Web-farm monitoring Creates a new Numeric Value extraction for this Web-farm monitoring Creates a new Text pre-processing for this Web-farm monitoring Edits the Web-farm monitoring settings Adds new hosts to the Web-farm monitoring.6.Monitoring Studio KM for PATROL Version 8.

53 Menu Command Pause monitoring Resume monitoring Refresh parameters Description Pauses the Web-farm monitoring as well as all its dependent objects Resumes the Web-farm monitoring as well as all its dependent objects Refreshes all instance parameters of the Web-farm monitoring Application Classes 344 .Monitoring Studio KM for PATROL Version 8.6.

53 SW_JMX Parameters Name JMXColl Description JMX collector.% JAVA_HOME%\bin) Displays the execution timeout Displays the domain monitored Displays the key property monitored Displays the attribute monitored Application Classes 345 .6. 1= ALARM Value set by JMXColl every 2 minutes Value Displays the value of an attribute in integers Value set by JMXColl every 2 minutes Text Displays the value of an attribute in text Value set by JMXColl every 2 minutes Delta DeltaPerSecond Displays the difference between values collected during two consecutive polling Displays the value corresponding to "Delta" devided by the elapsed time in seconds between the collection times Infobox Name ID Parent ID Application ID Server type Host Port JMX Query User Name Path to java Timeout Domain Key property Attribute Description PATROL internal identifier of the JMX polling object PATROL internal identifier of the JMX polling object’s parent PATROL internal identifier of the JMX polling object’s root application Type of JMX server (JBoss/WebLogic/generic etc.g.) Displays name of host machine Displays port number of JMX server Displays the query to be executed Displays the user name Displays the path of the java virtual machine on the local server (e. Executes the JMX polling query Default polling interval set at 2 minutes ExecutionStatus Displays the output of the JMX poll execution Unit: 0 =OK.Monitoring Studio KM for PATROL Version 8.

6.53 Menu Commands Menu Command New > String search New > Numeric value extraction New > Text Pre-Processing New > Dynamic Object Builder Edit Set Thresholds Set Polling Interval Set Alert actions Display Object Configuration Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Creates a new String search for this JMX polling object Creates a new Numeric value extraction for this JMX polling object Creates a new Text pre-processing for this JMX polling object Creates a new Dynamic Object Builder for this JMX polling object Allows you to edit the JMX polling settings Allows you to set or edit the thresholds Sets the polling interval for this JMX polling object monitoring Adds specific Alert Actions to the JMX polling monitoring Displays the Monitoring Studio configuration report of this JMX polling object and all dependent objects Cuts this object Copies this object Pastes a previously copied or cut JMX polling object Deletes the JMX polling and all its dependent objects Allows you to rename this JMX polling object monitoring Pauses the monitoring of this JMX polling object Resumes the monitoring of this JMX polling object Refreshes all instance parameters of the JMX polling object monitoring Application Classes 346 .Monitoring Studio KM for PATROL Version 8.

6. Unit: Depends on the parameter Value set by KMWatchColl Infobox Name ID Parent ID Application ID Class Instance Parameter Scale Description PATROL internal identifier of the KM Watch monitoring PATROL internal identifier of the KM Watch’ parent PATROL internal identifier of the KM Watch’s root application Class of the parameter that is being monitored Instance of the parameter that is being monitored Name of the parameter that is being monitored Scale used for the parameter’s value Menu Commands Menu Command Edit Set Thresholds Set Polling Intervals Set Alert Actions Display Object Configuration Cut Copy Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Edits the KM Watch monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this KM Watch monitoring Adds specific Alert Actions to the KM Watch monitoring Displays the Monitoring Studio configuration report of this KM Watch object and all dependent objects Cuts this KM Watch monitoring object Copies this KM Watch monitoring object Deletes the KM Watch monitoring Renames the KM Watch monitoring object Pauses the KM Watch monitoring Resumes the KM Watch monitoring Refreshes all instance parameters of the SW_KMWATCH class Application Classes 347 .53 SW_KMWATCH Parameters Name KMWatchColl Description Collects values by getting the information from the monitored parameter and setting the KM Watch value parameter with this value Default pooling interval: 1 minute Value Value of the parameter that is being monitored.Monitoring Studio KM for PATROL Version 8.

6.53 SW_NTEVENTS Parameters Name MatchingEventRate Description Rate of matching Windows Events Unit: Event/minute Value set by NTEventColl MatchingEventCount Number of Matching Windows Events Unit: Event Value set by NTEventColl Infobox Name ID Parent ID Application ID Event log Event source Event ID Acknowledging Windows Event Acknowledge Timeout Run Alert Actions Description PATROL internal identifier of the Windows Event monitoring PATROL internal identifier of the Windows Event’s parent PATROL internal identifier of the Windows Event’s root application Indicates which EventLog is searched Source of the event to be searched for ID of the event to be searched for Is the auto-acknowledgment activated What is to be acknowledged: one event or all events Time after which a matching Windows Even is acknowledged Alert Actions trigger Menu Commands Menu Command Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Delete Description Edits the Windows Event monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this Windows Event monitoring Adds specific Alert Actions to the Windows Event monitoring Displays the Monitoring Studio configuration report of this Windows Event object and all dependent objects Cuts this Windows Event monitoring object Copies this Windows Event monitoring object Deletes the Windows Event monitoring Application Classes 348 .Monitoring Studio KM for PATROL Version 8.

6.Monitoring Studio KM for PATROL Version 8.53 Menu Command Rename Acknowledge all and reset Pause monitoring Resume monitoring Refresh parameters Description Renames the Windows Event monitoring Acknowledges all alerts and resets the "MatchingEventCount" parameter to ‘0’ Pauses the Windows Event monitoring Resumes the Windows Event monitoring Refreshes all instance parameters of the SW_NTEVENTS class Application Classes 349 .

) when more than one instance was selected Scale used (the original performance value is divided by this number) Menu Commands Menu Command Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Delete Rename Pause monitoring Resume monitoring Description Edits the Windows Performance monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this Windows Performance monitoring Adds specific Alert Actions to the Windows Performance monitoring Displays the Monitoring Studio configuration report of this Windows Performance object and all dependent objects Cuts this Windows Performance monitoring object Copies this Windows Performance monitoring object Deletes the Windows Performance monitoring Renames the Windows Performance monitoring Pauses the Windows Performance monitoring Resumes the Windows Performance monitoring Application Classes 350 . Default Polling Interval: 2 minutes Value Value of the monitored Windows Performance counter. etc.53 SW_NTPERFORMANCE Parameters Name NTPerformanceColl Description Collects Windows Performance counter values. maximum.Monitoring Studio KM for PATROL Version 8.6. Unit: Depends on the parameter Value set by NTPerformanceColl Infobox Name ID Parent ID Application ID Performance object Counter Instances Value Type Scale Description PATROL internal identifier of the Windows Performance monitoring PATROL internal identifier of the Windows Performance’s parent PATROL internal identifier of the Windows Performance’s root application Name of the Windows Performance object that is read Name of the Windows Performance counter that is read Selected Windows performance instances How the value is calculated (average.

6.Monitoring Studio KM for PATROL Version 8.53 Menu Command Refresh parameters Description Refreshes all instance parameters of the SW_NTPERFORMANCE class Application Classes 351 .

53 SW_NTSERVICES Parameters Name Status Description Status of the Windows Service Unit: 0 = Started.Monitoring Studio KM for PATROL Version 8. 1 = Intermediate state.6. 2 = Stopped Value set by NTServiceColl Infobox Name ID Parent ID Application ID Service name Description PATROL internal identifier of the Windows Service monitoring PATROL internal identifier of the Windows Service’s parent PATROL internal identifier of the Windows Service’s root application Name of the Service that is monitored Menu Commands Menu Command Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Edits the Windows Service monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this Windows Service monitoring Adds specific Alert Actions to the Windows Service monitoring Displays the Monitoring Studio configuration report of this Windows Service object and all dependent objects Cuts this Windows Service monitoring object Copies this Windows Service monitoring object Deletes the Windows Service monitoring Renames the Windows Service monitoring Pauses the Windows Service monitoring Resumes the Windows Service monitoring Refreshes all instance parameters of the SW_NTSERVICES class Application Classes 352 .

1 =ALARM Value set by WMIQueryColl every 2 minutes Infobox Name ID Parent ID Application ID Parent type Host Name Space WMI Query User Name Description PATROL internal identifier of the WMI query object PATROL internal identifier of the WMI query object’s parent PATROL internal identifier of the T WMI query object’s root application Type of the parent (File. Executes the WMI query Default polling interval set at 2 minutes ReturnOutput Displays the output of the WMI query execution Unit: N/A Value set by WMIQueryColl every 2 minutes QueryStatus Displays whether or not the query was successfully executed Unit: 0 = OK.Monitoring Studio KM for PATROL Version 8.: root\cimv2) Displays the query to be executed Displays the user name Menu Commands Menu Command New > String search New > Numeric value extraction New > Text PreProcessing New > Dynamic Object Builder Edit Set Thresholds Description Creates a new String search for this WMI query Creates a new Numeric Value extraction for this WMI query Creates a new Text pre-processing for this WMI query Creates a new Dynamic Object Builder for this WMI query Allows you to edit the WMI query monitoring settings Allows you to set or edit the thresholds Application Classes 353 .g.6. etc.53 SW_NT_WMI Parameters Name Description WMIQueryColl WMI Request collector. OSCommand.) Displays name of host machine Displays WMI namespace (e.

53 Menu Command Set Polling Interval Set Alert actions Display Object Configuration Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Sets the polling interval for this WMI query monitoring Adds specific Alert Actions to the WMI query monitoring Displays the Monitoring Studio configuration report of this WMI query object and all dependent objects Cuts this object Copies this object Pastes a previously copied or cut WMI query object Deletes the WMI query monitoring and all its dependent objects Allows you to rename this WMI query monitoring Pauses the monitoring of this WMI query object Resumes the monitoring of this WMI query object Refreshes all instance parameters of the WMI query monitoring Application Classes 354 .6.Monitoring Studio KM for PATROL Version 8.

Monitoring Studio KM for PATROL Version 8. 1 =ALARM Value set by WBEMIQueryColl every 2 minutes QueryStatus Infobox Name ID Parent ID Application ID Host Name Space Description PATROL internal identifier of the WBEM query object PATROL internal identifier of the WBEM query object’s parent PATROL internal identifier of the T WBEM query object’s root application Displays name of host machine Displays WBEM namespace Displays the query to be executed WBEM Query User Name Displays the user name Menu Commands Menu Command New > String search New > Numeric value extraction New > Dynamic Object Builder Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Delete Description Creates a new String search for this File Creates a new Numeric Value extraction for this File Creates a new Dynamic Object Builder for this File Edits the Process monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this instance Adds specific Alert Actions to the Process monitoring Displays the Monitoring Studio configuration report of this Process monitoring object and all dependent objects Cuts this Process monitoring object Copies this Process monitoring object Deletes the Process monitoring Application Classes 355 .53 SW_WBEM Parameters Name WBEMQueryColl ReturnOutput Description WBEM Request collector.6. Executes the WBEM query Default polling interval set at 2 minutes Displays the output of the WBEM query execution Unit: N/A Value set by WBEMQueryColl every 2 minutes Displays whether or not the query was successfully executed Unit: 0 = OK.

53 Menu Command Rename Pause monitoring Resume monitoring Refresh parameters Description Renames the Process monitoring object Pauses the Process monitoring Resumes the Process monitoring Refreshes all instance parameters of the SW_PROCESSES class Application Classes 356 .6.Monitoring Studio KM for PATROL Version 8.

Monitoring Studio KM for PATROL Version 8.53 SW_NUMBERS Parameters Name ValueFound Value Description States if a numeric valued has been found Value of the searched Numeric Value (no value will be given if no number is found) Value set by the collector of the parent’s object Delta DeltaPerSecond Displays the difference between values collected during two consecutive polling Displays the value corresponding to "Delta" devided by the elapsed time in seconds between the collection times Infobox Name ID Parent ID Application ID Parent Type Line Mode Column Mode Parameter Type Line numerics Regular Expression Skip blank lines After/Before Specified String Character Offset Field numeric Field Separators Unique Separator Description PATROL internal identifier of the numeric extraction PATROL internal identifier of the numeric extraction’s parent PATROL internal identifier of the numeric extraction’s root application Type of the parent (File.) Method used to select lines to search for the numeric Method chosen to search and extraction the number in the line Type of the parameter Line numbers in which the numeric will be extracted from Regular expression used to select the lines where the number will be searched for Indicates whether or not blank lines are skipped when searching for the numeric Searches for the numeric either after or before the specified string Searches for the number before or after this specified string Character offset where the number is searched for Numeric of the field in which the numeric will be searched for Characters that separates the fields in a text line Considers consecutive separators as a unique separator Menu Commands Menu Command Edit Set Thresholds Set Alert Actions Description Edits the numeric extraction settings Allows you to set or edit the thresholds Adds specific Alert Actions to the Numeric Value extraction object Application Classes 357 . OS Command. etc.6.

Monitoring Studio KM for PATROL Version 8.53 Menu Command Display Object Configuration Cut Copy Delete Rename Pause monitoring Resume monitoring Description Displays the Monitoring Studio configuration report of this object and all dependent objects Cuts this Numeric Value extraction object Copies this Numeric Value extraction object Deletes the Numeric Value extraction Renames the Numeric Value extraction object Pauses the Numeric Value extraction Resumes the Numeric Value extraction Application Classes 358 .6.

Menu Commands Menu Command New > String search New > Numeric value extraction New > Text Pre-Processing New > Dynamic Object Builder Edit Description Creates a new String search for this command line execution Creates a new Numeric value extraction for this command line execution Creates a new Text pre-processing for this command line execution Creates a new Dynamic Object Builder for this command line execution Edits the command line execution settings Application Classes 359 . Maximum execution time before timeout.53 SW_OSCOMMANDS Parameters Name OSCommandColl ReturnOutput Description Execute the OS Command and collects the information Displays the return output of the OS command Unit: N/A Value set by OSCommandColl ExecutionTime Time taken by the OS Command to run Unit: Seconds Value set by OSCommandColl ExecutionStatus Status of the execution Unit: 0 = executed successfully.Monitoring Studio KM for PATROL Version 8. PATROL internal identifier of the OS Command’s parent. The command line is executed with this username. PATROL internal identifier of the OS Command’s root application. Command line that is given to the OS to execute.6. 1 = error while executing the OS command Value set by OSCommandColl ExitStatus Status of the OS command exit code Unit: 0 = executed successfully. 1 = error while executing the OS command Value set by OSCommandColl Infobox Name ID Parent ID Application ID OS Command Timeout Username Description PATROL internal identifier of the OS Command analysis.

53 Menu Command Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Allows you to set or edit the thresholds Sets the polling interval for this command line execution monitoring Adds specific Alert Actions to the command line execution Displays the Monitoring Studio configuration report of this command line object and all dependent objects Cuts this command line execution object Copies this command line execution object Pastes a previously copied or cut String search or Numeric Value search Deletes the command line execution and all its dependent objects Renames the command line execution monitoring object Pauses the command line execution as well as all its dependent objects Resumes the command line execution as well as all its dependent objects Re-execute the command line (if needed) and refresh all parameters. All dependent objects will be refreshed as well (SW_STRINGS and SW_NUMBERS instances) Application Classes 360 .6.Monitoring Studio KM for PATROL Version 8.

Unit: Page fault/sec Value set by proColl VirtualBytes Displays the virtual memory used by the matching process(es). Unit: Processes Value set by proColl HandleCount (Windows only) Displays the number of handles opened by the matching process(es). Unit: Megabytes Value set by proColl WorkingSet (Windows only) Displays the working set size of the matching process(es). Unit: Megabytes Value set by proColl PrivateBytes (Windows only) Displays the processor time percent used by the matching process(es).6. Unit: Percent (%) Value set by proColl Count Displays the number of processes that match the criteria. Unit: Megabytes Value set by proColl ProcessorTime Displays the processor time percent used by the matching process(es). On multiprocessor computers. Unit: Percent (%) Value set by proColl PageFileBytes (Windows only) Displays the page file used by the matching process(es).Monitoring Studio KM for PATROL Version 8. Unit: Handles Value set by proColl PageFaultsPerSec (Windows only) Displays the number of page faults per second caused by the matching process(es). Unit: Threads Value set by proColl ChildCount Displays the number of children of the matching process(es).53 SW_PROCESSES Parameters Name ThreadCount (Windows only) Description Displays the number of threads of the matching process(es). Unit: Processes Value set by proColl Application Classes 361 . this parameter may go over 100%.

53 Infobox Name Object ID Object Type Object Class Parent ID Application ID Description PATROL internal identifier of the Process monitoring Type of the object (Process) Class of the object (SW_PROCESSES) PATROL internal identifier of the Process’ parent PATROL internal identifier of the Process’ root application Menu Commands Menu Command Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Edits the Process monitoring settings Allows you to set or edit the thresholds Sets the polling interval for this instance Adds specific Alert Actions to the Process monitoring Displays the Monitoring Studio configuration report of this Process monitoring object and all dependent objects Cuts this Process monitoring object Copies this Process monitoring object Deletes the Process monitoring Renames the Process monitoring object Pauses the Process monitoring Resumes the Process monitoring Refreshes all instance parameters of the SW_PROCESSES class Application Classes 362 .6.Monitoring Studio KM for PATROL Version 8.

You can also use this icon to create new application/container icons in the PATROL Console tree. Default polling internal: 2 minutes ExtraFileList ProColl common collectors Non-visible. For UNIX systems. Default polling internal: 2 minutes FileSystemColl File system collector. Finds the processes that match the criteria and collects the performance information about the matching processes. Once installed. Default polling internal: 2 minutes ApplicationColl Collector that checks whether the application signature files are present.6. signifying thus that the application is present and should be monitored.Monitoring Studio KM for PATROL Version 8. Default polling internal: 2 minutes NTServiceColl Windows Service collector. It uses the following script: "SW_EventLogReader. Process Collector. Default polling internal: 2 minutes Infobox Name Product Version Released Copyright Web Site Description Product name Monitoring Studio version number Release date of this version of Monitoring Studio Copyright information Web site address Application Classes 363 . The "signature files" are specified when setting up a new application monitoring.exe". the command "df-k" is used. exe" to get a formatting list of Windows Events. Parameters Name NTEventColl Description Windows Event collector. It uses the following script: "SW_sentry_ServiceInfo. This icon gives you access to the various monitoring tools available in Monitoring Studio. For Windows systems. Monitoring objects will be placed under this Monitoring Studio icon by default. the performance command "GetPerformanceValue Logical Disk" is used.53 SW_SENTRY One single instance of the SW_SENTRY class is created and labeled Monitoring Studio. Finds the processes that match the criteria and collects the performance information about the matching processes. it is the only visible icon under host icon in the PATROL Console.

(On Windows Agents only) Starts the KM Watch wizard Starts the new application/container icon wizard Pastes the previously copied object under the Monitoring Studio icon Deletes all monitoring objects under this icon Starts the process viewer tool Starts the Windows EventLog Reader tool (On Windows Agents only) Starts the SNMP browser tool Starts the real-time SNMP trap listener Starts the Export configuration wizard Starts the Import configuration wizard Shows the thresholds management options Shows the debug options Displays the Monitoring Studio configuration for all objects under the Monitoring Studio icon Application Classes 364 .53 Name Contact Support Description Contact information Support information Menu Commands Menu Command New > Process monitoring New> Windows Service monitoring New > File monitoring and analysis New > Folder monitoring New > File System monitoring New > Command line analysis New > Database Query analysis New > Process monitoring New> Windows Service monitoring New > File monitoring and analysis New > Folder monitoring New > File System monitoring New > Command line analysis New > Database Query analysis New > Windows Performance monitoring New > KM Watch New > Application icon (container) Paste Delete All Tools > Process Viewer Tools > Windows EventLog Reader Tools > SNMP Browser Tools > Real-time SNMP Trap listener Import and Export > Export configuration Import and Export > Import configuration Options > Thresholds management Option > Debug Display Configuration > Object Configuration Description Starts the process monitoring wizard.Monitoring Studio KM for PATROL Version 8. Starts the database query analysis wizard Starts the Java MBean polling wizard Starts the WMI query wizard Starts the Web request analysis wizard Starts the Web-farm monitoring wizard Starts the SNMP polling wizard Starts the SNMP trap listening wizard Starts the Windows EventLog monitoring wizard (On Windows Agents only) Starts the Windows Performance counter monitoring wizard.6. Starts the file monitoring and analysis wizard Starts the folder monitoring wizard Starts the file system monitoring wizard Starts the command line execution and analysis wizard. Starts the Windows service monitoring wizard.

6.Monitoring Studio KM for PATROL Version 8.53 Menu Command Display Configuration > Entire Configuration Report Scheduler License About… Description Displays the Monitoring Studio configuration for all objects under the Monitoring Studio icon and any user-defined container Starts the Monitoring Studio configuration report scheduler Shows the currently registered license keys and registers new license keys Shows the version and general information about Monitoring Studio Application Classes 365 .

Host name where the SNMP agent is running.53 SW_SNMP_POLLING Parameters Name SNMPPollingColl Content Description Polls the SNMP and collects the information received. OID that is polled.6. Unit: Varies Note: Only applicable to SNMP of String type. Value set by SNMPPollingColl Status Status of the SNMP Polling.Monitoring Studio KM for PATROL Version 8. Content of the SNMP received. Unit: Varies Note: Only applicable to SNMPs of integer type. Unit: 0 = working. Type of the value of the selected OID (number or string). Menu Commands Menu Command New > String search New > Numeric value extraction Description Creates a new String search for this SNMP Polling Creates a new Numeric Value search for this SNMP Polling Application Classes 366 . Port used to connect to the SNMP agent. PATROL internal identifier of the SNMP Polling’s parent. 1 = a problem occurred Value set by SNMPPollingColl Delta DeltaPerSecond Displays the difference between values collected during two consecutive polling Displays the value corresponding to "Delta" devided by the elapsed time in seconds between the collection times Infobox Name ID Parent ID Application ID OID OID type Host Port Community Description PATROL internal identifier of the SNMP Polling. Community used to connect to the SNMP agent. PATROL internal identifier of the SNMP Polling’s root application. Value set by SNMPPollingColl Value Value of the SNMP received.

Monitoring Studio KM for PATROL Version 8.53 Menu Command New > Dynamic Object Builder Edit Set Thresholds Set Polling interval Set Alert Actions Display Object Configuration Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Refresh parameters Description Creates a new Dynamic Object Builder for this SNMP Polling Edits the SNMP Polling settings Allows you to set or edit the thresholds Sets the polling interval for this SNMP Polling Adds specific Alert Actions to the SNMP Polling Displays the Monitoring Studio configuration report of this SNMP Polling object and all dependent objects Cuts this SNMP Polling object Copies this SNMP Polling object Pastes a previously copied or cut String search or Numeric Value search Deletes the SNMP Polling and all its dependent objects Renames the SNMP Polling object Pauses the SNMP Polling as well as all its dependent objects Resumes the SNMP Polling as well as all its dependent objects Re-poll the OID and refresh all parameters.6. All dependent objects will be refreshed as well (SW_STRINGS and SW_NUMBERS instances) Application Classes 367 .

This process waits for SNMP Traps and analyzes traps as it receives them. Unit: Trap Value set by SNMPtrapColl MatchingTrapRate MatchingTrapCount Number of matching SNMP traps per minute. OID of the second varBind of the trap that will acknowledge this trap search Searched string in the second varBind of the acknowledging trap Timeout for auto-acknowledgment Indicates when Alert Actions should be executed Application Classes 368 . Unit: Trap/min Value set by SNMPtrapColl Infobox Name ID Parent ID Application ID Source IP Community Enterprise ID Trap number OID 1 String 1 OID 2 String 2 Acknowledging Trap Number Acknowledging OID 1 Acknowledging String 1 Acknowledging OID 2 Acknowledging String 2 Timeout Run Alert Actions Description PATROL internal identifier of the SNMP Trap listening PATROL internal identifier of the SNMP Trap listening parent PATROL internal identifier of the SNMP Trap listening root application IP address of the SNMP agent that raises the traps Community used to listen to traps Enterprise ID of the SNMP agent that raises the traps Number of the searched trap OID of the first varBind of the searched traps Searched string in the first varBind OID of the second varBind of the searched traps Searched string in the second varBind Number of the trap that will acknowledge this trap search OID of the first varBind of the trap that will acknowledge this trap search Searched string in the first varBind of the acknowledging trap.Monitoring Studio KM for PATROL Version 8. Number of SNMP traps matching the search.6.53 SW_SNMP_TRAPS Parameters Name SNMPTrapColl Description The SNMP trap collector is a detached process launched at the start of BMC Performance Manager Monitoring Studio.

53 Menu Commands Menu Command Edit Set Thresholds Set Alert Actions Display Object Configuration Cut Copy Delete Rename Acknowledge all and reset Pause monitoring Resume monitoring Refresh parameters Description Edits the SNMP Trap listening settings Allows you to set or edit the thresholds Adds specific Alert Actions to the SNMP Trap listening Displays the Monitoring Studio configuration report of this SNMP Trap object and all dependent objects Cuts this SNMP Trap listening object Copies this SNMP Trap listening object Deletes the SNMP Trap listening Renames the SNMP Trap listening Acknowledges all alerts on the SNMP Trap object and resets the "MatchingTrapCount" parameter to ‘0’ Pauses the SNMP Trap listening Resumes the SNMP Trap listening Refreshes all parameters of the SW_SNMP_TRAPS class Application Classes 369 .6.Monitoring Studio KM for PATROL Version 8.

Unit: Line/minute (line/min) Value set by the collector of the parent object The MatchingLineRate parameter is only activated for String searches in LOG files and in "never-ending" command lines Infobox Name ID Parent ID Application ID Parent type Search Lines Acknowledge String Acknowledge Timeout Run Alert Actions Description PATROL internal identifier of the String search PATROL internal identifier of the String search’s parent PATROL internal identifier of the String search’s root application Type of the parent (File. Note: The number of lines displayed can be changed to a custom value by adding the variable "/MASAI/SENTRY8/ LastMachingLinesNumber" with the proper line number to the PATROL Agent configuration Default: the 10 last matching lines are displayed.6. etc.Monitoring Studio KM for PATROL Version 8.) Search mode Lines that are searched String that auto-acknowledges this string search Is the auto-acknowledgment enabled? Timeout for the auto-acknowledging When Alert Actions have to be executed Menu Commands Menu Command Edit Description Edits the String search settings Application Classes 370 . MatchingLineCount Number of lines matching the String search. Unit: N/A Value set by the collector of the parent object. OSCommand. Unit: Line Value set by the collector of the parent object MatchingLineRate Number of lines matching the String search per minute.53 SW_STRINGS Parameters Name LastMatchingLines Description Lines matching the String search.

Monitoring Studio KM for PATROL Version 8.6.53 Menu Command Set Thresholds Set Alert Actions Display Object Configuration Cut Copy Delete Rename Acknowledge all and reset Pause monitoring Resume monitoring Description Allows you to set or edit the thresholds Adds specific Alert Actions to the String search Displays the Monitoring Studio configuration report of this String search object and all dependent objects Cuts this String search object Copies this String search object Deletes the String search Renames the String search object Acknowledge all alerts for this object. The MatchingLineCount parameter is set to zero Pauses the String search Resumes the String search Application Classes 371 .

53 SW_Transform Parameters Name TransformResult Description Lines matching the Text pre-processing. OS Command.pre-processing object and all dependent objects Cuts this object Copies this object Pastes a previously copied or cut Text pre-processing object Deletes the Text-preprocessing monitoring and all its dependent objects Allows you to rename this Text pre-processing object Pauses the monitoring of this Text pre-processing object Resumes the monitoring of this Text pre-processing object Application Classes 372 .6. Unit: N/A Infobox Name ID Parent ID Application ID Parent type Description PATROL internal identifier of the Text Pre-processing object PATROL internal identifier of the Text Pre-processing object’s parent PATROL internal identifier of the Text Pre-processing object’s root application Type of the parent (File.Monitoring Studio KM for PATROL Version 8. etc.) Menu Commands Menu Command New > String search New > Numeric value extraction New > Dynamic Object Builder Edit Display Object Configuration Cut Copy Paste Delete Rename Pause monitoring Resume monitoring Description Creates a new String search for this Text pre-processing object Creates a new Numeric value extraction for this Text pre-processing object Creates a new Dynamic Object Builder for this Text pre-processing object Edits the Text-preprocessing monitoring settings Displays the Monitoring Studio configuration report of this Text.

Monitoring Studio KM for PATROL Version 8.53 Application Classes 373 .6.

270. 363. 143. 368. 357 Agent 11. 339. 118. 353. 366. 192. 143. 326. 335. 335. 234. 326. 294. 236. 143. 221. 53. 61. 337. 51. 285. 333. 236. 61. 323. 314 Alert Actions 53. 183. 341. 339. 335. 246. 326. 236. 368 Acknowledge alerts 138.Monitoring Studio KM for PATROL Version 8. 109. 48. 310. 98. 350. 101. 366. 359. 352. 370 Alert Action macros 254. 109. 138. 236. 370 Acknowledge all alerts 370 Acknowledge String 370 Acknowledgement 138. 276. 345. 161. 271. 363 AgentSetup/preloadedKMs 25 AgentSpring 234 Alarm 101. 357. 359. 286. 53. 341. 169. 348. 188. 285. 234 Additional information 207. 183 Acknowledging 138. 323. 323 Application myApplication 294 Application/container 24. 289. 177. 335. 290 Application ID 323. 350. 359.53 Index -AAbout processes 310 About WMI 311 Access 53. 314. 48. 307. 192. 326. 348. 138. 266. 271. 44 Create 36 Update 44 Adaptors 196 Additional 199. 368 Annotate 246 Antivirus 320 API adapts APP_PATH 196 Add 36. 341. 363 Advanced 53. 71. 113. 50. 285 Acknowledge all 183. 183. 246. 183. 25. 341 Application class 24. 236. 310. 177. 323. 345. 368 Windows Event ACL 101 Adapter 35 348 File 333. 333. 270. 368. 363 APPLICATION_CLASS 242. 196. 339. 341. 101. 113. 323. 234.6. 348. 113. 370. 357. 271. 138. 118. 311. 352. 221 Administrator 31. 353. 266. 333. 183. 368. 348. 24. 343. 314 APPLICATION_EXI 242 APPLICATION_ID 242. 31. 294. 335. 350. 234. 335. 290. 199. 363 Access rights 335 AccessRightsCheck 335 ACEs 101 Acknowledeges 348. 207. 353. 254. 314 APPLICATION_LABEL 294 APPLICATION_PATH 53 APPLICATION_TYPE 242 Application1 320 ApplicationA 320 ApplicationAA 320 ApplicationABC 320 ApplicationB 320 ApplicationColl 363 Index 374 . 234. 347. 337. 98. 236. 323 Application icons 192. 101. 366. 337 Folder 339 JMX polling 345 Process 361 Run 294 Setting 242 SNMP Trap 368 Types 246 Web-farm 343 Alert Actions capabilities 246 Alert Actions description 242 Alert Actions example 294 Alert Actions on any/all 242 Alert Actions trigger 348 Analysis 48. 359. 261. 318. 254. 290. 326. 361. 143. 93. 188. 347. 345. 352. 290 After/Before 118. 353 Alert 14. 261. 357. 343. 314. 261. 337. 326. 13. 143. 285. 109. 254. 323. 93. 196. 370 Execute 294 define 53 Application 53. 347. 361. 177. 318. 254. 337 existing 31 Application constants 53. 258. 258. 318. 372 Application monitoring 113.

cs. 335. 320. 357 Characteristics Index 375 . 341.kml 25 asctime 318 Atrium Orchestrator 35 Authenticate 169. 314. 14. 350. 337. 183. 61. 143. 183. 352. 254. 149. 149. 118. 221 Command line 53. 13.base. 318. 205. 236. 93.jks 205 Collect 31. 125. 359. 161. 310 CD 31 Character Offset 118.apps. 101.servlet. 310. 261. 271. 368 ClientKeyFile. 347.PortalSele ctionController. 25. 53. 368. 177 Auto-acknowledgement 143. 177. 138. 311. 288. 214.jndi.pb. 343.frontnet. 310. 188.doGetManaged 297 com. 24. 221. 51.DefaultA uthorizationStrategy. 333. 143. 361. 348. 314.blahbmah 205 com. 347. 350. 113. 366. 234 Automatic collection process 9 administrator identify 266 analyze 271 ignore 271 Check 14. 183. 310. 196. 359. 207. 207. 177. 118. 290. 143. 350 carol. 345. 188. 24. 207. 311. 93. 357 Column Mode 357 com. 276. 143. 333. 61. 307. 363. 125. 363.Monitoring Studio KM for PATROL Version 8. 149. 118.6. 109.common. 339.frontnet. 294. 138. 161. 51. 347. 254. 357. 297. 214. 363 BMC Portal 31 BMC Software 12. 61. 246 BMC 12. 98. 339. 271. 50. 24. 307. 361. 335. 98. 138. 93. 258. 236. 242. 228. 221. 98. 188.CSServlet. 14 BMC Software PATROL 12. 290. 228. 294. 311. 363 Command lines and scripts execution and analysis 61 Command-line MUST MATCH THE REGULAR EXPRESSION 125 -BBACKENDDB Oracle 71 Basic 50. 113. 311. 348. 368 CityplaceSplit 258 CityplaceWebSphere StateAS 214 Class 11.base. 192. 61. 101. 53. 71. 125. 199. 143.portals. 71. 138. 363. 236. 51.jks 205 ClientTrustFile. 50. 271. 350. 335. 25. 149. 13. 31. 234. 14. 372 Argument 310 window shows 276 Argument1 310 Argument2 310 AS 234 AS_EVENTSPRING 234 AS_EVENTSPRING. 31. 370 Timeout 368 Automatic 11. 48. 53. 361 Choosing the way thresholds are managed 234 CIM 311 CIM contains 311 CIM Repository 311 CIM stands 311 CIM_DataFile 311 CityEnterprise StateID SNMP Trap 138 Cityplace7 258 CityplaceEnterprise StateID 138. 177. 188.pb. 61. 363 ChildCount 125. 143.csg. 228. 234. 109. 93. 118. 214. 192. 118. 246. 199. 307. 352. 366 Column 118. 31 Browser 177 -CCalculate 118. 192. 291. 188. 261. 196. 359. 169. 183. 125. 320. 314. 370.properties 221 Case 11. 323. 199.53 Applications 11.sun. 353. 61.rmi.csg. 286.apps. 143. 254. 234. 368 BMC PM Monitoring Studio 14. 169. 25 BMC Software PATROL Agent 12 BMC Software PATROL Console 12 BMC Software provides 31 BMC Software website 31 Browse 14.RegistryContextFactory 205. 31. 234 BMC Software FTP site 12 BMC Software Installation Utility 13. 348. 271. 138.csg. 109. 333.assertAvailableBusinessUnit 297 com. 266.doGet 297 com. 169.registry.

98. 24. 143. 242. 261. 258. 261. 333. 353. 143. 361. 242. 276. 326. 246. 118. 335. 326. 192. 289. 258. 361 Create 48. 221. 98. 98. 149. 138. 25. 161. 307. 345. 307. 118. 101.Monitoring Studio KM for PATROL Version 8. 363 Database Client 71 Database Macros 254. 310. 221. 341. 138. 14. 326. 353. 98. 352. 71. 228. 169. 288. 31. 199. 333. 113. 236. 192. 348. 271. 13. 323. 290. 326. 366. 314. 53. 350. 109. 323 Monitoring Studio 48. 138. 286. 101. 196. 363 Enabling 307 Default 14. 320. 177. 71. 270. 341. 188. 359. 267. 138. 339. 228. 333. 333. 228 Default pooling interval 347 Index 376 . 366. 169. 199. 311. 353. 109. 297. 61. 359. 307 Console Server 11. 207. 372 Copy Cut and Paste 286 Count 118. 350. 335. 101. 345. 196. 93. 169. 205. 254. 246. 314. 177. 337. 93. 113. 341. 357. 221. 258. 311. 341. 314. 199. 169. 177. 337. 343. 143. 368. 199. 51. 242. 183. 286. 143. 286. 214. 109. 271. 280 Configuring 25. 333. 297 CSV pre-processing 297 ctx 297 CTX.53 Commands 11. 366 Convert Multi-line 143. 348. 71. 138. 366. 341. 254. 118. 347. 370. 343. 326. 345. 246. 169. 314 Database monitoring 71 Database Query 143. 352. 345. 291. 359. 361. 149. 149 Convert Multi-line records 149 Convert XML 149. 199. 188. 323 Containing 125 Content 24. 221. 192. 352. 357 Console 11. 258. 228 Critical Error 0x000295F0 on ApplicationABC 320 CSCRIPT. 118. 323 Constant name 53 constants facilitate 53 Contact 323. 50. 246. 366. 214. 236. 234. 177. 161. 199. 199. 347. 138. 149. 143. 297. 93. 294. 326 Consecutive 118. 161. 343. 359. 50. 196. 366. 205. 214. 149. 254. 368. 205 ConnectionStatus 71. 50. 363 Contain/do 143 Container 53. 125. 31. 149 Converting 149 Converting multi-line records 149 Copy 205. 24. 101. 291. 234. 320. 118. 101. 310. 335. 267. 266. 353. 177. 323. 350. 372 Comma-separated list 25 Commit KMs 11 Common Information Model 161 Common services 14 Community 132. 363. 353. 258. 192. 287. 291. 370. 71. 221. 183. 12. 326 Database Type 326 DATABASE_TYPE 242 Dataset 118. 207. 188. 350. 323. 118. 333. 109. 323. 270. 207. 196. 228. 335. 93. 113. 258. 368 Configuration Report 278.EXE 310 CSV Convert XML 149. 307. 363. 345. 286. 323. 297 Converted multi-line records 143. 196. 61. 294. 290. 207. 207. 161. 339. 343. 143 Day-to-day monitoring 51 DbQueryColl 326 DEBUG 149 Debug mode 258. 214. 109. 361. 143. 234. 363 Database Request 323. 118. 12. 271. 357. 183. 372 Credentials 53. 294. 326 Oracle SQL*Plus 71 SNMP 366 Connection Information 196. 125. 357. 370. 339. 337. 370 Default ID 61. 113.CNAME 297 Custom standalone MBean application server 199 Customer support 31 Cut 286. 271. 261. 335. 53 Connect 11. 326. 368. 113. 348. 347. 61. 339. 98. 14 Console Systems 14 Constant 53. 205. 161. 363. 188.6. 196. 270. 318. 326. 287. 261. 207. 289. 347. 372 Cut JMX polling 345 Cut Text 372 Cut Text pre-processing object 372 CutCopy_Cut_and_Paste 335 -DDatabase 31. 93. 177.

118. 61. 359. 183. 311. 339. 311.6. 161. 199. 314. 337. 196. 372 Delete All 287. 48. 138. 368. 352. 258. 242. 101. 236. 246.53 default WebAS 205. 242. 341. 109. 98. 236. 71. 161. 258. 326. 290. 161. 188. 368. 294. 183. 109. 271. 192. 53. 143. 177. 98. 113. 276. 149. 361. 234. 363 characteristics 183 matching 183 Event ID 348 Event Management 234 Event Viewer 183 Event/minute 348 EVENT_MANAGEMENT. 228. 93. 348. 254. 51.kml 25 EventLog 183. 323. 271. 339 Disabled 53. 353. 177. 228. 183. 361. 357. 236. 270. 347. 345. 143. 366.*ApplicationABC 320 errpt 61 ErrS9 320 ErrZ0 320 Event 31. 370. 370. 138. 350 Domain-specific 196 Drive/file 98 Dropdown list 101. 205. 228. 254. 337. 271. 261. 353. 101. 221. 310. 352. 125. 333. 320. 192. 267. 366. 149. 350. 71. 311 Display/information 98 Displays 11. 323. 138. 161. 311 Error. 307. 318. 93. 61. 343. 311 Divide 109. 101. 343. 118. 357. 276. 143. 363 DeletedFileCount 339 Description 276. 337. 169. 109. 290. 341. 109 Enable string/numeric 24 Enables extracting 24 Enabling 24. 101. 353. 341. 348. 339. 359 Error logging 161.jks 205. 370 debug mode 307 Enabling the debug mode 307 Entering 53. 71. 372 Dir 339 Directory 258. 183. 125. 149. 359. 214 Define 53. 161. 161. 311. 161. 370 -EEdit 53. 138. 353. 246. 333. 149. 352. 183. 347. 345. 353. 345. 339. 207. 335. 361. 339. 335. 294. 341. 234. 288. 53. 291. 333. 101. 333. 246. 199. 348 EventLog Reader 276 EventSpring 234 EX 318 exe 310 execute WMI 161 Executes 11. 291. 214 Dynamic Numeric Value Extractions 240 Dynamic Object 240 Enterprise 138. 113. 214. 370. 113. 234. 350. 363. 188. 118. 326. 345. 177. 143. 335. 361. 118. 93. 345. 98. 359. 291. 326. 183. 50. 199 DummyClientKeyFile. 341. 359. 366. 310 EPD 31 Err 320 Err0 320 Err01 320 Err02 320 Err1 320 Err11 320 Err1A 320 Err2 320 Err3 320 Err6 320 Err7 320 Err9 320 ErrA 320 ErrA0 320 ErrA1 320 ErrAB 320 ErrBF0001 320 Error 11. 348. 161. 261. 50. 143. 368. 118. 177. 143. 294. 101. 183. 271. 236. 347. 372 Elements 31. 71. 61. 53. 270. 214. 207. 242. 357. 125. 24. 343. 350. 188. 188. 196. 61. 266. 98. 326.Monitoring Studio KM for PATROL Version 8. 221. 61. 370 Displays WMI namespace 353 DisplaysDatabase 12. 311. 311. 314 Enterprise ID SNMP 368 Enterprise StateID 138 Environment CPU 125. 341. 169. 14 Distributed Management Task Force 161. 310. 320 Delete 287. 294 hostname 270 Index 377 . 359. 169. 188. 368. 348.

} 318 FreeMegabytes 98. 370. 101. 337. 335. 23. 339. 286.. 337 FreeSpacePercent 98. 323. 214 289 Index 378 .. 363 File system monitoring object 98. 357 Fifo 101 File 11. 314 FileColl 333 FileCount 109. 236. 310. 314.Monitoring Studio KM for PATROL Version 8. 314 FILE_NAME 242. 242. 335 Files Currently Loaded 31 FileSecurityColl 335 Filesystem 98. 314 FolderColl 339 FolderSize 109. 339 Files 93. 318.jks 205.jks 205 file DummyClientTrustFile. 290. 359. 48. 345. 341. 24. 333 file name>~n. 24. 359 Export 53. 271.bmc. 207. 339 Folder Disk Usage 109 Folder monitoring 339 Folder monitoring object 109. 318. 359 choose/configure 242 operating system controls 310 ExecutionStatus 61. 335. 169 Fi 205. 291. 93. 24. 363 Export_SW_Sentry. 149. 333. 368. 221. 353. 326. 318. 353. 228. 98.53 Executes 11. 48. 318. 307. 337 FileSystemColl 337 FILESYSTEMS 24 Firewall 320 First/last 291 Flat file 93.cfg 258 Exporting the configuration to a file 258 exprA 320 exprA\|exprB 320 ExprB 320 Extract text 149 Extracting setup 23 Extracting numeric values Extracting the setup files Ey 318 240 23 file ClientTrustFile. 98. 25. 258. 345. 337 Displays 333 File > Restart scan from start 289 modification/creation 109 File > Restart scan from beginning of file file ClientKeyFile.com/pub/patrol/patches 13 -FFailure audit 183 Farms 24. 345. 254. 359 ExecutionTime 326. 254. 353. 323. 363 Export Configuration 258. 370 Alert Actions 294 Command line 359 OS 359 OS Command 242. 357. 291. 254. 294. 161. 14. 363. 236. 323. 337 ftp 13 ftp. 339 Format symbols 318 Format symbols for %{ASCTIME. 50. 199. 363 File/LOG File 291 FILE_CURRENT_NAME 242. 314.jks 205. 261. 372 50KB 291 Alert Actions 333. 363 File monitoring icon 101 File monitoring object 93. 320. 53. 246. 337 File systems 31. 337.cfg Split 258 File Security > Acknowledge and update alerts 285 File security monitoring 101 File System monitoring 98. 310. 339 FOLDER_PATH 242. 290. 214 File Flow 109 File matching 93. 143. 125. 341. 101. 341. 323.jks 205. 101.6. 258. 109. 271. 323. 101. 289. 143 FNDBDataAccessFailureException RDS001002 Code 297 FNServiceNotAvailableException FEA000001 Service 297 Folder 14. 333. 359 PSL 242 SQL 326 execution 101. 323. 261. 285. 214. 149. 254. 214 file DummyClientKeyFile. 188. 109 File monitoring 93. 183. 323. 254. 71. 311. 221 Field Number 357 Field Separators 143. 61. 118. 361.

352. 234. 266. 199. 347. 352. 326. 221. 113. 310. 310. 109. 341 HTML/HTTP 196 HTTP 24. 335. 93. 276. 138. 350. 261. 109. 361. 290. 177 HTTPStatusCode 341 -IIBM 12 IBM AIX 12. 48. 177. 228. 169. 196. 188. 288. 350. 347. 177. 366 Monitor Studio considers 199 Web-farm 343 How to configure Monitoring Studio 50 How to restart an application 290 How to stop an application 290 HP Tru64 12 HP-UX 12. 343 HTTP Authentication 169. 341. 337. 333. 254. 341. 161. 270. 366. 353. 177. 339. 348.tar 23 ins_WINDOWS_<version number>. 205. 118. 207. 368. 138. 366. 326. 363. 339 GUI 48 HTTP Web-farm 343 HTTP_RETURN_OUTPUT 242 HTTP_URL 242. 101. 199. 335. 71. 323. 161. 236. 143. 343 HTTP Response Status 341 HTTP Status 169. 98. 169. 228. 192. 258. 109. 337. 207. 221. 221. 221 IisAdmin. 177. 357. 318. 93. 61 Icon 24. 138. 345. 341 HTTP Request Mode 169 HTTP Requests 341. 71. 177 HTTP Digest 169.exe Ins_WINDOWS_7550. 192. 261. 188. 307. 318 Infrastructures 113 Input variables JMX polling wizards 205 INPUTFILE 149 Ins_ALL_7550.exe 23 ins_WINDOWS_7552. 372 INFORMATION 101. 361. 109. 169. 363 ID 53. 71. 258. 192. 196. 254. 348. 236. 101. 318. 177 HTTP Request 169. 311. 345. 335. 199. 125. 149. 199. 188. 53.6. 323. 368. 353. 372 Ignore 118. 177. 314 HttpRequestColl 341 Https 169. 267. 372 Identifier 53. 113. 368. 98. 98. 177 HTTP POST 169. 343. 326. 161. 352. 287. 333. 254. 228 Generic JMX clie 199 Generic JMX client 199 GET 169.53 Full Client 71 -GGeneral Macros 254. 113. 314 getAttribute use 196 GetPerformanceValue Logical Disk 363 Group 101. 149. 214. 234. 350. 101. 61. 370. 353. 370. 359. 310 HTML 24. 228. 347. 341. 363 Import configuration 261 Include 11. 339. 177 23 Index 379 . 341. 221. 343. 357. 169. 242. 125. 323. 370. 366. 335 Group ID 101 GroupCheck 335 GrowthPercentage 109. 323. 345. 267.Monitoring Studio KM for PATROL Version 8. 333. 261. 314. 242. 143. 357. 207. 343. 323. 333. 339 GrowthSpeed 93. 310. 318. 271.Exe 310 Import 31. 339. 207. 53. 353. 113. 258. 61. 214. 118.exe 23 Installation Utility 14 -HHost 132 Hostname Enter 270 Hosts 31. 359. 337. 363. 271 IIOP 196. 323. 207. 118. 339 Solaris 12 Windows NT4 12 Include subfolders 339 Include Win32_Process 311 including Red Hat Enterprise Linux 207 Infobox 323. 53. 177. 345. 143. 348. 228. 333. 188. 276. 359. 177 HTTP GET 169. 314 General Tasks 24 Generic 345 Generic JMX 199. 183. 183.

314 JMXPOLLING_HOST 254. 221. 205. 24.5 228 JMX 118. 71. 214 KeyStoreFile path 205. 113. 196. 314 JNDI 205 JNDI name 196 JNXMP 199 Jonas 221 JOnAs applicarion 205 JOnAS applicarion server 205 JOnAs application 205. 254. 51. 261. 236. 368 IP address 270.java 297 IP 31.Monitoring Studio KM for PATROL Version 8.53 Installing 14 Instance/Service 326 InstanceCreationEvent 311 Instant Client Basic Lite 71 Instant Client SQL*Plus 71 Integration 267 Integration Service Agent 36 Integration with Portal 31 Internet Explorer 177 Intervals 271.management 196 javax. 161. 323. 183. 363 Java Virtual Machine 345 running 207 Java. 323. 353 IntranetPLEnfFilter.EXE 310 JavaMBean 196 javax. 214. 138. 254. 214 KM 11. 221 JonAS monitoring 221 jonas_home%/conf 221 JONBoss application 221 JRMP 221 JVM v1. 53. 314 JMXColl 345 JMXMP 199 JMXPOLLING_CONTENT 254. 314 KMWATCH_PARAMETER 242. 228. 199. 286. 363 Java EE 221 Java EE-based 207 Java Management Extensions 196 Java MBean polling 196. 339 KeyStore password 205. 270.0 196 Java 196. 207. 207. 314 KMWatchColl 347 Knowledge Modules 11.HttpServlet. 271. 363 console requesting 25 install 14 KM depending 11 KM Watch 113. 50. 314 Adds 323 Type 345 JMX Architecture -KKB 291. 267. 109. 138. 307. 333 KB/min 333. 125. 205. 291. 234. 228. 345. 339 196 Index 380 . 242. 221. 192. 347. 199. 258. 61. 169. 287. 118. 199. 199. 271. 254. 310. 177. 188. 314.4. 323. 289. 363 KMWATCH_CLASS 242. 228. 143. 323 JMX client 199. 101. 254. 347 -LLast Step GET 177 LastChanged 333 LastMachingLinesNumber 370 LastMatchingLines 370 LastModifiedFileElapsedTime 109. 214.6. 51.service 297 JBoss 205. 53. 214. 149. 297. 161. 345 JBoss/WebLogic/generic etc. 271 SNMP 368 ipconfig 149 ipconfig/all 149 ISA 311 IT 48. 24.4 228 JDK v1. 228. 276. 314 KMWATCH_ID 242. 113. 288. 221. 266. 196. 323. 207.servlet. 254.Host 345 JConsole 196 JDK v1. 347. 93. 221.http. 71. 270. 207 JMX Macros 254. 207. 31. 207. 98. 228 -JJ2EE 221 J2EE™ 214 J2SE 5. 347.

196. 51. 14 Management Information Base 366 Managing thresholds 234 Matching 348 line/event 236 SNMP Trap 138 String 370 MatchingEventCount 236. 236. 337. 294. 254. 337. 335. 288. 138. 341. 337. 359. 177. 188. 353. 25. 345. 326. 271. 291. 294. 48. 228 Monitor Type 36 Monitor web sites 177 Monitored files 24. 242. 188. 343. 12. 118. 294. 98. 333. 234. 339. 205. 14. 118. 101. 234. 326 MBean 196. 288. 53. 24. 50. 236. 50. 333 Listening 138 50001 14 Load 11. 254. 192. 276. 310. 109. 343. 314. 246. 363 MBeanServer access 196 MBeanServer API access 196 Mega-bytes 188 Menu Command 53. 93 Monitoring datasbase queries 24 Monitoring JMX-enabled 24 Monitoring Studio 11. 246. 53. 294. 214. 339 Modify Alert Thresholds 234. 234. 177. 366. 24. 347. 372 MIB 138. 323 Managed System 11. 323. 246.53 LASTTIME 318 Launch 14. 285. 276. 370 LOG file 246. 98. 183. 228. 320. 270. 286. 370 MatchingLineRate 370 MatchingTrapCount 138. 333. 125. 25. 207. 270. 368 Monitor my application 50 Monitor Studio considers 71 host 169. 221. 199. 307. 242. 333. 221. 24. 118. 311. 311. 368 MatchingTrapRate 368 MB 188. 61. 323. 101. 258. 326 Middleware 50. 323. 13. 207. 353. 98. 143. 370 entered 118 Text 372 Linux 13. 192. 101. 368 Configuring 48. 266. 266. 196. 271. 214. 333. 207. 234. 310. 370. 113 Migrating from previous versions of Monitoring Studio 11 Min 333. 192. 169. 261. 271. 287. 352. 290. 320. 93. 363. 291. 53 -Mm%d%H%M%S 61 m/%d/%y 318 maching process 361 Manage 11. 363. 149. 93. 143. 368. 31. 98. 61. 188. 310 Linux-based 12 List 25. 199. 177. 359. 196. 228. 61. 118. 363 License key 261 License4 261 licenseList 149 Line 24. 348 MatchingEventRate 348 MatchingLineCount 143. 161. 368 setup. 31. 285. 276. 289. 71. 361. 287. 363. 335 Monitoring 11. 258. 138. 25. 236 Monitor 50. 188. 285. 318. 345. 214. 267. 357. 113. 326. 323. 333. 258. 289. 291. 311 Microsoft SQL Server 71.exe 14 setup. 236. 199. 366 MIB Browser tool 138 Microsoft 71. 310. 149. 161. 290. 311. 24. 339. 93. 348. 350. 138. 93. 372 Lines matching 236. 341. 221. 267. 31. 228. 320.Monitoring Studio KM for PATROL Version 8. 138. 370. 93. 333. 261. 113. 228. 228. 339 Modify 31. 207. 207. 294. 199. 113. 234. 183. 261. 51. 109. 348. 109. 339 MB/h 337 MB/hour 98 Index 381 . 297. 314. 361. 359. 372 databases 71 In order 61. 125.sh 14 License 14. 101. 286. 169. 347. 71. 221. 285. 276. 258. 236. 169. 271. 51. 13. 161. 53. 258 Load Knowledge Modules 24 LOG 53. 183. 335. 196. 161. 307. 177. 118. 339 ModifiedFileCount 109. 294. 143. 14. 188. 267. 61. 207. 271. 236. 290. 161. 14. 143. 370 Login 53. 236. 323. 318. 221. 31. 161. 291.6. 285. 199. 294. 143. 113. 357. 177. 192. 246. 266. 236. 352. 350.

118. 207. 343. 343. 214 New web-farm 323 New/Edit 290 NewFileCount 109. 345. 341. 347. 359. 339. 372 Numeric values 61. 266. 326. 352. 361 OBJECT_LABEL 242. 286 Monitoring Studio packages 13 Monitoring Studio Settings 53. 236. 276. 199. 348. 50. 109. 143. 221. 326. 196. 214. 339 NEWLINE 294 Node name 205 notepad. 341. 188. 357. 353. 51. 267. 361. 149. 363 NTSERVICES 24 Numeric 24. 361 Object Type 254. 326. 326. 221. 23. 271 New Process 323 New process monitoring 125 New SOAP 205. 286. 271 New Menu Commands 11. 372 New application 53. 333. 271. 333 New file security-related 11 New folder monitoring 109 New MBeans 196 New Menu 11. 289. 196. 287. 14. 161. 192. 343. 267. 345. 101. 149. 192. 188. 339. 113. 291. 221. 221. 138. 199. 192 Monitoring Studio deletes missing objects after they have been missing a specific number of times in a row 88 Monitoring Studio Installation Packages 13 Monitoring Studio objects 271. 323. 205. 101. 318. 199. 109. 359. 345. 287.Monitoring Studio KM for PATROL Version 8. 196 Monitoring Tools 93. 228. 93. 314. 333. 339. 294. 314 OBJECT_TYPE 242 Offline 113. 359. 25. 343. 366. 207. 353. 192 parameters 113 Monitoring Studio v8. 286. 343. 261.3. 318. 207. 286. 113. 368. 71. 254. 138. 113 -NName 11. 183. 333. 258. 366. 113. 118. 372 Numeric Value 199. 109. 368 Console Server 14 PATROL Agent 14 PATROL Classic Console 14 Monitoring Studio 8. 314. 101. 291. 177 NTML 169. 125. 341. 98. 270. 118. 335. 234. 333. 353. 352. 169. 314 NTEventColl 348. 192. 177. 271. 113. 177. 307. 341. 161. 101. 13. 347. 361. 221. 207. 101. 228. 333. 214. 118. 363 NTLM 169. 343. 345. 93. 214. 228 Namespace 161. 350. 149. 118. 372 event containing 294 event contains 294 Oracle 71 Name entered/displayed 199. 326. 359. 294. 333. 183. 350. 109. 236. 357. 205. 310. 372 -OObject 98. 177. 291. 149. 242. 258. 314 OBJECT_TY 254. 221. 290. 261. 254. 199. 98. 341. 271. 188. 343. 335. 337. 363 New File 11. 199. 323.5 161. 192. 323. 266. 270. 258. 236. 366. 24. 359. 188. 353 New 11. 345.00 11 Monitoring Studio builds 125.exe 311 NTEVENT_LAST_MATCHING 242 NTEVENT_SOURCE 242. 353. 288 OID 138. 320. 234. 221. 271. 93. 288. 93. 199. 359. 101. 323. 228. 31. 207. 188. 261. 366. 341. 366. 345. 192. 183. 118. 98. 372 Numeric Value Extraction 118. 143. 285. 98. 363. 143 Monitoring web farms 169 MORE_INFORMATION 294 MS_HW_MAIN/localhost 149 MSMQ 50 Multi-Parameter Formula 9. 368. 357. 323. 326. 61. 270. 370. 71. 323. 363. 246. 161. 357. 93. 366. 188. 271. 93. 98. 288. 254. 125. 234. 138. 372 modifying 267 Object Class 361 Object display 61. 169. 353.53 Monitoring Studio 11. 207. 143. 61. 270. 370. 246. 109. 207. 236. 98. 98. 113. 337. 93. 267 Object ID 267.6. 71. 177 NTPERFORMANCE 24 NTPerformanceColl 350 NTServiceColl 352. 348. 311. 363. 318. 368 OID1 138 OIDs containing 138 Index 382 . 353.

323. 61. 113. 323. 61. 370. 13. 310. 288. 359 OS command ipconfig/all 149 OS Command Macro 254. 113. 48. 370. 314. 345 Java PATROL 101. 25. 53. 294. 71. 161. 61. 258. 326. 345. 199 11. 161. 221. 48.53 OldestModifiedFileElapsedTime 109. 370 PATROL Central 11. 221 OS 51. 271. 372 PARENT_ID 242. 314 OSCommand 353. 361. 357. Monitoring 113 Parent ID 323. 359. 341. 347. 12. 98. 254. 236. 294. 311. 118. 310 PathName 311 Paths 53. 370. 372 93. 337. 307. 125.log 294 opt/myApplication/log/myApp_20030807_1711 93 opt/myApplication/log/myApp_20030808_0512 93 Optional 109 Oracle 50. 24. 294. 161. 138. 14. 314 PARENT_LABEL 242. 361. 372 -PPackages 13. 207. 343. 261. 372 OSCOMMAND_OSCOMMAND 242. 221 Page fault/sec 361 Page fault/secs 361 Pagefile 361 PageFileBytes 361 PAR file 31 Knowledge Modules 11 PATROL Agent 11. 353. 101. 335. 335. 113.jonas. 188. 207. 326. 188. 333. 98. 345. 113. 188. 310. 352. 291. 258. 101. 207. 71. 341. 24 PATROL Classic 14 PATROL Classic Consoles 14 PATROL Configuration Manager 25. 109. 348. 254. 25. 352. 221. 12. 311 OperationalServerPercent 343 OperationServerCount 343 opt/MyApp value 53 opt/myApp/bin/diag/diagnose. 205. 271. 261. 234. 254. 353. 51. 261. 307 PATROL Console Web-edition 12 PATROL ID 149. 339 Online 31 online help 31 OpenVMS 12 Operating 12 Operating system 12. 345. 254. 143. 323. 101. 71. 246. 236.Monitoring Studio KM for PATROL Version 8. 372 paste everything 286 PATH 71. 177. 71. 339. 310 Oracle Database Server 326 Oracle Instant Client 71 Oracle SID 71 Oracle 254.objectweb. 307. 350. 326. 93. 291. 333. 169. 109. 366. 242. 48. 294. 24 PATROL Central Operator 12. 337. 294. 366. 205. 143. 339. 207. 161 Patrol_Home%\bin 214 PATROL_HOME%\config 258 Patrol_Home%\Patrol3\bin 214 Index 383 . 357. 271. 288.sh 61 opt/myApplication/log/myApp*. 343. 345. 368. 234. 61. 23. 199. 348. 357. 347. 350. 357. 234 PATROL Console 11. 359. 294. 101. 352. 149. 12. 199. 14. 347. 177. 359. 192. 333. 370. 285. 228 Paste 286. 359. 234. 271. 339. 61. 254. 339. 368. 205. 188. 149. 353. 341. 314 PATROL MIB 246 PATROL Object 101. 366. 368. 109. 246. 350.6. 24. 228. 196. 183.naming 205. 214. 199. 31. 221. 138. 343. 372 Parent Type 353. 291. 333. 348. 326. 363. 361. 323. 192. 254. 314 Oracle SQL*Plus connect 71 Oracle\ora92 71 org. 357. 341. 113 Other KMs parameters 113 OW2 221 OwnerCheck 335 parameter monitoring 323 Parameter Type 357 PARAMETER_NAME 242 parameters 24. 31. 370. 353. 314 Password 31. 314. 258. 333. 254. 14. 335. 366. 337. 343. 314 PATROL Object ID 101 PATROL Object Label 101. 98. 246. 161. 246. 357 execute 359 OS Command 61. 51. 196. 318. 314 OSCommandColl 359 OS-specific 310 other KMs 24. 192.

93. 51. 361 Process Names 310 process scommand 310 Process User IDs AND 125 ID 125 Process Viewer 266. 61. 357. 61. 169. 196. 361. 98. 368 performance defined 188 Performance Manager 11. 207. 109. 266. 188. 161. 361 ProactiveNet 35. 366. 372 PCM 25. 113. 345. 323. 276. 335. 118. 326. 289. 125. 307. 343. 71. 345.Monitoring Studio KM for PATROL Version 8. 161. 143. 361. 205. 353. 196. 118. 177. 347. 368 Refresh PATROL Integration 31 RegExp 291. 310. 288. 228. 333. 31. 335. 335. 118. 254. 143. 228. 138. 236 Principle 149. 118. 347. 228. 101. 192. 352. 271. 98. 183. 118. 350. 341. 196. 361. 361. 271. 221. 254. 339. 350 PERFORMANCE_INSTANCELIST 242. 363 Recordset 326 Redhat 205 RedHat Linux 12 Reference 31. 143. 214. 368 Alert Actions 361 in/under 286 Process Command Lines 310 Process monitoring 9. 254.getDefaultUserRole 297 ps 310 PSL 98. 254. 266. 113. 109. 113. 333. 183. 138. 98. 118. 254. 353 Query timeout 71 QueryStatus 161. 101. 326. 314 Preloading 25. 192. 196. 310. 363 Protocol 199. 345. 311. 341. 61. 326. 353. 347. 361 ProColl 361. 350. 314 PERFORMANCE_PERFORMANCE 242. 343. 337. 109. 143. 161. 177. 320 Index 384 . 333. 98. 337. 326. 196. 361 Place 31. 221. 310 Platform MBean Servers 196 PM Portal 31 Poll WebLogic 8. 177. 311. 234 Preprocessing text 149 Previous versions 11. 228 PrivateBystes 361 PrivateBytes 125. 339. 348. 361. 36 Process 24. 14. 50. 31. 192. 363 Platform 169. 169. 138. 261. 199. 353. 276. 314 Popup 53 Port 14. 339. 51. 352. 165. 363 Process viewer tool 266 PROCESS_NAME 242. 323. 192. 314. 350. 271 Proxy1401. 370. 118. 368 Performance Manager Integration 31 performance objects 188. 353 -RReal-time 271. 214. 348. 236. 350. 71. 352. 236 Refresh 31. 214. 271. 359. 286. 270. 205. 337. 359. 93. 214. 161. 337. 71. 93. 149. 61. 177.x 228 Polling 50. 125. 323.exe 14 PERPETUAL_LICENSE 149 PID 61. 339. 348. 326. 270. 207. 177. 254. 320. 366 Polling Interval 101. 352. 51. 359. 188. 14. 323. 169. 345. 199. 343. 350.53 Pause monitoring 288 Pause monitoringTemporarily_suspend_the_monitoring _of_an_object 335 Pauses 271. 323. 311. 359. 125. 348. 113. 236. 236. 363. 335. 271. 234 PCM/Event Management 234 pconfig 258 PendingCustomers 71 Performance 11. 188. 138. 314 ProcessorTime 125. 205. 254. 192. 93. 214. 363. 221. 221.6. 236. 246 PW Commands 45 -QQuery 24. 347. 366. 199. 169. 363. 314 Reference Guide 61. 333. 366 POST 169. 366 Polling Macros 254. 363 Process monitoring object 125. 207. 343. 345. 93. 125. 228. 341. 326. 353. 345. 341. 98. 183. 314 Perl. 368. 132. 183. 188. 177. 31. 314.

93. 254. 192. 341. 221. 314.sh 14 sev>ERROR</sev 297 Index 385 . 307. 294. 192. 228. 192. 368. 109. 323. 169. 169. 236. 286 Extracting Setup files 23 -SSample Properties Win32_Service class 311 Save 98.java 297 Set 25. 291. 337. 294. 50. 93. 341. 352 ServletRequestImpl. 341. 280 RequestDispatcherImpl. 372 Rename monitored object 267 ReplicaAwareRemoteRef. 254. 143 Select Common services 14 Select Console Systems 14 Select Convert XML 149 Sentry 11. 196. 366. 350. 289. 199.java 297 Requirements 12. 113. 258. 71. 113. 196. 345. 109. 169. 359 RMI 199 root\cimv2 353 rror 320 Run 11. 242. 285. 366 In order 113. 161. 221. 370. 307 Sentry Software website 31. 291. 368. 246. 359. 343. 294 Set Alert ActionsAlert_Actions_description 335 Set Global Alert Actions 242 Set Thresholds 71. 221. 294 Setting polling intervals 271 Setup 14. 236. 335. 169. 314. 48. 61. 314. 323. 347. 345 Service 14. 357. 234. 192. 221. 366. 285. 149. 347. 118. 205. 143. 359. 188. 199. 348.Monitoring Studio KM for PATROL Version 8. 320. 270. 236. 169. 350. 320. 109. 271. 337. 307. 271. 188. 101. 188. 370 Remote Management 196 Rename 267. 98. 290. 101. 161. 113.exe 14 Setup. 350. 138. 311. 192. 326. 50. 177. 294. 348. 177. 188. 143. 280 Search 24. 348. 352. 370 Set Alert 61. 326. 345. 339. 188. 353. 236. 98. 320 ReturnOutput 326. 236 Requires Sun JVM 1. 370. 323. 240. 236. 183. 271. 71. 261. 228. 192. 98. 357. 109. 335. 368. 359. 183. 271. 113. 311. 48. 199. 310. 109. 361. 345. 177. 132 Reset 138. 270. 333. 93. 143. 53. 149. 50. 53. 234. 366. 199. 271. 234. 359. 333. 14. 353. 113. 348. 221. 93. 183. 199. 370 Alert Actions WMI 161 Run Alert Actions rwxr-xr-x 101 294 348. 288. 214 Server V6. 188. 138. 71. 149. 199. 196.java 297 ServletStubImpl. 307 Sentry Installation Packages 13 Sentry Software 13. 183. 326. 207. 337. 93. 370 Security 11. 71.java 297 Report 278. 118. 113. 335 access rights 101 sed commands 320 Select 14. 335. 343. 199. 228. 357. 205. 214. 177. 207. 188. 98. 24. 125. 161. 24. 341. 161.1 214 Server V6. 294. 286. 207. 276. 326. 101. 177. 246. 118. 261 Scale 113. 118. 353 Setting username/password 242 Setting Alert Actions 242. 359. 118. 341. 353 Set Alert Actions 236. 192. 343. 353. 101. 347. 276 Result 14.6. 339. 196. 288.5 214 Rescaling 118. 320. 188. 350. 188. 101. 333. 326. 234. 366. 350 Schedule a Configuration Report 278. 61. 48. 125. 207. 320. 138. 177. 361. 370. 348. 352. 207. 207. 125. 339. 333. 98. 125. 271. 93. 177. 357. 258. 101. 24. 368. 361. 297. 221. 348. 347. 228. 372 Retrieve 93. 214. 339. 311. 48. 183. 366. 345. 335. 196. 294. 125. 254. 357. 192. 353. 353. 266. 192. 333. 368 Resource-intensive 271. 236. 372 Number 357 traps matching 368 Extracting 23 Setup. 242. 368. 93. 98. 352.1 delivers 214 ServerConnectionState 341 Servers 24. 270 Resume monitoring 288 Resume monitoringTemporarily_suspend_the_monitoring _of_an_object 335 Resumes 271. 118. 310. 125. 343. 207. 341.53 Regular expression 61. 169. 363. 13. 310. 343.

363 SNMP Trap Listener tool 271 SNMP Trap listening 271. 246. 318. 234. 366 Stderr 61 Stdout 61 Step 2-a 169 Step 2-b 169 Step 3-b 169 Step3 261 Stop 53. 53. 357. 207 SW 24 SW_ 228 SW_APPLICARIONS 24 SW_APPLICATION 53 SW_APPLICATIONS 323 SW_DB_QUERIES 24. 214 Software 14. 276. 207. 270. 363 Simple Network Management Protocol 366 Size 50. 258. 311. 320. 221. 368 SNMP Trap listening icon 138 SNMP Trap listening object 271. 125. 307. 314. 270.See 93 STRING_LAST_MATCHING_LINE 242. 214. 366. 333. 50. 363 SNMP Polling 132. 183. 132. 352 String 161. 183. 366. 267.53 SGID 101 Signature 53. 339. 290. 246. 254. 254. 290. 372 Sub-applications 258 Sub-container 53. 98. 348. 161. 333. 326. 307.exe 363 SW_FILE_SECURITY 24. 368 Source IP 138. 93. 149. 143. 183 Start 14. 366 SNMP Table OID 132 SNMP Trap Listener 138. 101. 314 SNMPPollingColl 366 SNMPTRAP_COMMUNITY 242 SNMPTRAP_ENTERPRISEID 242. 71. 221. 285. 314 SNMPtrapColl 368 SOA 214 SOAP Port 205. 254. 314 SNMPTRAP_FOUNDTRAPNUMBER 242. 143.6. 366. 254. 254. 93. 314 SNMPPOLLING_OID 242. 161. 335 SW_FILES 24. 271. 288. 109. 254. 323. 61. 368 SNMP Browser 270 SNMP Browser tool 270. 258 StateStateEnterprise StateID 138 StateStateJBoss StateAS 207 StateStateWebSphere StateAS 214 Status 50. 363. 337. 357 SNMP 50. 228. 363 SUSE Linux 12. 345. 368. 138. 289.5 271 Start--Stop button clicking 53 State7 138 StateOm 318 StateState7 214. 236. 311. 169. 323 subfolder 23 Subfolders 339 SUID 101 Support 11. 12. 271. 199. 368 CityEnt 138 SNMP traps/Windows events 285 SNMP traps/Windows events > Acknowledge all and reset 285 SNMPPOLLING_COMMUNITY 242. 214. 188. 271. 323. 177. 294. 323. 271. 271. 333. 234. 31. 370. 368 Split file 258 SQL 326 SQL Query 326 SQL Server 71. 138. 326 SW_EventLogReader. 352. 234 Software Web site 13 Solaris 12 Source 50. 143. 149. 341. 183. 177. 368 Enterprise ID 368 IP address 368 listening 138 matching 138 Number 368 String 366 Value 366 SNMP agent 50. 343. 246. 368 Start Install 14 Starting v8. 335. 118. 138. 341. 370 String search. 314 Strings 24. 307. 236. 333 Index 386 . 286. 254. 118. 236. 289. 314. 361 Skip 289. 192. 320. 352. 368 SNMP Trap Macros 254. 276. 61. 271.Monitoring Studio KM for PATROL Version 8. 236. 196. 359. 93. 138. 71. 314 SNMP trap monitoring 138 SNMP Traps 53. 359. 353.

177. 143. 361. 143 Trigger 51. 353. 101. 143. 345. 125. 53. 214. 234. 138. 271. 363 Threshold Type 234. 339. 341. 345 SW_KMWATCH 24. 333. 348 SW_NTPERFORMANCE 350 SW_NTSERVICES 352 SW_NUMBERS 24. 113.ora file 71 Transaction Server 228 TransformResult 149. 228. 366 SW_OSCOMMANDS 24. 307 -TTargeted computers 11 Temporarily 288 Temporarily suspend 288 Temporarily suspend the monitoring of an object 288 Index 387 . 370 SW_Transform 24. 13. 207. 143. 341. 169. 363 SW_sentry_ServiceInfo. 366. 314 varBind 368 Trig 61. 294. 337 System monitoring 98. 326. 234. 236. 51.kml 11. 271. 370. 357. 343. 368 SW_ST 24 SW_STRINGS 359. 199. 221.6. 310. 118. 366. 372 SW_wl8x_wlclient. 357. 368. 23 sysApp 71 System 11. 188. 341. 113. 207. 50. 297. 307.tar swsy_unix_8500. 343 SW_JMX 24. 221. 169. 311. 25 SW_SNMP_POLIING 24 SW_SNMP_POLLING 366 SW_SNMP_TRAPS 24. 345. 359. 188. 359. 353. 353 SW_NTEVENTS 24. 109. 118. 314.Monitoring Studio KM for PATROL Version 8. 361. 348 Alarm 236 Warning 236 Trigger Information 236 TrustStore password 205.jar 228 Swsy_ntx86_8401. 183. 214 TrustStoreFile path 205. 370 number breaches 118 Threshold Management 149. 359. 221. 24. 207.exe 363 SW_SENTRY8. 326. 341 SW_HTTP_REQUESTS class 169 SW_HTTP_WEBFARM 24. 246. 188. 192. 138. 149. 271. 294. 192. 101. 93. 161. 285. 261. 372 Text Preprocessing object 372 Text Preprocessing step 149 Text Transform 149 Text Transform objects 149 Text Transform tool 149 Thorium 13 ThreadCount 361 Threshold 31. 177. 93. 177.exe 13. 23 swsy_ntx86_8500. 326. 294. 348. 183. 339 SW_HTTP_REQUESTS 24. 228. 214 Tuning 234 txt myFiles?log file 109 Types 11. 199.exe 23 Windows-based Swsy_unix_8401. 320. 50. 14. 23 Text 24. 366. 199. 207. 98.jar 228 SW_wl9x_weblogic. 345. 61. 337.exe 23 swsy_WINDOWS_8500. 188. 357. 370 TNS_ADMIN 71 tnsnames. 254. 353. 347 SW_NT_WMI 24. 109. 343. 337 System Output Window 11. 347. 352. 101. 345. 359 Lines matching 372 names contain 125 Text Preprocessing 93. 359 SW_Process class 271 SW_PROCESSES 24. 113. 143. 113. 236 Thresholds Customize 45 Import 45 TIME 318 Timeout 61.exe 13. 333. 320. 372 UNIX 13 swsy_WINDOWS_<version number>. 192. 363. 350. 236. 254. 345. 372 Trap listening 53 Trap/min 368 Traps 24. 271. 333. 98. 101. 359. 368. 361 SW_SENTRY 24. 138.tar 13 13. 109. 199. 246. 234. 196. 169. 234. 101. 236. 12. 169. 71. 98. 149. 348. 93. 357. 221. 353.53 SW_FILESYSTEMS 337 SW_FOLDERS 24. 236. 24.

ExecuteThread. 343 application provides 50 Web Edition 11. 276. 246. 169. 290.php 169.internal. 339. 359 Username/Password 246 Using ManagementFactory 196 Using MBean ServerConnection 196 VirtualBytes 361 VMWare ESX Host 12 -WWait 25. 177 UsedSpaceGrowthPercent 98 UsedSpaceGrowthPercentage 98. 270. 343.doFilter 297 WebLogic9. 13. 118.rmi. 177.internal. 363 Web Request analysis 177 Web Request monitoring 177. 93. 188. 51. 335 URL 205. 177 valueB 169. 333 Win32 311 -VV6. 276. 311 View File 291 View the content of a file 291 Index 388 . 48. 347. 341. 24. 236. 143. 25. 183. 101. 228 weblogic. 138 368 SNMP Traps Warning Trigger 236 WBEM 165. 221 urlToQuery. 271 VBS 61 VBScript 61 View 31. 335. 310. 236. 61. 311 Web-based GUI 196 Web-farm 169.rmi.BasicServerRef.jndi. 177 Values Extraction 149 VarBind trap 368 Varbinds 138.6. 357. 199. 276.x 228 weblogic. 363 Web-farm monitoring 169.Monitoring Studio KM for PATROL Version 8. 285. 337 UsedSpaceGrowthSpeed 98. 368. 143 Uninstall 11 Unique Separator 357 UNIX 12. 177. 348. 345.TailFilter.internal. 270. 98. 207. 343 Web Server Authentication 169. 71. 109. 14.execute 297 weblogic. 71.handleRequ est 297 weblogic. 320. 345. 320. 337 User 31. 363 swsy_unix_8500.x 228 WebLogic v9. 271. 311.WLInitialContextFactory 205. 291.ServerRequest. 343. 350. 341. 236. 297. 228 WebLogic Communication Platform 228 WebLogic JAR files/zipped files 228 WebLogic monitoring 228 WebLogic Server 228 WebLogic v8. 353 UserBean_3_0. 343 Weblogic 228. 169. 228 WebLogic 9. 341. 361.kernel. 161. 353. 109. 370 SNMP 366 Value Type 350 valueA&varB 169.x 205. 98 Update 11. 14.1 214 Value 24. 323.x 228 Websphere 205.tar 13 UNIX/Linux 23. 101.sendOneWa yRaw 297 weblogic. 12. 271. 214 WebSphere for 205. 337. 205. 149. 271. 341. 291. 125. 53. 14. 266. 234. 333. 93. 138. 326. 196. 221. 138. 285.java 297 Username 61. 177.servlet. 199. 113. 310.53 -UUDP/162 handling 271 Unable 31 Uncheck 118. 359. 24 Web farm monitoring 169.x 205. 214 WHERE 311 WHERE TargetInstance ISA 311 Wildcard 53. 343 Web Request 118. 355 Web 11. 228 WebLogic application 205. 207. 345 WebLogic 8. 343. 352. 177 Web Site 13 Web-Based CityplaceEnterprise Management 161.

363 Windows Performance monitoring 188. 314 WMI-managed 311 WMIQueryColl 353 WML/HTTP. 24. 311 WMI_HOST 254. 14.exe 311 Windows_BASE. 323.Applications 196 Workaround 31 WorkingSet 125. 363 WMI query monitoring 161. 98. 192. 177 -Xxf ins_ALL_<version number>. 192. 323. 350. 48.tar 23 xf swsy_unix_8500. 353. 276. 348 Windows Event monitoring object 183. 169. 276.exe winlog. 363 Windows Agents 169. 143. 352. 290. 353 query 161 WMI Administrative WMI namespace enter 161 13 WMI query 161. 311 Windows NT/2000/2003 188 Windows NT4 12 Windows operating systems 161. 314 WMI_USERNAME 254. 323. 361 worstParam 254. 276. 361 Windows Services 192. 323 Acknowledging 348 Windows Management Instrumentation 161.EXE 25 www. 323.53 Win32_ComputerSystem 311 Win32_LogicalDrive class 311 Win32_Process 311 Windows 12. 311. 314. 266. 149 corresponding XML tag 297 new 297 XML-to-CSV pre-processing object XP 12 Xpconfig 25 xxx 320 x-y 118.tar 23 xf ins_ALL_7552. 352 Windows services monitoring 50. 254. 93.6.tar 23 XML 24. 183. 61. 323. 359. 314 WMI_RETURN_OUTPUT 254.com 169. 359. 254. 254. 311. 314 WMI_NAME_SPACE 254. 363 Windows EventLog monitoring 363 Windows EventLog Reader 183. 348 Windows Event Types 183 Windows EventLog 183. 23. 25.bmc. 177. 363 Windows Create 183 Windows Event ID 183 Windows Event log 24. 161. 310. 183. 350. 314 Windows Event matches 183 Windows Event monitoring 276. 348. 271. 188. 254. 71. 261. 101. 314. 149.Monitoring Studio KM for PATROL Version 8. 228. 323. 353 WMI Request 353 WMI Scripting Library 161. 276.kml 25 Windows_PERFMON_WIZARD. 276. 50.com/support_home 00d0c9ea79f9bace118c8200aa004ba90b0200000 0030000 31 www. 352 Windows Task Manager 125. 207. 363 Windows EventLogs 348 Windows Events 24. 177.exe process 271 WITHIN 30 311 WMI 24. 125.kml 25 Windows-based 12 swsy_ntx86_8500. 310 Windows Windows/2000 350 Windows XP 14 WINDOWS\system32\svchost. 311 Windows Performance 24. 363 Windows EventLog Reader tool 183. 314. 350. 311 Index 389 . 361. 361.hotmail. 53. 314 WPCONFIG. 143. 188. 359. 143 xyz 320 297 161.tar 23 xf swsy_UNIX_<version number>.

provides key monitoring solutions specifically designed to expand the capabilities of BMC Performance Manager. For more information about BMC About Sentry Software™ Sentry Software. applications.4 billion. Sentry Software products are deployed in 45 countries across the globe and lead the list of BMC Software’s third-party product sales. NYSE:BMC. Delivering Business Service Management.204102 About BMC® Software BMC Software. databases. Inc. thus enabling up to 100% coverage of any infrastructure. a strategic Technology Alliance Partner of BMC Software. Sentry Software specializes in single solutions for multiplatform monitoring of hardware. and service management. is a leading provider of enterprise management solutions that empower companies to manage their IT infrastructure from a business perspective. and blackout windows. custom applications or any IT component. BMC Software has offices worldwide and fiscal 2004 revenues of more than $1. For more . BMC Software solutions span enterprise systems. Founded in 1980.