Professional Documents
Culture Documents
Management
User Guide
Supporting
PATROL KM for Event Management 2.7
PATROL Configuration Manager 1.6
January 2005
Contacting BMC Software
You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
about the company, its products, corporate offices, special events, and career opportunities.
United States and Canada
Address BMC SOFTWARE INC Telephone 713 918 8800 or Fax 713 918 8000
2101 CITYWEST BLVD 800 841 2031
HOUSTON TX 77042-2827
USA
Outside United States and Canada
Telephone (01) 713 918 8800 Fax (01) 713 918 8000
Copyright March 8, 2005 BMC Software, Inc., as an unpublished work. All rights reserved.
BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered trademarks
or trademarks of BMC Software, Inc.
IBM is a registered trademark of International Business Machines Corporation.
DB2 is a registered trademark of International Business Machines Corporation.
Oracle is a registered trademark, and the Oracle product names are registered trademarks or trademarks of Oracle
Corporation.
All other trademarks belong to their respective companies.
BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this
information is subject to the terms and conditions of the applicable End User License Agreement for the product and the
proprietary and restricted rights notices included in this documentation.
Support website
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at
http://www.bmc.com/support_home. From this website, you can
■ read overviews about support services and programs that BMC Software offers
■ find the most current information about BMC Software products
■ search a database for problems similar to yours and possible solutions
■ order or download product documentation
■ report a problem or ask a question
■ subscribe to receive e-mail notices when new product versions are released
■ find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax
numbers, and telephone numbers
5
Remove Customized KM Files From the PATROL_CACHE . . . . . . . . . . . . . . . . . 43
Remove Existing Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Considerations for Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Browser Version Required for Viewing PATROL Console for Unix Help . . . . . . 44
Additional Considerations for Using Online Help for Unix . . . . . . . . . . . . . . . . . . 44
Uninstalling PATROL KM for Event Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . 47
Uninstalling PATROL KM for Event Management on Windows . . . . . . . . . . . . . 47
7
Storing the Encrypted Password as a Pconfig Variable . . . . . . . . . . . . . . . . . . . . . 147
Configuring the PSL Recovery Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Summary of Rules Created. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Testing the Recovery Action. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
9
Installation Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Determining PATROL KM for Event Management Version Number. . . . . . . . . 209
Index 215
11
12 PATROL Knowledge Module for Event Management User Guide
Tables
E-mail Notification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Sending Alerts to Enterprise Console Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Sending Pages using AlarmPoint Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Application Classes and KM File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
AS_EVENTSPRING InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
AS_AVAILABILITY InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
System Requirements for Installing and Using PATROL KM for Event Management
26
System Role Packages Available for Product Components . . . . . . . . . . . . . . . . . . . . . 38
EVENT_MANAGEMENT.kml File and Associated KM Files) . . . . . . . . . . . . . . . . . . 53
Notification Target Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Recommended Rule Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Recommended Configuration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Notification Script Location on Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Requirements for Using Scripts on Unix Notification Server . . . . . . . . . . . . . . . . . . . . 65
Notification Script Location on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Requirements for Notification Server When Using Windows e-mail Clients . . . . . . 66
Editing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Notification Script Arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Quick Config - Notification Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Notification Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
REMOTE AGENT COMMUNICATION SETTINGS dialog box . . . . . . . . . . . . . . . . . 79
Message Length Limitations by Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Availability Target Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Threshold Setting Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Wildcard Usage in Threshold Rules: Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Blackout Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
PATROL KM for Event Management Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Sending E-mail Notification for Low Disk Space: Configuration Overview . . . . . . 129
Sending E-mail Notification for Low Disk Space: Configuration Overview . . . . . . 145
Rules Created: Oracle Recovery Action Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
PATROL Objects Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Example: PATROL Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Example: Rule Inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
PATROL KM for Event Management Variable Definition . . . . . . . . . . . . . . . . . . . . . 155
NOTIFY_EVENT Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Notification Server Message Replacement Variables . . . . . . . . . . . . . . . . . . . . . . . . . 160
Notification Server Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
arsAction Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
alertSystem Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
13
Notification System Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
allowOverrides Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
LoginDeniedIgnoredUsers Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
useEnvOnlyForCmds Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
useEnvOnlyForCmds Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
SpoolDirectory Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
SetParameterValue Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
alertResend Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
alertLocalCommand Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
arsCommand Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
arsCmdType Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
alertResetOnInit Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Remote Alert Settings: Configure Notification Servers Configuration Variable . . . 170
Remote Alert Settings: Configure Notification Servers Configuration Variable . . . 170
Remote Alert Settings: Remote Communication Settings Configuration Variable . 170
Notification Targets: Email Target Configuration Variable . . . . . . . . . . . . . . . . . . . . 172
Notification Targets: Pager Target Configuration Variable . . . . . . . . . . . . . . . . . . . . 172
Notification Targets: Custom Target Configuration Variable . . . . . . . . . . . . . . . . . . 173
Notification Targets: TT Targets Configuration Variable . . . . . . . . . . . . . . . . . . . . . . 173
Blackout Periods Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Overrides Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Notification Server Settings: Remote Target Setting Configuration Variable . . . . . 175
msgText Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
msgBody Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Custom Configuration Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
allowOperator Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
active Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
appClassSettingsStatusFlag Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
disableNotifyAnnotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
disableNotifyAnnotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Add Target Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Add Target: Updated Flag Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Primary Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Blackout Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
PingCmd Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
pingOKString Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
pingPacketSize Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
pingAttempts Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
pingArgs Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Checker Account Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Parameter Settings: Thresholds Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Understanding the THRESHOLDS Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Parameter Settings: poll times Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Parameter Settings: Status Flags Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Parameter Settings: poll times Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Filter List Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Filter Type Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
PATROL KM for Event Management Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
PATROL KM for Event Management Parameter Defaults . . . . . . . . . . . . . . . . . . . . . 194
1
Product Components and
1
Capabilities
This chapter provides an overview of the PATROL Knowledge Module for Event
Management (also referred to as PATROL KM for Event Management).
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Typical Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Notification Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Rules Stored as Pconfig Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Notification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Sending Notification: Process Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Sending Alerts to an Enterprise Console: Process Flow . . . . . . . . . . . . . . . . . . . . . 20
Sending Pages using AlarmPoint: Process Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Using the PATROL Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
PATROL Configuration Manager Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Usage Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Tasks that Must be Completed Using PATROL KM for Event Management . . . 22
Application Classes and Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Application Class Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Application InfoBox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Chapter 1 15
Features
Features
PATROL KM for Event Management provides event notification, message
rewording, and centralized alert management features. With the PATROL KM for
Event Management, you can:
■ integrate with any command line e-mail client, paging solution, compiled
executable, or script. Sample scripts are provided.
Architecture
The PATROL KM for Event Management architecture consists of monitored hosts
(remote agents) and notification servers. Notification servers collect and process
events from monitored systems according to notification rules that you define.
Notification rules specify:
Both the monitored hosts and the notification servers require a PATROL Agent and
the PATROL KM for Event Management. Figure 1 on page 17 shows an PATROL KM
for Event Management environment with several monitored hosts and two
notifications servers (a primary and a backup).
Typical Configuration
In the typical configuration, monitored hosts forward events to a primary notification
server. The backup notification server is used only when the primary notification
server is unavailable. Failover is automatic. If the primary and the backup notification
servers are unavailable, the monitored host queues its events. When communication
is restored, the monitored host forwards queued events to the notification servers.
Primary Backup
Notification Server 1 Notification Server 2
Notification Servers
BMC Software recommends the use of notification servers. The PATROL KM for
Event Management architecture does not require a notification server to perform
notifications. Any monitored host running the PATROL KM for Event Management
can be configured to perform its own notifications, event filtering, and alert control.
However, there are advantages to using a notification server. For more information,
see “Why use a Notification Server?” on page 58.
Chapter 1 17
Notification Process
Notification Process
The following diagrams show how notification occurs in the following configuration:
The PATROL KM for Event Management rules that apply at each step are shown. For
detailed rule descriptions, see Chapter 5, “Rules and Configuration Variables”.
Chapter 1 19
Notification Process
Chapter 1 21
Using the PATROL Configuration Manager
Usage Examples
For a brief example of how to use the PATROL Configuration Manager to copy
settings, see “Sending E-mail Notification When Disk Space is Low” on page 128.
For detailed instructions on using PATROL Configuration Manager, see the PATROL
Configuration Manager User Guide.
■ AS_EVENTSPRING
■ AS_AVAILABILITY
Table 4 describes the PATROL KM for Event Management application classes, icons
and KM files.
The AS_AVAILABILITY icon represents the Availability application class and resides
at the application level beneath the computer icon. All monitored hosts appear
beneath the Availability container and are accessed by double-clicking the
AS_AVAILABILITY icon.
NOTE
The AS_AVAILABILITY application class icon is not displayed in the PATROL
Console until availability targets are added.
Chapter 1 23
Application Classes and Instances
3 Choose InfoBox.
Table 5 shows the InfoBox items for the AS_EVENTSPRING application class.
Table 6 shows the InfoBox items for the AS_AVAILABILITY application instances.
2
Installing and Migrating PATROL KM
2
Installation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Virtual Machine Support Limitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Backing up the Notification Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Checking for Product Patches or Fixes Before Installing. . . . . . . . . . . . . . . . . . . . . 30
Determining How to Install Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Determining Where to Install the PATROL Agent. . . . . . . . . . . . . . . . . . . . . . . . . . 32
Determining Where to Install KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
PATROL Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Checking Security Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Assessing and Implementing a Different Security Level . . . . . . . . . . . . . . . . . . . . 34
Typical and Custom Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Installing into a PATROL 3.3.x or 3.4.x Unix Environment . . . . . . . . . . . . . . . . . . 36
First-Time Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Installing For the First Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Installing on AS/400 (iSeries) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Upgrading from an Earlier Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Remove Customized KM Files From the PATROL_CACHE . . . . . . . . . . . . . . . . . 43
Remove Existing Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Considerations for Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Browser Version Required for Viewing PATROL Console for Unix Help . . . . . . 44
Additional Considerations for Using Online Help for Unix. . . . . . . . . . . . . . . . . . 44
Uninstalling PATROL KM for Event Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . 47
Uninstalling PATROL KM for Event Management on Windows . . . . . . . . . . . . . 47
Chapter 2 25
Installation Overview
Installation Overview
This chapter contains instructions for installing PATROL KM for Event Management.
For additional installation instructions, see the following documents:
Information Document
You are installing the PATROL KM for Event ■ PATROL for Microsoft Windows Servers
Management along with many other PATROL Getting Started
components and you need information about ■ PATROL for Unix Getting Started
migrating customizations or using the Distribution ■ PATROL for OpenVMS Installation Guide
Server (DS). ■ PATROL for AS/400 Getting Started
You need more technical details about how to use PATROL Installation Reference Manual
the installation program.
You need more information on distributing the Distribution Server Getting Started Guide
PATROL KM for Event Management or other
PATROL components using the Distribution Server.
System Requirements
Before installing the PATROL KM for Event Management, verify
■ the target computer meets the system requirements noted in Table 7 on page 26,
including supported OS platforms and PATROL product versions.
NOTE
For a current list of the supported operating systems, see the release notes for the
PATROL solution. For example, the PATROL for Microsoft Windows Servers Release
Notes.
■ the account that you use to install the product has sufficient privileges
Table 7 System Requirements for Installing and Using PATROL KM for Event Management
(Part 1 of 2)
Resource Requirements Comments
operating For a current list of the supported operating systems, see the
systems release notes for the PATROL solution. For example, the
PATROL for Microsoft Windows Servers Release Notes.
PATROL For a current list of the supported PATROL products, see
products the release notes for the PATROL solution. For example, the
PATROL for Microsoft Windows Servers Release Notes.
Table 7 System Requirements for Installing and Using PATROL KM for Event Management
(Part 2 of 2)
Resource Requirements Comments
security levels For information on security, see “PATROL Security Levels” On iSeries, only
on page 34. security levels 0 and
1 are supported.
The PATROL Security Level is set during the installation of
the PATROL infrastructure components. If your product
contains the PATROL Agent, you have an opportunity to
select the security level. Make sure that the level that you
select/accept is compatible with the rest of your enterprise’s
PATROL installation.
license You must have a valid demonstration license (typically
good for 30 days) or a permanent license to run your
PATROL products. If you do not have a permanent license,
contact your BMC Software sales representative or the BMC
Software Contract Administration department.
ports If you are installing an agent or console with PATROL KM The default port
for Event Management, you must specify the port number number is 3181 for
to connect to all the agent computers. agents.
(Unix only) Use Netscape Navigator version 3.01–4.78 to use online “Browser Version
browser to Help with PATROL for Unix. Required for
support online Viewing PATROL
Help for Console for Unix
PATROL for Help” on page 44
Unix Console
browser This product uses Common Installer 7.5.20, which requires
a browser. For a list of supported browser, see the PATROL
Installation Reference Manual.
Accounts
This section describes how to set up a PATROL installation account for Windows and
Unix platforms.
Windows Environment
PATROL requires a dedicated user account, known as the PATROL default account,
in the Windows environment. The PATROL default account must be created before
you install PATROL. The PATROL default account can be either a local or a domain
account:
Chapter 2 27
Installation Overview
■ Stand-alone workgroup servers must use a local user account as a PATROL default
account.
■ Servers that are trusted members of a domain may use either a local or domain
account.
Administrative Rights
BMC Software recommends that you make the PATROL default account a member of
the local Administrators group of the computer where the agent will reside. On a
domain controller, BMC Software recommends that you make the account a member
of the domain Administrators group. However, you can choose to remove the
PATROL default account from the Administrators group. If you do so, the PATROL
Agent may not be able to perform all of its administrative tasks. For example, the
PATROL Agent may not be able to execute recovery actions or perform other
activities that requires administrative rights on the monitored machine.
Although you can use an existing Windows user account, BMC Software
recommends that you create a separate Windows user account for PATROL.
WARNING
Do not use a built-in Windows domain or local Administrator account as the
PATROL default account. Such account usage causes files created by PATROL to be
owned by the Administrator, which could result in security or file access problems.
Unix Environments
BMC Software recommends that if you require a Unix account, the account that you
create should meet the following conditions:
■ The account .login, .profile, .cshrc, and .kshrc files should contain as little user
customization as possible. Specifically, be sure that the account has no aliases and
that no commands in these files can change the unmask setting. The recommended
umask setting for the installation account is 022. In addition, verify that the prompt
is set to the default.
■ Do not use the root account to install PATROL products because this may create
security risks.
■ Ensure that the account has permission to create directories in the directory where
you will install PATROL products.
■ Ensure that the computers on which you want to install PATROL have ftp and
telnet enabled.
BMC Software recommends that you install PATROL on local partitions, not on
NFS-mounted partitions. If you do install PATROL on NFS-mounted partitions, the
root account must have been granted root access permissions on the NFS server.
The account that you use to install PATROL must have permission to write the
installation logs to the $HOME and /tmp directories on the computer where you are
installing products.
Your PATROL product may have other restrictions with regard to the logon accounts
and the default PATROL account. Check with your developers for text that more
fully describes the logon and PATROL account requirements for your product. Many
products require, for example, that the default PATROL account have the same rights
as the third-party product that your KM monitors.
BMC Software does not anticipate problems with the PATROL product families in
virtual infrastructure implementations, but these products have not been specifically
tested in this scenario. Therefore, BMC Software will provide support only for
problems that are reproducible without these complementary technologies.
Chapter 2 29
Preparing for Installation
Local Installation
If you install locally, you must install PATROL KM for Event Management and a
PATROL Agent on each computer that you want to monitor, and PATROL KM for
Event Management and a PATROL Console for Windows or Unix on each computer
from which you want to view results. If you install locally in a PATROL 7.x
environment, you must install PATROL KM for Event Management on the computer
that hosts the PATROL Console Server.
Remote Installation
If you create an installable image, the product configuration information that you
enter, such as the BMC Software products installation directory, account names,
passwords, PATROL Agent port number, and security options, must be the same for
all computers on which the image is to be installed. To specify different settings for
different computers, you must either create a separate image for each set of values
that you want to implement or edit the variables in the image’s control file by using
the ctltool.
For more information about creating, distributing, and installing installable images,
and about using the ctltool, see the PATROL Installation Reference Manual.
Installation Utility
The installation instructions contained in this book pertain to version 7.5.20 of the
installation utility. This version of the installation utility might be different from the
version included on another product CD or from a version that you downloaded
from the BMC Software Electronic Product Download (EPD) site. If you use a version
of the installation utility other than version 7.5.20, the instructions in this book may
not accurately describe what you see on your screen.
Chapter 2 31
Preparing for Installation
When installing the PATROL Agent, select Managed System as the system role during
the installation.
PATROL 3.x
In a PATROL 3.x environment, you must install KMs on the following computers:
■ Computers hosting the PATROL Console for Windows or PATROL Console for
Unix—Select Console Systems as the System Role in the installation utility when
installing KMs on computers hosting the PATROL Console for Windows or
PATROL Console for Unix. This selection installs KM files for use by the console.
PATROL 7.x
In a PATROL 7.x environment, you must install KMs on the following computers:
NOTE
If you do not install each KM on the computer hosting the PATROL Console Server
and select Common Services Systems as the System Role in the installation utility, no
KM icons or KM Help files will be available in either PATROL Central
Operator – Microsoft Windows Edition or PATROL Central Operator – Web Edition.
When using PATROL Central Operator – Web Edition, install KMs on computers
hosting the PATROL Console Server using the Common Services Systems role and
computers hosting the PATROL Agent using the Managed Systems role.
You must also install KMs on the computer hosting the PATROL Central
Operator – Web Edition web server using the Common Services Systems role.
For more information about the PATROL 7.x architecture, see the PATROL
Infrastructure Planning Guide.
Additional Information
For more information about the PATROL consoles and PATROL Console Server or
RTserver, see the product’s respective online help systems and the following
documents:
Chapter 2 33
PATROL Security Levels
WARNING
The PATROL Agent, console server, and consoles must operate at the same security
level to communicate with each other. When you install agents, console servers, or
consoles that need to communicate with previously installed versions of these
components, check the security level of the previously installed components and be
sure to install the new ones at the same level.
1 From the command line switch to the path on the computer that you want to check:
%BMC_ROOT\..\common\security\bin\OS
2 Run the following command to display the security policy of the current machine:
esstool policy -a
The security level is displayed in the “security level” field of the output.
■ The Typical installation type uses defaults values for all optional configuration
information. It prompts you only for mandatory configuration information. This
type is for any or all of the following situations:
— You are new to the PATROL product that you are installing and you have an
agent or console already installed in the default directories.
— You are performing a first-time installation (you are not upgrading), and you
are installing into the default product installation directories.
NOTE
If you are installing PATROL KM for Event Management to an existing PATROL
Agent or Console environment that is not in the default installation directory, use
Custom. Do not use Typical. Typical will automatically install the agent or console with
PATROL KM for Event Management and overwrite your existing installation.
■ With the Custom installation type, you can install individual components of the
product. It requires that you specify all configuration information. This type is for
any or all of the following situations:
— You want to install individual components rather than the entire product.
— You want to specify
■ the port numbers that components use to communicate with each other
The Custom installation type installs the KMs that you select.
With each installation type, you can deselect any components that you don’t want
to install.
NOTE
If you choose the typical installation type, the PATROL KM for Event Management is
automatically installed when you select the operating system KM. For example, if you
select the PATROL KM for Windows Operating System, the PATROL KM for Event
Management is automatically installed.
Chapter 2 35
Typical and Custom Installation Types
If you have a PATROL Agent installed on the computer where you are installing
PATROL KM for Event Management–Preload component, the installation script
designates PATROL KM for Event Management as a preloaded KM in the agent
configuration file. When a KM is designated as a preloaded KM on a PATROL Agent,
it automatically loads and begins to monitor resources and applications whenever the
agent is started.
If you have a PATROL Console installed on the computer where you are installing
the PATROL KM for Event Management–Preload component, the installation script
loads the PATROL KM for Event Management into the console.
For more information about preloading, see the PATROL Agent Reference Manual.
First-Time Installation
The installation utility offers two types of installations: Typical and Custom. For a
description of the two types of installations, see “Typical and Custom Installation
Types” on page 35.
NOTE
By default, the Typical installation type configures the PATROL Agent to connect
through port 3181. To connect the agent from a different port, you must use the
Custom installation type.
■ You first should install on a limited number of computers in the test environment,
test the installation thoroughly, and then install in your production environment.
1 Close the Service Control Manager window and the Control Panel window.
3 In the Welcome to the Installation Utility window, click Next to begin your
installation.
4 Review the license agreement, select Accept, and click Next to continue.
Chapter 2 37
First-Time Installation
5 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
6 In the Select Type of Installation window, select Typical and click Next to continue.
7 In the Specify Installation Directory window, accept the default directory and click
Next to continue.
8 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
■ If you are installing to a computer that hosts or will host a (Windows only)
PATROL Console for Window (Unix only) PATROL Console for Unix, select
Console Systems.
■ If you are installing to a computer that hosts or will host a PATROL Agent,
select Managed Systems.
■ If you are installing to a computer that hosts or will host the PATROL Central
Operator – Web Edition (PATROL 7.x architecture) Web server, the PATROL
Console Servers, or the RTservers, select Common Services.
Fore more information, see “Determining Where to Install the PATROL Agent” on
page 32.
9 From the Select Products and Components to Install window, select components
that you want to install (see Figure 2 on page 39) and click Next.
NOTE
If you choose the typical installation type, the PATROL KM for Event Management is
automatically installed when you select the operating system KM. For example, if you
select the PATROL KM for Windows Operating System, the PATROL KM for Event
Management is automatically installed.
NOTE
The actual selectable components may be different that what is shown in Figure 2.
For example, components that you are installing with the PATROL KM for Event
Management will also be shown.
10 In the PATROL Default Account Properties window, enter the user name and
password that you want to use for your PATROL default account and click Next.
You should have created this account manually before you began to install
PATROL. (For more information about the PATROL account, see “Accounts” on
page 27.) This window is displayed only when you are installing a product that
requires a PATROL logon.
Chapter 2 39
First-Time Installation
12 In the Review Selections and Install window, review the selections carefully to
ensure that they are correct:
A status window opens that contains current messages, current milestones, and
percentage complete.
13 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100%
complete.)
1 Close the Service Control Manager window and the Control Panel window.
3 In the Welcome to the Installation Utility window, click Next to begin your
installation.
4 In the Review License Agreement window, review the license agreement, select
Accept, and click Next to continue.
5 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
6 From the Select Type of Installation Window, select Custom and click Next.
7 In the Specify Installation Directory window, enter the directory where the
products you select will be installed and click Next.
The PATROL product directory is appended to the path that you enter in this step.
You will specify the PATROL product directory in step 10 on page 41.
8 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
■ If you are installing to a computer that hosts or will host a PATROL Console,
select Console System.
■ If you are installing to a computer that hosts or will host a PATROL Agent,
select Managed System.
■ If you are installing to a computer that hosts or will host the PATROL Central
Operator – Web Edition (PATROL 7.x architecture) Web server, the PATROL
Console Servers, or the RTservers, select Common Services.
For more information, see “Determining Where to Install the PATROL Agent” on
page 32.
For more information about the PATROL consoles and PATROL Console Server or
RTserver, see the following documents:
9 From the Select Products and Components to Install window, select the items that
you want to install and click Next.
10 In the Provide the PATROL 3.x Product Directory window, enter in the PATROL
3.x Product Directory field the directory in which you want to install PATROL KM
for Event Management as appropriate for your installation scenario. For more
information, see the instructions displayed on the PATROL 3.x Product Directory
window.
This directory is appended to the base directory path that is shown in the BMC
Products Installation Directory field. The installation directory was entered in
step 7 on page 40.
11 If the PATROL Default Account Properties window appears, enter the user name
and password that you want to use for your PATROL default account and click
Next. You should have created this account manually before you began to install
PATROL. (For more information about the PATROL Account, see “Accounts” on
page 27.) This window is displayed only when you are installing a product that
requires a PATROL logon.
12 If the Complete the Confirm BMC Startup Information window appears, perform
the following steps:
A In the Specify the Current Agent Port Number field, enter the port number that
you want the PATROL Agent to use. The default is 3181.
NOTE
If your previous installation used a different port number, change the default to
the current port number for the PATROL Agent.
Chapter 2 41
First-Time Installation
B In the Restart the PATROL agent automatically? field, select the appropriate
option:
■ If you want the installation utility to restart the PATROL Agent after the
installation is complete, select Yes.
■ This window may not be displayed if you are not installing into a managed
system.
13 In the Review Selections and Start Install window, review the selections carefully
to ensure that they are correct:
A status window opens that contains current messages, current milestones, and
percentage complete.
14 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100%
complete.)
While there is no migration for the PATROL KM for Event Management, there are
some steps you must take if you install version 2.7 on a system that had a previous
version of the KM. The following sections describe the actions that you must perform
to upgrade from a previous version of PATROL KM for Event Management.
Windows Consoles
1 From the PATROL Classic Developer Console main window, select the KM tab.
Knowledge Module => Computer Classes => ALL_COMPUTERS => Global => Menu
Commands
4 Select Delete.
Chapter 2 43
Considerations for Using Online Help
Installation Requirement
You must install Netscape Navigator on the computer where the PATROL console
resides. You can install Netscape anywhere on your Unix computer as long as the
binary is in the path.
Download Location
Netscape Navigator is supplied by Netscape Communications Corp. You can locate
the browser at http://home.netscape.com/download.
LANG Variable
The Unix LANG environment variable must be set to C so that Netscape Navigator
will work properly. Otherwise, you might experience product failures.
PATH Variable
The PATROL user account PATH variable must contain the location of the directory
containing the Netscape files. If the directory containing the Netscape files is not in
the path, add the directory to the PATROL user account path.
This requirement applies only to the PATROL user account on the PATROL console
computer.
Chapter 2 45
Considerations for Using Online Help
PATROL_BROWSER Variable
When PATROL starts the Help browser, it uses the command in the
PATROL_BROWSER environment variable. As a default, the PATROL_BROWSER
environment variable contains the following command:
Example
WARNING
If you use a different version of the installation program to uninstall, you might
remove files needed to perform uninstallation of other BMC Software products.
(Windows) BMC_ROOT\Uninstall
(Unix) BMC_ROOT/Uninstall
(Windows) uninstall.exe -v
(Unix) ./uninstall.sh -v
Chapter 2 47
Where to Go from Here
1 From the Uninstall directory in your BMC Software product installation directory,
double-click uninstall.exe to launch the installation utility in uninstall mode.
NOTE
As an option, you can launch the installation utility in uninstall mode by choosing
Start => Settings => Control Panel => Add/Remove Programs and double-clicking
BMC Software Tools in the Add/Remove Programs Properties dialog box.
2 Select the installation directory from which you want to remove a product, and
click Next.
3 Select the product or products that you want to uninstall, and click Next.
After the uninstallation is complete, a window is displayed that tells you whether the
uninstallation was successful.
For more information about advanced uninstallation options, such as uninstalling the
KM but retaining log files, which contain history for future analysis and
configuration files for redeployment, see the PATROL Installation Reference Manual.
3
Using the PATROL KM for Event
3
Management
This chapter provides information on using the PATROL KM for Event Management
to perform notification, availability checking, and parameter threshold management.
Chapter 3 49
Integrating with AlarmPoint. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
AlarmPoint Benefits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Notification Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Installing and Configuring AlarmPoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Installing the AlarmPoint Java Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Configuring the AlarmPoint Java Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Testing the Java Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Using Action Scripts for AlarmPoint 5.2.01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Configuring Notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Testing Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Managing Parameter Thresholds and Poll Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Benefits of Using the PATROL KM for Event Management . . . . . . . . . . . . . . . . . 104
Setting Collector Poll times. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Using Wildcards to Represent PATROL Instance Names . . . . . . . . . . . . . . . . . . . 107
Activating and Deactivating Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Applying Thresholds and Poll Time Changes to the Agent . . . . . . . . . . . . . . . . . 111
Disabling the use of PATROL KM for Event Management Thresholds and Poll
Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Specifying What to Monitor or Exclude from Monitoring . . . . . . . . . . . . . . . . . . . . . . 112
Selecting Application Instances to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Excluding Application Instances from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . 114
Configuring Blackout Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
About Notification Blackout Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Configuring Notification Blackouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Configuring Availability Blackouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Configuring Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
About Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Enabling PATROL KM for Event Management Recovery Actions . . . . . . . . . . . 121
Specifying a Recovery Action Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Specifying a Recovery Action Command Type. . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Using PSL Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
■ The PATROL console version 3.4.x or later and the PATROL KM for Event
Management are installed on the computer that you want to use for the PATROL
console.
■ The PATROL Agent version 3.4.x or later and the PATROL KM for Event
Management are installed on the computer that you want to monitor and manage.
Preloading KMs is a PATROL Agent feature that causes KM files to continue to run
on the agent when no consoles are connected. KMs that are not preloaded collect data
only while a PATROL console is connected to the PATROL Agent.
Chapter 3 51
Loading and Unloading KMs
■ AS_EVENTSPRING.km
■ AS_AVAILABILITY.km
■ AS_EVENTSPRING_ALL_COMPUTERS.km
Preloaded KMs collect data as long as the PATROL Agent runs, even when no
PATROL console is connected. When you view a preloaded KM’s data collection
history, you do not see any gaps that would otherwise occur (because of the console’s
absence).
If you no longer want to use an application class that you previously loaded, you can
use the unload instructions to unload the .km file so that its application class no
longer appears in your console.
PATROL Central - Windows Edition has a Loading KMs wizard that enables you to
control which KMs are loaded on which computers.
1 On the Common Tasks tab of the taskpad, click the Load Knowledge Modules icon.
The wizard lists each computer on which a PATROL Agent has been installed.
3 Select the check boxes for the computers on which you want to load KMs, and click
Next.
The wizard displays a list of available .kml files for each computer selected in the
previous step. Each .kml file is listed once for each computer. You can display .km
files by changing the filter.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
4 Select the check boxes for the KM and computer pair that you want to load.
PATROL Central - Web Edition has a Loading KMs feature that enables you to
control which KMs are loaded on which computers.
Chapter 3 53
Loading and Unloading KMs
1 From the Monitored Systems page, click the Load/Unload KMs button.
The Load KMs page opens, listing each computer on which a PATROL Agent has
been installed.
2 Select the computers on which you want to load KMs, and click Next.
The Load KMs page displays a list of available .km and .kml files.
If you selected more than one computer, the only .km and .kml files that are listed
are the ones that have been installed on all of the selected computers. If a particular
.km or .kml file was installed only on one computer, you must choose that
computer by itself to load the file.
The KMs available in this product are listed in Table 9 on page 53.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
4 Click Finish.
NOTE
To load a .km or .kml file that was not listed in Step 2, ensure that the KM is
installed on the appropriate computer and select only that computer in Step 2.
1 From the PATROL Console for Windows menu bar, choose File => Load KM.
The Load KMs dialog box displays a list of available .kml files. The KMs available
in this product are listed in Table 9 on page 53.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
PATROL loads the selected KMs on all of the computers listed under
PATROLMainMap.
1 From the PATROL Console for Unix menu bar, choose File => Load KM.
The Load KMs dialog box displays a list of available .kml files. The KMs available
in this product are listed in Table 9 on page 53.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product
component files. Loading individual .km files can break the interdependencies
between the .km files, while loading .kml files preserves these dependencies.
PATROL loads the selected KMs on all of the computers to which your console is
connected.
NOTE
The AS_AVAILABILITY application class icon is not displayed in the PATROL
Console until availability targets are added.
Chapter 3 55
Loading and Unloading KMs
PATROL Central - Windows Edition has a wizard that enables you to unload
specified .km files from specified computers.
1 On the Common Tasks tab of the taskpad, click the Unload Knowledge Modules icon.
The wizard lists each computer on which a PATROL Agent has been installed.
3 Select the check boxes for the computers from which you want to unload .km files,
and click Next.
The wizard displays a list of application class names (that correspond to .km file
names) for each computer selected. Each application class name is listed once for
each computer.
4 Select the check boxes for the .km and computer pair that you want to unload, and
click Next.
5 Click Finish.
The console removes the selected .km files from the current management profile.
PATROL Central - Web Edition has a feature that enables you to unload specified .km
files from specified computers.
2 Select the computers from which you want to unload .km files, and click Next.
The Load KMs page displays a list of .km files. Currently loaded .km files are
highlighted in the list.
3 Select the .km files that you want to unload and click Next.
4 Click Finish.
The console removes the .km files that you specified. These .km files are no longer in
the current management profile.
1 From the KM tab of the tree view, right-click the application class name that you
want to delete and choose Delete from the pop-up menu.
The console displays a dialog box that asks if you want to delete the selected
application.
The application class is removed from your cache directory and your console
session file.
3 Repeat Step 1 and Step 2 until you have deleted all of the application classes
associated with the KM that you want to delete.
4 From the console menu bar, choose File => Save KM to save your changes.
1 From the PATROL Main window, choose Attributes => Application Classes.
2 Click the name of the application class that you want to delete.
3 From the List of Application Classes menu bar, choose Edit => Delete.
The application class is removed from your cache Directory and your console
session file. The PATROL Console for Unix removes the application class name
from the List of Application Classes.
4 Repeat Step 2 and Step 3 until you have deleted all of the application classes
associated with the KM that you want to delete.
5 From the List of Application Classes menu bar, choose File => Save KM to save
your changes.
Chapter 3 57
Configuration Planning
Configuration Planning
Before you can use PATROL KM for Event Management, you must gather
information and plan your configuration. You should gather the following
information:
Notification servers also provide redundancy when you use a primary and backup
notification server.
Once you have configured a primary and backup notification server, you can use the
PATROL Configuration Manager to copy the settings to the other notification servers.
If you use this method, make sure that you use the same notification script file name
and directory path on all notification servers.
Providing Security
To improve security, create an operating system account on the notification server
systems to be used specifically for remote notification. This configuration enables you
to avoid using the more commonly used PATROL account. You can configure the
notification server so that it is unable to fully login to the notification server system by
using the operating system. For example, on Unix, give the notification server login
an invalid login shell, such as /bin/false.
NOTE
You must install the PATROL Agent and the PATROL KM for Event Management on
the notification server system.
Chapter 3 59
Configuration Planning
To further configure and customize the PATROL KM for Event Management, you can
specify e-mail targets for each PATROL object. For example, you may want Unix
related alerts to go to your Unix administrator and Windows related alerts to go to
your Windows administrator.
Create a notification table similar to the one in Table 10 to identify who to notify for
each type of alert. For more information, see “Setting Notification Targets” on
page 82.
Providing Redundancy
You should configure both a primary and a backup availability monitor. The backup
availability monitor monitors only the availability of the primary availability
monitor. If the primary availability monitor becomes unavailable, the backup
availability monitor assumes monitoring until the primary availability monitor is
available.
Improving Performance
To improve the availability monitor performance, you should apply certain agent
rules to the availability monitor. For more information, see“Configuring the
Availability Monitor Agent” on page 91.
TIP
Availability checkers perform best on Unix machines and allow easier management
of multiple agents running availability checkers on one machine.
Chapter 3 61
Configuration Planning
Configuring Notification
This sections describes how to configure the PATROL KM for Event Management to
perform notification.
Chapter 3 63
Configuring Notification
■ a Unix shell script that sends e-mail notification using mailx (Unix) or mail (Linux)
■ a Perl script that sends e-mail notification using mailx (Unix) or mail (Linux)
NOTE
The PATROL KM for Event Management Perl script has been tested with Perl 5.
The scripts that run on Unix, shown in Table 13, are located in
$PATROL_HOME$/lib/psl
Unix Requirements
To use the Unix scripts, the server sending the notification must meet the
requirements shown in Table 14.
On Linux, you must edit the script and change any mailx references to mail.
Perl Associate the .pl extension with Perl. Otherwise, you must call the script
using the syntax shown below:
perl PATROL3-4/lib/psl/AS_EVSLocalAlertNotify.pl
On Linux, you must edit the script and change any mailx references to mail.
Windows Scripts
On Windows, the following script options are available:
■ a Windows batch file that you must edit before use, which can send any of the
following types of notification:
Chapter 3 65
Configuring Notification
NOTE
The PATROL KM for Event Management has been tested with Blat version 1.7.
Windows Requirements
To use these Windows scripts, the server sending the notification must meet the
requirements shown in Table 16.
Table 16 Requirements for Notification Server When Using Windows e-mail Clients
Script Requirement
Batch File Script If Blat is installed in a directory other than C:\Blat, you must
move Blat to this directory or edit AS_EVSLocalAlertNotify.bat
to execute Blat from the directory where it is installed.
Perl Script The Perl script assumes the use of Blat. If Blat is installed in a
directory other than C:\Blat, you must move Blat to this directory
or edit the Perl script, AS_EVSLocalAlertNotify.pl, to execute
Blat from the directory where it is installed.
Associate the .pl extension with Perl. Otherwise, you must call the
script using the following syntax:
perl C:\PATROL3-4\lib\psl\AS_EVSLocalAlertNotify.pl
Table 16 Requirements for Notification Server When Using Windows e-mail Clients
Script Requirement
SMTP VB Script The SMTP service must be running.
OpenVMS Scripts
On OpenVMS, the script AS_EVSLocalAlertNotify.com is provided. By default, this
script sends e-mail notifications using the native OpenVMS utility MAIL. If you use
this mail utility, no script modifications are required.
Editing Scripts
Before using the sample scripts, you may have to edit them, as described in Table 17
on page 68.
Chapter 3 67
Configuring Notification
If you use the Perl script, minor editing is needed. For details, see
“Editing Perl Script for use on Windows” on page 69.
If you use Blat and Blat is not installed in the C:\Blat directory, you
must edit the script to indicate the appropriate path.
If you use the SMTP VB script, you must edit the script to indicate
the name of your mail server and the SMTP port number. For more
information, see “Editing the SMTP VB Script” on page 3-69.
AS/400 No edits required if using native mail utility. If you use a different
(iSeries) mail utility, you must edit the script to call the desired utility.
OpenVMS No edits required if using native mail utility. If you use a different
mail utility, you must edit the script to call the desired utility.
If you use AS_EVSLocalAlertNotify.bat, remove the REM comments from the mail
client that you want to use. The script provides sections for MAPI-based e-mail,
SMTP-based e-mail, and Blat. For example, to use Blat, in the script shown below,
remove the REM comments beginning with the line that starts with set and ending
with the line that reads goto BYE.
:EMAIL
rem --
rem -- BLAT based eMail
rem --
rem set email_file=c:\blat\mtext%AS_PARAMETER_NAME%_%AS_SSTIME%.txt
rem if ."%AS_USERDEFINED%"==."" echo "%nmsg%" > %email_file%
rem if not ."%AS_USERDEFINED%"==."" echo "%AS_USERDEFINED%" > %email_file%
rem if .%email_file%==. set email_file=c:\blat\default.txt
rem if exist c:\blat\blat.exe c:\blat\blat %email_file% -t %ntargets% -s %nmsg%
rem goto BYE
If you use a third-party command-line e-mail client or if you want to use the script to
perform other types of notification, such as paging or trouble tickets, you must add
the code to the script that calls the e-mail client or appropriate notification utility.
On Windows, you must edit the Perl script before you can use it to send e-mail
notifications with Blat. Find the following line in the Perl script and remove the
comment (# ):
To use the SMTP VB Script (sendmail.vbs), you must edit the script to add the
following information:
■ pages
■ trouble tickets
■ custom notifications
Chapter 3 69
Configuring Notification
The PATROL KM for Event Management notification scripts have clearly marked
sections where you can add scripting to support these notification types.
NOTE
You must supply the notification software. For example, you can use the notification
script to issue a trouble ticket notification, but to actually create a trouble ticket, you
must have a trouble ticket application, such as Remedy.
To perform a test, run the appropriate notification script as shown in the following
example:
NOTE
Replace ext with the file extension of your notification script (bat, sh, or pl).
If you use the page, tt, and custom notification types, you must
customize the notification script.
targets A comma-separated list of notification message recipients (e-mail
addresses, page numbers, trouble-ticket inboxes, or custom addresses).
Spaces within the list are converted to commas by the notification script.
message the notification or test message that is sent to the targets
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
configure one notification server, you can use the PATROL Configuration Manager to
copy your configuration to other notification servers.
1 From the PATROL console, access the managed system you are using as your
notification server and display the KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
The Quick Config - Notification Server dialog box opens as shown in Figure 3.
Chapter 3 71
Configuring Notification
Use the Quick Config - Notification Server dialog box to specify the notification
server properties. The notification server properties are described in Table 19:
All events for PATROL objects that do not have defined notification
targets are sent to this e-mail address. See “Configuring Recovery
Actions” on page 120 for information on setting notification targets.
If you don’t want any notifications sent until you configure notification for
specific PATROL applications or parameters, enter NONE as your default
e-mail account or leave this field empty.
Notification Command the complete path and filename of the notification script or command used
to send notifications
Perform Alert Test specifies whether you want to perform an alert test after the changes are
accepted
If this is your first time using the PATROL KM for Event Management,
you should perform an alert test and verify that the notifications are
received.
4 Repeat this task for the server you are using as the backup notification server.
1 For the agent that you want to configure, access the KM menu commands as
described in “Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Notification
System.
3 Select the PATROL object (application, class, and parameter) that you want to
configure. To configure all PATROL objects, select Set For Classes and then select /.
NOTE
Notification servers are not required. Remote agents can send their own notifications.
However, there are considerable benefits to using notification servers. For more
information, see “Why use a Notification Server?” on page 58.
You should configure and test the notification servers before configuring the remote
PATROL Agents served by the notification servers.
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
configure one notification server, you can use the PATROL Configuration Manager to
copy your configuration to other notification servers. The configuration settings are
stored in the following variables:
■ AS/EVENTSPRING/NOTIFICATION_SERVER1.defaultAccount (primary)
■ AS/EVENTSPRING/NOTIFICATION_SERVER2.defaultAccount (backup)
■ AS/EVENTSPRING/NOTIFICATION_SERVER1 (primary)
■ AS/EVENTSPRING/NOTIFICATION_SERVER2 (backup)
1 From the PATROL console, access the remote agent menu commands, as described
in “Accessing KM Commands and InfoBoxes,”.
2 Choose the KM menu command Event Management => Quick Config => Remote
Agent.
The Notification Server Settings dialog box opens as shown in Figure 4 on page 74.
Chapter 3 73
Configuring Notification
Use the Primary Notification Server Settings dialog box to specify the properties of
the primary notification server for the managed system. The properties are
described in Table 20:
Use the Backup Notification Server Settings dialog box to specify the properties of
the backup notification server for the managed system. The properties are
described in Table 20 on page 75.
You use the PATROL Configuration Manager to quickly configure all remote agents
at one time. See the PATROL Configuration Manager User Guide for more information
on the PATROL Configuration Manager.
Chapter 3 75
Configuring Notification
Topic Page
Specifying Where to Initiate Notifications 76
Preventing False Alerts 77
Changing the Number of Times Alerts are Resent 78
Defining Agent-to-Notification Server Protocol Settings 79
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Notification
System.
3 Select the PATROL object (application, class, and parameter) that you want to
configure. To configure all PATROL objects, select the menu command Set For
Classes and then select / as shown in Figure 6 on page 77.
4 From the SET EVENT MANAGEMENT VARIABLE: alertSystem dialog box, select
the appropriate alert option, described in Table 40 on page 163.
If an agent or an agent machine goes down, there may be outstanding events open at
the enterprise console. These events can be considered false alerts because after the
agent or the agent machine restarts, these events are no longer relevant. You can
configure PATROL to determine which events are no longer relevant and close those
events upon an agent restart. The settings for this option are stored in the rule
alertResetOnInit.
Chapter 3 77
Configuring Notification
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Send Reset on Init.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Alert Resend.
3 Select the PATROL object (application, instance, or parameter) that you want to
configure.
4 In the ALARM Resends and WARN Resends fields, enter the number of times alarm
alerts and warning alerts are resent.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management =>Alert Settings => Remote
Alert Settings => Remote Comm Settings.
3 From the REMOTE AGENT COMMUNICATION SETTINGS dialog box, select the
appropriate protocol settings, described in Table 21.
Chapter 3 79
Configuring Notification
1 From the PATROL console, access the host you are rewording the message for as
described in “Accessing KM Commands and InfoBoxes” on page 212. The host
may be the notification server or a remote agent.
2 Choose the KM menu command Event Management => Alert Settings => Alert
Messages => Default Message Format.
The Set Event Management Alert Variables/Rules dialog box opens as shown in
Figure 7:
3 Enter your reworded message subject line and message body and then click Accept.
You can use a mix of variables and text to create a reworded message. For a
description of the available message replacement variables, click MESSAGE
REWORDING OPTIONS. For a complete description of the message replacement
variables that are provided, see “NOTIFY_EVENT Fields” on page 157
If a Problem Occurs
■ If you don’t specify message body text, the message text that you enter for the
message subject is also used for the message body.
■ Back slashes may be replaced with a front slash or a space on some platforms.
Chapter 3 81
Configuring Notification
1 From the PATROL console, access the host KM menu commands, as described in
“Accessing KM Commands and InfoBoxes” on page 212.
6 Enter the e-mail address of the target for this alert and click Accept.
Chapter 3 83
Configuring Notification
You can set other notification targets using the same procedure, but you choose a
different menu command in Step 2. For example, you may choose Paging instead of
Email.
If a Problem Occurs
If you specify multiple targets but only the first target receives the e-mail message,
see “Cannot Send E-mail Notifications to Multiple Targets” on page 198.
2 From the What If dialog box, click Browse and then select the parameter that you
want to test.
3 In the Status field, select the event that you want to test (INFORMATION, WARN,
or ALARM).
4 If necessary, specify the day of the week and the time. This may be necessary if you
have configured blackout periods when notification is disabled.
The What If Results dialog box is displayed as shown in Figure 12. It shows the rules
that would be triggered and their associated values.
Disabling Notification
You can disable, turn off, or limit notification using the instructions provided below.
To disable notification for a finite period only and then enable it, use the blackout
feature. For more information, see “Configuring Blackout Periods” on page 115.
Chapter 3 85
Configuring Notification
If you use the PATROL KM for Event Management to make these changes, you can
make the change on one agent and then deploy the changes to all of your agents using
the PATROL Configuration Manager. For more information about deploying settings
using the PATROL Configuration Manager, see the PATROL Configuration Manager
User Guide.
Overriding Rules
You can also limit notification by overriding a rule. For example, if you don’t want a
remote agents to generate notify events, you can disable the arsAction rule on that
remote agent.
To Override Rules
2 Choose the KM menu command Event Management => Alert Settings => Overrides.
3 From the Rule Override dialog box, select the PATROL KM for Event Management
rule that you want to override.
The rules listed are the rules that are currently configured on the agent. For more
information about the PATROL KM for Event Management rules, see Chapter 5,
“Rules and Configuration Variables”.
4 Click Accept.
You should define the availability monitor machines and the managed systems that
you want to monitor for availability. For more information, see “Defining Availability
Monitors and Targets” on page 60.
1 From the PATROL console, access the KM menu commands of the managed
system that you want to use as an availability monitor.
2 Choose the KM menu command Event Management => Availability => Add Target.
The Availability Monitor Add Target dialog box opens as shown in Figure 13 on
page 88:
Chapter 3 87
Configuring Availability Monitoring
Use the Availability Monitor - Add Target dialog box to specify the properties of
the agent that you want to monitor for availability. Table 23 describes the
availability target properties.
4 Repeat this task for each managed system you want to monitor for availability. For
example, if you are using the availability monitor to monitor multiple notification
servers, repeat this task for all notification servers.
You use the PATROL Configuration Manager to copy the availability monitoring
settings to the other managed systems. For more information on the PATROL
Configuration Manager, see the PATROL Configuration Manager User Guide.
Be sure that the machine you are using as the backup availability monitor has the
same availability targets as the primary availability monitor. The easiest way to
accomplish this is to use the PATROL Configuration Manager to copy the primary
availability monitor settings to the backup availability monitor. For more
information, see the PATROL Configuration Manager documentation. Alternatively,
you can manually add the same targets to the backup availability monitor.
Chapter 3 89
Configuring Availability Monitoring
■ each pair of machines that you want to configure as primary and backup
availability monitors has the same availability targets.
To configure failover, you must access the machine that you want to use as the backup
availability monitor, run the Identify Primary menu command, and then select the
primary availability monitor. For more details, see the following procedure.
To Configure Failover
2 Choose the KM menu command Event Management => Availability => Failover
Settings => Identify Primary.
The Choose Primary Monitor dialog box opens as shown in Figure 14.
■ the managed system you selected in Step 3 is set as the primary availability
monitor
■ the managed system that you executed the Identify Primary command from in Step
2 is set as the backup availability monitor
1 Select (highlight) the rules shown in Figure 15 and move them to the availability
monitor agent in the left pane. For example, the agent bhunter-HOU-0 in Figure 15.
2 Apply the rules to the agent by clicking the apply configuration icon .
Chapter 3 91
Configuring Availability Monitoring
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
specify the account information for one availability checker, you can use the PATROL
Configuration Manager to copy your configuration to other availability checkers.
The availability monitoring account that you specify must be valid on all of the agents
that the availability monitor is configured to monitor. If you must use different
accounts for different agents, you must configure multiple availability monitors.
1 From the primary availability monitor host, access the KM menu commands as
described in “Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Availability => Checker
Account.
3 From the CONFIGURE CHECKER ACCOUNT dialog box, enter the account used
by the availability monitor. The account you enter is used for all availability
targets.
4 To test whether the account is valid, enter the hostname and PATROL Agent port
of one of the availability targets.
5 Click Accept.
If a Problem Occurs
If you receive invalid login events at the PATROL Agent machine, see
“AgentLoginDenied Parameter is in Alarm” on page 203.
2 Choose the KM menu command Event Management => Availability => Ping
Command.
3 From the Set Ping Command dialog box, enter the absolute path to the ping
command executable on the availability monitor machine.
The ping command is stored in the configuration variable pingCmd. To apply your
changes to the PATROL Agent, you must restart the PATROL Agent.
You can append the ping command with arguments by specifying the arguments in
the configuration variable pingArgs. To assign a value to this variable, you must use
the PATROL Configuration Manager.
Example
To use the following ping command, use the configuration variables described below:
Chapter 3 93
Integrating with AlarmPoint
Example
ping abc.bmc.com -n 2 -l 32
When defining ping commands on OpenVMS, use the host macro to represent host
names.
Example
To use the following ping command, set the configuration variables described below:
ping -c 2 -s 99 host
Configuration
Variable Value Comments
pingCmd ping None
pingArgs -c 3 -s 99 host This command syntax is defined below:
BMC Software recommends AlarmPoint, but you could also choose to use any other
enterprise paging software that can be called from a command line.
AlarmPoint Benefits
AlarmPoint selects the notification option based on the personal preferences of the
recipients. For example, a user can configure AlarmPoint to send an e-mail message
during normal working hours but send a voice notification during nights and
weekends. By allowing AlarmPoint users to maintain their own contact and schedule
information, AlarmPoint administrators are freed from maintaining this information.
Notification Process
To use AlarmPoint for notification, you configure the notification server to execute a
script that calls the AlarmPoint java client. The java client then sends the notification
request to the AlarmPoint server. For an overview of the notification process when
using the PATROL KM for Event Management and AlarmPoint, see “Sending Pages
using AlarmPoint: Process Flow” on page 21.
Configuration Overview
To integrate the PATROL KM for Event Management with AlarmPoint, you must
complete the following steps:
Chapter 3 95
Integrating with AlarmPoint
1 On the notification server that has the java client installed, open the APAgent.xml
file in a text editor.
2 Enter the IP address or host name of the primary AlarmPoint server in the address
variable as show below in bold.
You may need to configure other elements of the AlarmPoint java client service. For
example, if you are using java client version 1.5, you may need to change the java
client default restart properties. For more information, see the AlarmPoint User Guide
and Manual available on the BMC Software support web site.
From the notification server on which you installed the AlarmPoint java client, open a
browser and enter the following URL. If the default port number was changed,
replace 2010 with the port number you used.
http://localhost:2010/agent/status.html
The browser indicates the status of the connection to the AlarmPoint server. A
successful connection appears as shown in Figure 16 on page 97.
Chapter 3 97
Integrating with AlarmPoint
If a Problem Occurs
If the AlarmPoint java client is unable to connect with the AlarmPoint server, verify
that you entered the correct IP address or host name of the AlarmPoint server. Next,
verify that you can ping the AlarmPoint server from the notification server.
If you are using AlarmPoint 5.2.02 or later, you don’t need to download these action
scripts.
You can download the action scripts required for AlarmPoint 5.2.01 from the
following locations:
Unix
ftp://ftp.bmc.com/pub/patrol/patches/PKM_Event_Management/2.5.00/UNIX/p
kmforem_alarmpointv521.tar
Windows
ftp://ftp.bmc.com/pub/patrol/patches/PKM_Event_Management/2.5.00/NT/pk
mforem_alarmpointv521.exe
Configuring Notification
The following section describes how to configure the notification server to issue
notifications that are sent through the AlarmPoint server.
NOTE
You should backup and rename these scripts prior to configuring the notification
server to use them. For more information about managing notification scripts, see
“Using Notification Scripts” on page 64.
■ /AS/EVENTSPRING/ALERT/CUSTOM/object/customTargetsLocalALARM —
use this rule to specify the ID of the AlarmPoint user or user group. This rule is a
local target rule, rather than a remote target rule, because the rule is located on the
notification server and the notification server is performing the notification. Thus,
notification is performed locally.
Chapter 3 99
Integrating with AlarmPoint
In these rules, object refers to a PATROL object, which can be an application class, an
application instance, or a parameter. For example, a PATROL object could be the
NT_CPU\CPU_0\CPUprcrProcessorTimePercent parameter.
You can set these rules using the PATROL KM for Event Management or the
PATROL Configuration Manager. The following topics describe how to set the rules
using the PATROL KM for Event Management. For more information on using the
PATROL Configuration Manager, see the PATROL Configuration Manager User Guide.
Before you set the notification rules, you must define notification servers and assign
notification servers to the remote agents. For more information, see “Configuring
Notification Servers” on page 71 and “Configuring Remote Agents” on page 73.
1 From the PATROL console, access the managed system you are using as the
notification server and display the KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Alert
Actions => Set For Parameters.
3 From the next series of dialog boxes, choose the application class, instance, and
parameter. For example, NT_CPU\CPU_0\CPUprcrProcessorTimePercent. After
you choose the desired parameter, the dialog box shown in Figure 17 on page 101
is displayed.
4 From the SET EVENT MANAGEMENT VARIABLE: arsAction dialog box, verify
that the following options are selected:
■ Make persistent (update config db) — this option ensures that any changes you
make on this dialog box persist after an agent restart.
/AS/EVENTSPRING/NT_CPU/CPU_0/CPUprcrProcessorTimePercent/arsAction
1 From the PATROL console, access the managed system you are using as the
notification server and display the KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Actions => Notification Command => Set For Parameters.
3 From the next series of dialog boxes, choose the same parameter selected in the
previous task: NT_CPU\CPU_0\CPUprcrProcessorTimePercent.
Chapter 3 101
Integrating with AlarmPoint
/AS/EVENTSPRING/ALERT/NT_CPU/CPU_0/CPUprcrProcessorTimePercent/a
lertLocalCommand
1 From the PATROL console, access the managed system you are using as the
notification server and display the KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Notification
Targets => Custom => Local TargetsALARM=> Set For Parameters.
3 From the next series of dialog boxes, choose the same parameter selected in the
previous task: NT_CPU\CPU_0\CPUprcrProcessorTimePercent.
/AS/EVENTSPRING/ALERT/NT_CPU/CPU_0/CPUprcrProcessorTimePercent/c
ustomTargetsLocalALARM
Testing Notification
To verify that the notification rules are working correctly, you can set the PATROL
object into an alarm state and verify that the notification is sent.
You can set the value of a PATROL object using the setParameterValue rule.
"/AS/EVENTSPRING/setParameterValue" = { REPLACE =
"/NT_CPU/CPU_0/CPUprcrProcessorTimePercent=ALARM" }
2 Use the PATROL Configuration Manager to apply this rule to the agents that you
want to test.
When you apply this rule to an agent, the rule assigns the parameter a value that is
within the specified alarm range. This action causes an alarm condition and generates
an alert.
You can also use a PSL command to set a parameter value and generate an alert.
When the default parameter thresholds are being used, the following command
causes the CPUprcrProcessorTimePercent parameter to generate an alert:
%PSL set("/NT_CPU/CPU_0/CPUprcrProcessorTimePercent/value",99);
If a Problem Occurs
If the notification is not sent when the parameter enters an alarm state, see Chapter 7,
“Troubleshooting PATROL KM for Event Management”.
Chapter 3 103
Managing Parameter Thresholds and Poll Times
When you set parameter thresholds using the PATROL KM for Event Management,
the thresholds are stored in agent configuration variables, not in the KM files. This
feature makes upgrades easier since your thresholds are stored externally to the KM
files. It also allows you to define the settings on one agent and use the PATROL
Configuration Manager to deploy the settings throughout your environment.
NOTE
When you make thresholds changes using the PATROL KM for Event Management,
these changes are not reflected in the console display because the changes are made at
the agent, not in the console KM files.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter. After you choose the desired parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 Use the Configure Thresholds dialog box, described in Table 24, to specify the
properties of the selected objects threshold settings and then click Accept.
Enable the border range if it is possible for the parameter to return a value outside
of the other alarm range limits. You can use this for information only or as a
third-level alert condition representing either a warning or an alarm state.
Chapter 3 105
Managing Parameter Thresholds and Poll Times
■ Click Warning or Alarm to have the parameter undergo a state change when the
range is breached.
Min minimum value of acceptable range
Max maximum value of acceptable range
Trigger Alarm determines when an alarm is triggered and can be one of the following values:
■ After an alarm has occurred “n” times — Use this value to discount random
spikes in the return values. You must also specify how many consecutive times
the alarm range can be breached before the parameter alarms.
■ Immediately on alarm — Use this value if the value returned is of concern.
■ After all recovery actions fail — Use this value if you want to be alerted after all
recovery actions fail and the returned value remains within the warning or
alarm range.
N If you selected After an alarm has occurred “n” times for the trigger alarm, specify
how many consecutive times you want the alarm value returned during parameter
execution before the parameter actually alarms.
Apply to makes the selected parameter thresholds apply to the current session
current session
Make makes the selected parameter thresholds persist after the console is disconnected
persistent
If a Problem Occurs
If a problems occurs, see “Parameters Setting Lost After Agent Restart” on page 206.
■ Before you set collector poll times, determine which application class the standard
or collector parameters reside in.
■ The collector must be active. If the collector is not active, it is not shown in the list
of selectable collectors.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
3 Choose the application class and instance for the standard or collector parameter.
4 From the SET EVENT MANAGEMENT VARIABLE: interval dialog box, enter the
new poll time and then click Accept.
PATROL KM for Event Management uses the following set of characters to identify a
wildcard: {re:*}.
Chapter 3 107
Managing Parameter Thresholds and Poll Times
■ You can use a wilcard only to represent PATROL instance names. You cannot use
wildcards to represent host names, parameter names, or any other PATROL object.
■ You can use wildcards only in threshold and poll time rules. You cannot use
wildcards in notification rules.
■ You cannot use wildcards to specify the beginning or ending of an instance name.
For example, CPU_{re:*} matches both HoustonCPU_03 and CPU_03.
■ Rules that use explicit instance names take precedence over rules that contain
wildcard matches.
■ Rules that contain wildcard matches take precedence over rules that use the
__ANYINST__ variable to represent any instance name.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter.
After you choose the desired application, instance, and parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 From the Configure Thresholds dialog box, deselect the Active checkbox.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
Chapter 3 109
Managing Parameter Thresholds and Poll Times
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter. To deactivate all instances of a parameter, select <all
instances> from the instances dialog box. When you select <all instances>, the
__ANYINST__ variable is used to represent any instance of the parameter.
After you choose the desired application, instance, and parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 From the Configure Thresholds dialog box, deselect the Active checkbox.
AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/application
class/__ANYINST__/parameter
where application class and parameter represent the application class and parameter
that you chose to deactivate.
To apply this rule to other servers in your enterprise, use the PATROL Configuration
Manager. For more information, see the PATROL Configuration Manager User Guide.
If a Problem Occurs
If a problems occurs, see “Parameters Setting Lost After Agent Restart” on page 206.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
3 From the next series of dialog boxes, choose the application class, application
instance, and parameter.
After you choose the desired application, instance, and parameter, the Configure
Thresholds dialog box is displayed as shown in Figure 19 on page 105.
4 From the Configure Thresholds dialog box, select the Active checkbox.
1 From the PATROL Configuration Manager or the Wpconfig utility, set the agent
configuration variable AS/EVENTSPRING/processWildcards to a value of 1.
2 Create the following rule, using a wildcard symbol, {re:*}, to represent the instance
name.
AS/EVENTSPRING/PARAM_SETTING/THRESHOLDS/application
class/{re:*}/parameter name
3 Assign the rule the desired value. For more information on the syntax of the
THRESHOLDS rule, see “THRESHOLDS” on page 186.
To apply this rule to other servers in your enterprise, use the PATROL Configuration
Manager. For more information, see the PATROL Configuration Manager User Guide.
If a Problem Occurs
If a problems occurs, see “Parameters Setting Lost After Agent Restart” on page 206.
/AS/EVENTSPRING/PARAM_SETTINGS/STATUSFLAG/paramSettingsStatusFlag
Chapter 3 111
Specifying What to Monitor or Exclude from Monitoring
In this task, you change the threshold for all instances of a PATROL parameter.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Parameter Settings => Status
Flags.
5 To apply your changes to the PATROL Agent, restart the PATROL Agent.
This method is not intuitive but it may be faster than adding all of the instances that
you don’t want to monitor to an exclude filter.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Edit
Filter List.
4 From the EDIT INSTANCE FILTER LIST dialog box, select Remove and click OK.
5 From the Instance Filter List dialog box, select the application instances that you
want to monitor and then click OK.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Change
Filter Type.
3 Choose the application class you previously configured in “To Add Instances You
Want to Monitor to an Exclude List (Temporarily)” on page 113.
4 From the CHANGE FILTER TYPE dialog box, for the option Change Filter Type to
include, select Yes and then click OK.
Chapter 3 113
Specifying What to Monitor or Exclude from Monitoring
NOTE
PATROL monitors only the instances in the include filter. It does not monitor
instances that are discovered after you create the filter. To monitor a new instance,
you must add it to the include filter.
To verify that the filter is working as you expect, you can generate a report that shows
which instances are being monitored.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Filtered
Instance Report.
PATROL displays a report in the console system output window that shows the
following information:
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Edit
Filter List.
3 Choose the application class whose instances you want to exclude from
monitoring.
4 From the EDIT INSTANCE FILTER LIST dialog box, select Remove and click OK.
5 From the Instance Filter List dialog box, select the application instances that you
want to exclude from monitoring and then click OK.
PATROL adds the selected instance to the exclude filter. It is no longer monitored.
To verify that the exclude filter is working as you expect, you can generate a report
that shows which instances are being monitored.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Instance Filtering => Filtered
Instance Report.
PATROL displays a report in the console system output window that shows the
following information:
TIP
To monitor only a few instances and exclude most instances from monitoring, you
can add those instances that you want to monitor to an exclude list and then change
the exclude list to an include list. This method may be faster than adding all of the
instances that you don’t want to monitor to an exclude list. For more information, see
“Selecting Application Instances to Monitor” on page 112.
Chapter 3 115
Configuring Blackout Periods
When you set blackout periods for PATROL objects using the PATROL KM for Event
Management, the data for the PATROL object is still collected and the history is
maintained. However, if the PATROL object enters an alarm state and generates an
alert, notification does not occur.
Blackout periods can be applied to most PATROL objects. Blackout periods can be
defined locally at the system where the alert occurs and at the notification server.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Blackout
Periods => Set For Classes.
The Choose the Target Classes dialog box opens as shown in Figure 20 on
page 117.
The Set Event Management Blackout Variables/Rules dialog box opens as shown
in Figure 21.
Chapter 3 117
Configuring Blackout Periods
Use the Set Event Management Blackout Variables/Rules dialog box to specify the
blackout properties for the selected application class. The blackout properties are
described in Table 26.
Example
To set a blackout from Friday at 19:00 pm until Sunday at 9:00 requires you to create
three blackout periods and merge them as you create each one:
You can set blackout periods for other PATROL objects by selecting the Set for
Instances or Set for Parameter menu command in Step 2.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Availability => Blackout
Periods.
The Set Event Management Blackout Variables/Rules dialog box opens as shown
in Figure 22.
The Set Event Management Blackout Variables/Rules dialog box opens as shown
in Figure 23 on page 120.
Chapter 3 119
Configuring Recovery Actions
Use the Set Event Management Blackout Variables/Rules dialog box to specify the
blackout properties for the selected application class. The blackout properties are
described in Table 26 on page 118.
NOTE
The availability blackout options do not include the option to merge the blackout
periods.
If you don’t want the parameter to alarm until recovery actions have been attempted,
you must use PATROL native recovery actions, rather than PATROL KM for Event
Management recovery actions. However, you can use both types. For example, you
could define PATROL native recovery actions and specify that the parameter enters a
WARN or ALARM state only after all recovery actions fail. Then you could create a
PATROL KM for Event Management recovery action that runs only if the PATROL
native recovery actions fail.
To use the PATROL KM for Event Management interface to set the value of
ArsAction (and enable recovery actions), use the following procedure.
Chapter 3 121
Configuring Recovery Actions
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Alert
Actions.
3 Select the PATROL object (application, instance, or parameter) that you want to
configure.
4 To allow recovery actions to be associated with this PATROL object, select Allow
Recovery Actions.
6 If you want your changes to apply only until the agent is restarted, select Apply to
current session. To apply your changes to future sessions, select Make persistent.
Recovery actions are enabled for WARNING and ALARM events. To enable recovery
actions for INFORMATION events, you must set the configuration variable
allowInfoRecoveryActions to 1.
Before specifying a recovery action script, you should have completed the following
steps:
■ Configured the PATROL KM for Event Management to allow recovery actions. For
more information, see “Enabling PATROL KM for Event Management Recovery
Actions” on page 121.
■ Created and tested a recovery action script. For more information, see “Using PSL
Recovery Actions” on page 124.
■ On the PATROL Console, open the agent system output window so that you can
view any status messages generated during this procedure.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Recovery Action Commands.
3 Choose the application class, instance, or parameter that you want to associate
with the recovery action.
PATROL displays a message in the console system output window indicating if the
script was found.
The command type is stored in the rule arsCmdType. For more information about the
arsCmdType rule, see “arsCmdType” on page 168.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Recovery Action Command Type.
Chapter 3 123
Configuring Recovery Actions
3 Choose the application class, instance, or parameter that you want to associate
with the recovery action. To select all PATROL objects, select Set For Classes and
then choose the forward slash /.
PATROL has two built-in command types: PSL and OS. If you use a command
type other than PSL or OS, the command type must be defined for the application
class. For more information on defining command types, see the PATROL console
documentation.
In addition to specifying the command type, you need to specify the full path and file
name of the recovery action script. For more information, see “Specifying a Recovery
Action Script” on page 122.
To obtain other information, such as hostname or IP address, you need to use a get()
command. For example, to get the hostname, use the following command:
hostn = get("/hostname");
For more information about using PSL, see the PATROL PSL documentation.
Chapter 3 125
Configuring Recovery Actions
4
4 Usage Scenarios
The following section contains typical scenarios for using the PATROL KM for Event
Management and the PATROL Configuration Manager. Detailed instructions are
included. The following scenarios are described.
Chapter 4 127
Sending E-mail Notification When Disk Space is Low
In the following scenario, PATROL is running on two Solaris computers and three
Windows Servers computers, as shown in Figure 24. You will configure the Solaris
computers, NS1 and NS2, to send e-mail notification when the disk space is low on
the Windows Servers computers.
To achieve this goal, you will configure the Solaris computers as notification servers
and the Windows Servers computers as remote agents.
Primary Backup
Notification Server Notification Server
NS1 NS2
Assumptions
For this scenario, assume the following:
■ The PATROL KM for Event Management and the PATROL KM for Windows OS
are installed on all of the remote agent and notification server computers.
■ There is a dedicated PATROL agent for each notification server. This is the BMC
Software recommended configuration.
■ All PATROL Agents used for monitoring are running on port 3181.
■ Except where otherwise noted, you will use the PATROL KM for Event
Management to create and configure the notification rules. For some tasks, you
could also choose to use the PATROL Configuration Manager to create and
configure rules. For more information, see Table 28 on page 129.
Configuration Overview
To configure e-mail notification for low disk space, you complete the following tasks.
The table below shows the location in which step is completed. An alternative
location is also noted. For example, many of the configuration tasks can be completed
within either the PATROL KM for Event Management or the PATROL Configuration
Manager.
Table 28 Sending E-mail Notification for Low Disk Space: Configuration Overview
Alternative PATROL
Step Task PATROL Product Product
1 Selecting a Mail Client NA NA
2 Loading the PATROL KM for PATROL console None
Event Management
3 Defining the Notification Servers PATROL console - (PATROL KM None
for Event Management)
4 Configuring the Remote Agent PATROL console - (PATROL KM None
NT1 for Event Management)
5 Copying notification server PATROL Configuration None
settings to NT2 and NT3 Manager
6 Specifying an E-mail Target for PATROL console - (PATROL KM PATROL
Low Disk Space for Event Management) Configuration Manager
7 Copying e-mail targets from NS1 PATROL Configuration None
to NS2 Manager
8 Rewording the Notification PATROL console - (PATROL KM PATROL
Messagee for Event Management) Configuration Manager
9 Copying reworded notification PATROL Configuration None
message rule from NS1 to NS2 Manager
10 Testing Notification PATROL console or PATROL None
Configuration Manager
Chapter 4 129
Sending E-mail Notification When Disk Space is Low
Since the notification severs are Unix computers, the recommended approach is to
use the default notification script, which sends mail using the built-in Unix mail
client, mailx. If the notification servers were Windows computers, you would need to
edit the notification script to enable the appropriate mail client. For Unix servers, no
editing is required. For more information, see “Using Notification Scripts” on
page 64.
You must use the PATROL KM for Event Management to complete this task.
1 From the PATROL console on NT1, right-click NS1 and access the KM menu
commands as described in “Accessing KM Commands and InfoBoxes” on
page 212.
3 Enter the default e-mail account that receives notifications for all events that go
into an alarm or warning state. For this example, use admin@abc.com as the default
e-mail account. Later, you will define the e-mail target for our specific event: low
disk space.
The default e-mail account acts as a catch-all for events that don’t have a specific
e-mail target associated with them. Typically, when e-mail notifications are sent to
the default e-mail account, you determine whether the event is valid and requires
notification. If it is valid, you would associate the appropriate e-mail target to that
event. For example, if the event was related to Microsoft Exchange, you would
assign the e-mail target to the Microsoft Exchange administrator. If the event is not
valid or is not important, you would adjust the alarm thresholds or possibly
deactivate the parameter that spawned the event.
4 Enter the file name of the script that is run for event notification.
To prevent the notification script from being overwritten during upgrades or new
installations, make sure you have copied the notification script from the directory
in which it is installed to another directory outside of the BMC Software directory
structure. For more information, see “Using Notification Scripts” on page 64.
5 Click Accept.
In this example, NS1 is the primary notification server for all of the monitored agents.
However, you could configure NS1 as the primary notification sever for some of the
remote agents and as the backup notification server for the other remote agents.
Chapter 4 131
Sending E-mail Notification When Disk Space is Low
4 In the Notification Server Hostname field, type NS1, the host name of the primary
notification server.
5 In the Notification Server User Name field, type the user ID you want to use for
logging into the notification server. The default is the account you are currently
logged in on.
NOTE
For better security, you should create a unique operating system account that is
used only for remote notification on the notification servers. You can configure the
notification login account to make it unable to fully login to the notification Server.
For example, on Unix you can use an invalid login shell, such as /bin/false for the
notification account.
7 Enter the notification server account password and then click Accept.
2 In the Notification Server Hostname field, enter NS2, the host name of the backup
notification server.
3 Enter the NS2 port number and account and password information and click
Accept.
4 To perform a notification test for NS1, select Yes under Perform Alert Test?
5 Click Accept.
6 Verify that the e-mail was received by the default e-mail account.
Chapter 4 133
Sending E-mail Notification When Disk Space is Low
When using the PATROL Configuration Manager to copy rules, you first get the
configuration (rulesets) for the agent you configured (NT1). Next, you get the rulesets
for the agent you want to update (NT2 or NT3). Then you compare the rulesets and
save the differences. Finally, you copy the differences to the machines that you want
to update. In this case, you would copy the differences to NT2 and NT3.
1 To get the NT1 rulesets, from the PATROL Configuration Manager Agent folder,
right-click the NT1 agent and choose the menu command Configuration => Get.
2 When the Job Status window status changes to OK, click Accept.
3 To get the NT2 rulesets, right-click the NT2 agent and choose the menu command
Configuration => Get.
5 Right-click the highlighted rulesets and choose the menu command Compare.
6 To display the rulesets that are unique to NT1, select the option First Unique. (If
NT1 was the second ruleset selected, then select the option Second Unique.)
8 From the Save Selected Rules window, enter a ruleset name. For example,
RemoteAgentsNS.
Under the RuleSets folder, a ruleset named RemoteAgentsNS is created. When you
expand the ruleset, it shows the notification server rules.
9 Select (highlight) the RemoteAgentsNS ruleset and drag it to the NT2 and NT3
agents under the Agents folder.
10 To apply the rulesets to NT2 and NT3, click the Apply Configuration icon .
NOTE
The advantage of creating the target rule on the remote agent is reduced
processing at the notification server. However, you could choose to create the rule
on the notification server, which has the benefit of centralizing rules. For more
information, see “Deciding Where to Place Rules” on page 61.
2 Choose the KM menu command Event Management => Alert Settings => Notification
Targets => Email => Remote Targets ALARM => Set For Parameters.
NOTE
Since you decided to create the e-mail target rule on the remote agent, you select
the sub-menu command Remote Targets ALARM, because the notification is
occurring on a computer that is remote from the agent. However, if you were to
create the target rules on the notification server, you would use the menu
command Local Targets ALARM, since the targets are located on the same computer
performing the notification.
3 From the Choose the target CLASS(es) dialog box, select NT_LOGICAL_DISKS and
click Accept.
Chapter 4 135
Sending E-mail Notification When Disk Space is Low
/NT_LOGICAL_DISKS/__ANYINST__/LDldFreeSpacePercent/emailTargetsRe
moteALARM
7 Perform Steps 1-6 for the other remote agents (NT2 and NT3) or use the PATROL
Configuration Manager to copy the configuration rules from NT1 to NT2 and NT3.
You can set up a generic message format for all alerts on the notification server or you
can create unique messages for specific applications, instances, or parameters. For
this scenario, you will create a generic message for all alerts. You will create the rule
for this message format on the notification servers NS1 and NS2.
2 Choose the KM menu command Event Management => Alert Setting => Alert
Messages => Default Message Format.
3 Enter the message subject line and body using the message replacement variables.
For a complete list and description of the message replacement variables provided
by PATROL KM for Event Management, see “NOTIFY_EVENT Fields” on
page 157.
EXAMPLE
%PARAMETER_STATUS%on%HOSTNAME%forparameter%PARAMETER_NAME%=%PARAMETER_VALUE%
PATROL KM for Event Management substitutes real values at run time. The
following example shows how an actual notification message would be displayed
using the message format shown above:
4 Perform Steps 1-3 for the backup notification server, NS2, or use the PATROL
Configuration Manager to copy the configuration rules from NS1 to NS2.
Chapter 4 137
Sending E-mail Notification When Disk Space is Low
Testing Notification
Next, perform the following tests to verify that notification is working correctly.
"/AS/EVENTSPRING/setParameterValue" = { REPLACE =
"/NT_LOGICAL_DISKS/__ANYINST__/LDldFreeSpacePercent=ALARM" }
2 Use the PATROL Configuration Manager to apply this rule to the remote agents
NT1, NT2, and NT3.
When you apply this rule to an agent, this rule assigns the parameter a value that is
within the specified range. The parameter enters the desired state, ALARM, and
generates an alert.
set("/NT_LOGICAL_DISKS/C:/LDldFreeSpacePercent/value",1);
If a Problem Occurs
If the e-mail notification is not sent correctly, see “Configuration Problems” on
page 198 for troubleshooting help.
Chapter 4 139
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Assumptions
In this scenario you make the following assumptions:
■ The PATROL KM for Event Management has been installed and the KM has been
loaded in the console.
■ You have already defined the notification server and notification script as
discussed in “Defining Notification Servers” on page 58 and the script successfully
sends notifications.
■ The configuration instructions assume the use of the PATROL KM for Event
Management menu commands. Except where noted, you could also use the
PATROL Configuration Manager to perform the configuration tasks.
■ The notification server and the managed nodes are Unix servers. The same result
can be accomplished on a Windows server using a Perl script instead of a Unix
shell script. However, you would need to edit the Perl script to achieve proper
formatting of the notification message.
■ The PATROL KM for Windows OS is installed on the console and on the managed
nodes.
Configuration Overview
To create an e-mail notification for a specific parameter that includes annotated data,
you need to perform the following general tasks:
2 Select the application class CPU, instance CPU, and parameter CPUCpuUtil.
3 From the SET EVENT MANAGEMENT VARIABLE: arsAction dialog box, select
Allow Recovery Actions and Trigger NOTIFY_EVENT.
Chapter 4 141
Sending E-mail Notification for CPU Usage that Includes Parameter Annotations
Since recovery actions execute at the managed node, you create these rules on the
managed node.
2 Select the application class CPU, instance CPU, and parameter CPUCpuUtil.
2 Select the application class CPU, instance CPU, and parameter CPUCpuUtil.
__udefvar__=annotate_get(\”/\.__appl_class__.\”/\”.__instance__.\”/\”.__param__);
Testing Notification
You can verify the notification test by looking at the PATROL KM for Event
Management NotifiedEvents parameter.
Chapter 4 143
Configuring a Recovery Action that Runs Under a Specified Account
If the test is successful, an annotated data point is displayed for the notification
server.
The example described here is just one of many possible approaches and may not
necessarily be the appropriate approach in your environment. The purpose of this
example is to show one type of recovery action that you can implement.
Assumptions
■ The PATROL KM for Event Management and the PATROL KM for Oracle are
installed and configured on the agent computer.
■ This scenario will consider one agent and, thus, will not address deploying
configurations to multiple remote agents. For more information about deploying
configurations, see the scenario “Sending E-mail Notification When Disk Space is
Low” on page 128.
■ The account that you want to run this recovery action under has the proper
permissions to execute the recovery action on the agent computer.
■ To encrypt the account password, the PATROL DES encryption is used. However,
you could also choose to use another encryption method as long as the PSL
recovery action is able to decrypt the password. If you use PATROL DES
encryption, the password is decrypted internally.
Configuration Overview
To configure a recovery action that runs under a specified account, you would
complete the following tasks. The table below shows the location in which step is
completed. An alternative location is also noted. For example, many of the
configuration tasks can be completed within either the PATROL KM for Event
Management or the PATROL Configuration Manager.
Table 29 Sending E-mail Notification for Low Disk Space: Configuration Overview
Alternative PATROL
Step Task PATROL Product Product
1 Testing Recovery Action Script OS (outside of PATROL) NA
2 Enabling Recovery Actions for PATROL console - (PATROL KM PATROL Configuration
ArchFreeSpace on Agent for Event Management) Manager
Computer
3 Defining the Recovery Action PATROL console - (PATROL KM PATROL Configuration
Type for Agent Computer for Event Management) Manager
4 Storing the Encrypted Password PATROL Developer Console None
as a Pconfig Variable
5 Configuring the PSL Recovery PATROL console - (PATROL KM PATROL Configuration
Action for Event Management) Manager
6 Testing the Recovery Action PATROL console None
Chapter 4 145
Configuring a Recovery Action that Runs Under a Specified Account
3 From the SET EVENT MANAGEMENT VARIABLE: arsAction dialog box, select
Allow Recovery Actions and Trigger NOTIFY_EVENT.
/AS/EVENTSPRING/ORACLE_AVAILABILITY/Test/ArchFreeSpace/arsAction = 6
In this scenario, you need to associate the OS account information with the shell script
that runs the recovery action. To do this, you must use a PSL command. Therefore,
you need to specify arsCmdType as PSL.
/AS/EVENTSPRING/ORACLE_AVAILABILITY/Test/ArchFreeSpace/arsCmdTy
pe = PSL
2 From the PSL Command dialog box, type the following command and click Apply.
Note that whenever the password is changed, you must update the pconfig variable.
Chapter 4 147
Configuring a Recovery Action that Runs Under a Specified Account
NOTE
Before entering your own PSL recovery action code, you should test the code for
errors using the testing functionality in the PATROL console.
/AS/EVENTSPRING/ORACLE_AVAILABILITY/test/ArchFreeSpace/arsCommand
This rule specifies that the ArchFreeSpace parameter associated with the application instance TEST
of the ORACLE_AVAILABILITY application class is enabled for recovery actions. For more
information on the arsAction rule, see “arsAction” on page 161.
/AS/EVENTSPRING/ORACLE_AVAILABILITY/Test/ArchFreeSpace/arsCmdType = PSL
This rule specifies that the ArchFreeSpace parameter associated with the application instance TEST
of the ORACLE_AVAILABILITY application class uses PSL recovery actions. For more information
on the arsCmdType rule, see “arsCmdType” on page 168.
AS/EVENTSPRING/ORACLE_AVAILABILITY/test/ArchFreeSpace/arsCommand =
This rule specifies the PSL recovery action. For more information on the arsCommand rule, see
“arsCommand” on page 168.
NOTE
To apply these rules to all instances of the ArchFreeSpace parameter on the agent,
replace Test with __ANYINST__.
Chapter 4 149
Configuring a Recovery Action that Runs Under a Specified Account
set("/ORACLE_AVAILABILITY/test/ArchFreeSpace/value",1);
This PSL command sets the value of ArchFreeSpace parameter of the test instance
to 1. This action causes ArchFreeSpace to enter an ALARM state and issue an alert.
If a Problem Occurs
If the PSL editor indicates a syntax problem, see the PATROL Script Language
Reference Summary.
5
5 Rules and Configuration Variables
This reference provides a comprehensive listing of PATROL KM for Event
Management settings and rules.
Chapter 5 151
Remote Alert Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
NOTIFICATION_SERVER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
RemoteAgentCommSettings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Notification Target Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
emailTargets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
pagerTargets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
customTargets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
ttTargets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Blackout Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
blackoutPeriod . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
__OVERRIDE__ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Notification Server Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
nsRemoteTargetSetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Custom Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
msgText . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
msgBody . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
CustomId1 and CustomId2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
allowOperator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
appClassSettingsStatusFlag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
disableNotifyAnnotations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
maxEventsToReport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
snmpSettings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
snmpOid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Updated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Primary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Blackout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
pingCmd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
pingOkString . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
pingPacketSize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
pingAttempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
pingArgs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
checkerAccount.defaultAccount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Parameter Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
THRESHOLDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
paramSettingsStatusFlag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
processWildcards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Instance Filtering Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
FilterList Configuration Variable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
FilterType Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
PATROL Objects
Before you use PATROL KM for Event Management, you should have an
understanding of PATROL objects. Table 31 lists the hierarchy and description of
PATROL objects.
Chapter 5 153
PATROL Objects
Rule 1: E-mail User1 for any parameter in alarm on this host (‘/’) that does not have a more
specific rule assigned. User1 is the default e-mail account.
Rule 2: E-mail User2 for any parameter in any instance of the logical disks application class
(/NT_LOGICAL_DISKS) in alarm on this host.
Rule 3: E-mail User3 for any parameter in alarm on this host for the logical disks application
class instance C: (/NT_LOGICAL_DISKS/C:).
Rule 4: E-mail User4 when the parameter LDldFreeMegabytes is in alarm on this host for the
logical disks application class instance C:
(/NT_LOGICAL_DISKS/C:/LDldFreeMegabytes).
The following example shows how to send an e-mail when an alarm condition occurs
for a PATROL object:
/AS/EVENTSPRING/ALERT/EMAIL/NT_LOGICAL_DISKS/C:/emailTargetsLocalALARM
/AS/EVENTSPRING/ALERT/EMAIL/NT_SERVICES/__ANYINST__/ServiceStatus/emailTargetsLocal
causes an e-mail to be sent if an alarm occurs for the ServiceStatus parameter on any
monitored service on the Windows Server.
The PATROL object name can also include the hostname when the rule exists on the
notification server but only applies to a particular host. For example, for the
configuration variable
/AS/EVENTSPRING/ALERT/EMAIL/winprod/NT_LOGICAL_DISKS/C:/emailTargetsLocalALARM
the rule only applies for alarm conditions occurring on the Windows Server winprod.
Chapter 5 155
NOTIFY_EVENT
NOTIFY_EVENT
This section describes the event details provided by the NOTIFY_EVENT and
REMOTE_NOTIFY_EVENT.
Event Details
The event details are collected prior to triggering the initial NOTIFY_EVENT event.
NOTIFY_EVENT events and REMOTE_NOTIFY_EVENT events contain identical
event details.
The alert message is provided as the first NOTIFY_EVENT argument EV_ARG1. The
event details are provided as the second argument, EV_ARG2.
The fields within the event details are comma delimited and are described in
“NOTIFY_EVENT Fields” on page 157.
Order of Fields
The field positioning within the event details does not change. If additional fields are
added, the existing fields remain in the order indicated.
Empty Fields
Some fields, such as custom id or parent instance, may be empty. In addition, if the
NOTIFY_EVENT is triggered from an application class object, fields that relate to the
instance or the parameter appear as __NA__ or are empty.
If tabs and commas are needed, you must replace them with non-problematic
characters prior to their use in the PATROL KM for Event Management. For example,
you could replace tabs replaced with -TAB- and then after the event is processed,
insert the tabs back.
NOTIFY_EVENT Fields
This topic describes the NOTIFY_EVENT fields. It also shows the following:
■ the message replacement variables that you can use to reword notification
messages (rule: msgText and msgBody)
■ the environment variables that you can you use in your notifications script (rule:
alertLocalCommand)
Table 35 NOTIFY_EVENT Fields (Part 1 of 4)
Message
Field Replacement Variable Environment Variable Description
Hostname %HOSTNAME% AS_HOSTNAME Hostname of affected
system (e.g., glamis)
IP Address %IPADDRESS% AS_IPADDRESS IP Address for hostname
(e.g., 192.168.1.1)
TCP Port %TCP_PORT% AS_TCP_PORT Affected agent TCP
listening port (e.g., 3181)
UDP Port %UDP_PORT% AS_UDP_PORT Affected agent UDP
listening port (e.g., 3181)
Chapter 5 157
NOTIFY_EVENT
Chapter 5 159
NOTIFY_EVENT
The following variables are not available from event details; they are provided as
message placement and environment variables only at a notification server.
The following variables are available only as environment variables that can be used
by a notification script.
Alert Rules
Each PATROL object (computer, application class, instance, and parameter) can have
its own alert settings.
arsAction
You can use the arsAction rule to specify the actions to perform when an alert
condition occurs for a specific PATROL object.
NOTE
To allow recovery actions for INFORMATION events, you must also set the
allowInfoRecoveryActions variable to 1.
Chapter 5 161
Alert Rules
alertSystem
You can use the alertSystem rule to specify the location of the notification server that
performs the notification for the specified PATROL object. The notification server can
be local, remote, both, or none.
Using the LOCAL option, notification failures have no impact on other systems. Local
notification is potentially more reliable since it requires fewer intermediate
components (for example, the network connection, the remote notification server).
allowOverrides
You can use the allowOverrides rule to disable the use of rule overrides
(__OVERRIDE__).
Chapter 5 163
Alert Rules
loginDeniedIgnoredUsers
Use the LoginDeniedIgnoredUsers configuration variable to specify the users to
ignore when a user name is denied login to the agent because of ACL restrictions or
invalid login information. When you use this variable, the specified user account does
not generate invalid login errors even if it is unable to login to the agent.
NOTE
If you use this configuration variable, you must add the built-in users EventSpring
and EventSpring_Availability_Check to the list of usernames. By default, if you don’t
use the LoginDeniedIgnoredUsers configuration variable, then any login errors
caused by these built-in users are ignored. However, if you do use the
LoginDeniedIgnoredUsers configuration variable, login errors caused by these users
are not ignored unless you also add them to the comma-delimited list of usernames.
useEnvOnlyForCmds
Use the useEnvOnlyForCmds rule to indicate whether PATROL KM for Event
Management should run all operating system commands (for example, notification
and recovery) with command-line arguments.
allowInfoRecoveryActions
Use the allowInfoRecoveryActions rule to indicate whether the PATROL KM for
Event Management can perform recovery actions for INFORMATION events. For
example, an INFORMATION event is generated when a parameter goes from an
ALARM state to an OK state.
spoolDirectory
Use the spoolDirectory configuration variable to specify the directory where
PATROL KM for Event Management reports are stored (for example, parameter
reports and recovery action output).
Example /usr/local/patrol_reports
Support supported by PATROL KM for Event Management version 2.4.02 or
later
Chapter 5 165
Local Alert Settings
setParameterValue
You can use the setParameterValue rule to set the value of an active parameter.
■ DELAY = the time in seconds that the KM waits between each parameter set
(optional).
Example /CPU/CPU/CPUCpuUtil=ALARM,.../CPU/CPU/CPUCpuUtil=CLEAR,DELAY
=5
Support supported by PATROL KM for Event Management version 2.5.00 or later
alertResend
You can use the alertResend rule to specify the number of times the agent should
resend outstanding alerts. You can configure alarm and warning alerts to have
different resend values. Alerts are resent at the interval specified by the
ResendAlertQueue parameter polling time and contain current alert information,
such as, parameter value and status. A resend value of -1 causes PATROL KM for
Event Management to resend outstanding alerts for object until the alert condition
clears.
alertLocalCommand
You can use the alertLocalCommand rule to specify a script or program to perform
notification, such as paging or e-mail. PATROL KM for Event Management contains
sample notification scripts located in the PATROL PSL directory. The same
notification command is typically set at the root (/) object level so that it applies to all
PATROL objects (for example, application classes, instances, and parameters) with an
ALERT status.
Chapter 5 167
Local Alert Settings
arsCommand
You can use the arsCommand rule to specify a script or program that performs
recovery procedures pertaining to the PATROL object with an ALERT status.
PATROL KM for Event Management contains sample notification scripts located in
the PATROL PSL directory.
You can specify that the recovery action command executes only for a specific alert
status, such as INFORMATION, WARN, or ALARM by appending the status to the
variable name. However, to run recovery actions for INFORMATION events, you
must also set the variable allowInfoRecoveryActions to 1.
NOTE
You must enable recovery actions using the Alert Actions menu command for the KM
to execute these actions. See “arsAction” on page 161.
arsCmdType
You can use the arsCmdType rule to specify the command type to use when
executing the recovery action command. This command is typically used when the
recovery action requires special KM information, such as the PATROL password
used to log into a database. The AS_EVENTSPRING application class contains a
sample PATROL command type.
alertResetOnInit
You can use the alertResetOnInit rule to specify whether the agent should, upon an
agent restart, close outstanding events (for example, alarms or warnings) that existed
prior to the agent being shutdown. You may want to close these events because they
are no longer applicable. You cannot apply this rule to specific PATROL objects. By
default, this option is not enabled.
NOTE
The notification server must be running when you set up PATROL KM for Event
Management alert rules on remote agents.
Chapter 5 169
Remote Alert Settings
NOTIFICATION_SERVER
You can use the following notification server configuration variables to identify the
primary and backup notification servers for the remote agents.
RemoteAgentCommSettings
You can use the RemoteAgentCommSettings configuration variable to configure the
remote communication settings for the following situations:
Notification targets are typically defined only on the notification server. If you define
targets on the remote agent, you must use a remote notification system and remote
notification targets. Remote notification targets are forwarded to the notification
server for processing.
TIP
To prevent notification, use a special target name of NONE or leave the target blank.
For example, if you set a default target for an application class and set the target to
NONE for a particular instance or parameter in that application class, notifications for
that instance or parameter are not sent.
NOTE
The target type, such as page or e-mail, can be changed to any type of notification
action. For example, trouble ticket targets are not required for trouble tickets. The
target can perform any task programmed in the notification command.
emailTargets
You can use emailTargets rules to specify e-mail accounts as notification targets.
Chapter 5 171
Notification Target Rules
pagerTargets
You can use pagerTargets rules to specify one or more pagers as notification targets.
customTargets
You can use the customTargets rule to specify custom notification targets.
ttTargets
You can use ttTargets rules to specify trouble ticket notification targets.
Chapter 5 173
Blackout Settings
NOTE
If the type of alert condition (INFORMATION, WARNING, ALARM, or
ESCALATED) is not specified for a notification target (for example,
/AS/EVENTSPRING/ALERT/EMAIL/object/emailTargetsRemote), notification
occurs for all alert conditions.
Blackout Settings
You can use the Blackout Periods menu commands to prevent notification during a
specified time period, even if an alert condition occurs. You can specify multiple
blackout times per day. Blackout periods apply to notification only and can be
applied to most PATROL objects. For more information about blackout periods, see
“Configuring Blackout Periods” on page 115.
blackoutPeriod
You can use the blackoutPeriod configuration variable to specify the start and stop
times of a blackout period for a specified PATROL object.
__OVERRIDE__
You can use the __OVERRIDE__ configuration variable to override PATROL KM for
Event Management rules based on the time of day. Using this command, you can
establish multiple overrides per day.
nsRemoteTargetSetting
You can use the nsRemoteTargetSetting configuration variable to specify the
handling of remote targets received by the notification server. Table 61 on page 175
lists the options you can specify for the remote target setting.
Chapter 5 175
Custom Settings
Custom Settings
You can use the following custom settings to reword notification messages and to
assign custom identifiers to an object.
msgText
You can use the msgText rule to specify the message format for the subject line of the
notification message. You can specify different formats for different types of alerts
and for specific PATROL objects (applications, instances, or parameters).
NOTE
If you do not specify INFORMATION, WARNING or ALARM, the same message
format is used for all events.
msgBody
You can use the msgBody rule to specify the message format for the body of the
notification message. You can specify different formats for different types of alerts
and for specific PATROL objects (applications, instances, or parameters).
NOTE
If you do not specify INFORMATION, WARNING or ALARM, the same message
format is used for all events.
%HOSTNAME% has CPU Processor time of %PARAMETER_VALUE% for time zone %TIMEZONE% for
%OS_TYPE%
Mercury has CPU Processor time of 99 for time zone Eastern Standard Time for NT 5.0
Service Pack 1
Chapter 5 177
Custom Settings
NOTE
A special instance name of __ANYINST__ can be used for all instances of a
parameter. If object is not specified, then the configuration variable defines the default
message format.
allowOperator
You can use the allowOperator configuration variable to control which PATROL KM
for Event Management menu commands an operator can execute from a PATROL
Operator console.
All configuration changes take affect immediately once they have been applied. The
following are exceptions:
These configuration settings are updated by restarting the PATROL Agent after
applying the configuration change.
Chapter 5 179
Custom Settings
active
You can use the active configuration variable to set the status of an application class.
NOTE
You cannot use this setting to activate an application class that is inactive by default
in the KM. If you use the PATROL KM for Event Management to activate such an
application class, the application class again becomes inactive after an agent restart.
appClassSettingsStatusFlag
You can use the appClassSettingsStatusFlag to indicate whether PATROL KM for
Event Management application class settings are used.
NOTE
You cannot use this setting to activate an application class that is inactive by default
in the KM. If you use the PATROL KM for Event Management to activate such an
application class, the application class again becomes inactive after an agent restart.
disableNotifyAnnotations
You can use the disableNotifyAnnotations variable to disable notification annotations
for the NotifiedEvents parameter. By default, this variable is not provided;
annotations are performed. To disable annotations, add this configuration variable to
the agent using the PATROL Configuration Manager and set the value to 1.
Table 68 disableNotifyAnnotations
Configuration Variable /AS/EVENTSPRING/disableNotifyAnnotations
Values 0 = don’t disable annotations (default)
1 = disable annotations
Example 1
Menu Command Access None
Support supported by PATROL KM for Event Management version 2.6.00 or
later
maxEventsToReport
You can use the maxEventsToReport variable to specify the maximum number of
NOTIFY_ EVENTS events to report in the console system output window when you
run the PATROL KM for Event Management menu command Reports => All NOTIFY
EVENTS.
Table 69 disableNotifyAnnotations
Configuration Variable /AS/EVENTSPRING/maxEventsToReport
Values Any integer value. The default value is 100.
Example 100
Menu Command Access None
Support supported by PATROL KM for Event Management version 2.7.00 or
later
Availability
You can use the availability settings to specify the agents and hosts that PATROL
monitors for availability.
Chapter 5 181
Availability
Targets
You can use the Targets configuration variable to specify the host to be monitored.
You can also use this menu command to change the default SNMP settings and the
SNMP Object ID.
snmpSettings
You can use the snmpSettings configuration variable to specify the SNMP ping
information for the PATROL Agent on the managed system that you want to monitor
for availability.
snmpOid
You can use the snmpOid configuration variable to specify the SNMP Object ID on
the managed system that you want to monitor for availability. PATROL uses the
SNMP object ID only when checking the availability of the remote agent on the
managed system. It uses the object ID when making an SNMP call to the agent and
checking for a response. You can use the default object ID or provide any other valid
SNMP object ID.
Configuration Variable /AS/EVENTSPRING/AVAILABILITY/snmpOid
Values SNMP_ObjectID
Example .1.3.6.1.2.1.1.3.0
Menu Command Access Event Management => Availability => Add Target
Updated
Use the Updated configuration variable to indicate that changes have been made to
the availability targets and availability checkers.
NOTE
The KM automatically sets the Updated variable to 1 whenever you make a change
using the Availability menu command.
Primary
You can use the Primary configuration variable to specify the primary availability
monitor.
NOTE
The PATROL Agent that you use to run the Identify Primary menu command
becomes the backup monitor.
Blackout
You can use the Blackout configuration variable to specify time periods to stop
monitoring of a host or an agent.
Chapter 5 183
Availability
NOTE
If you specify one or more availability blackouts for a PATROL Agent or host, the KM
stops monitoring that agent or host during the blackout period.
pingCmd
You can use the pingCmd configuration variable to specify the operating system
command to use when checking host availability.
pingOkString
The pingOkString configuration variable is the string that appears in the output of the
pingCmd.
pingPacketSize
The pingPacketSize configuration variable defines the packet size of the ping
command in bytes.
pingAttempts
The pingAttempts configuration variable defines the number of pings attempted.
pingArgs
The pingArgs configuration variable allows you to use custom ping arguments. The
arguments defined by pingArgs are appended to the ping command defined by the
configuration variable pingCmd.
For more information about using this variable, see Table 78 on page 186 or “To
Specify Ping Command Arguments” on page 93.
Chapter 5 185
Parameter Settings
checkerAccount.defaultAccount
You can use the checkerAccount.defaultAccount configuration variable to specify the
account to use when performing pings against other PATROL Agents.
NOTE
BMC Software recommends that you do use the PATROL Agent default account. The
account could be locked out if an agent check fails because of an invalid login.
Parameter Settings
You can use the Parameter Settings menu commands to customize PATROL
parameter thresholds and polling times. These changes are stored externally from the
KM and do not change the KM version.
THRESHOLDS
Using the Thresholds configuration variable, you can change the thresholds for all
instances of a parameter or thresholds for a particular parameter instance. Changes
apply only to the agent where the command was executed. This operation is similar
to creating a localized parameter (overriding the global definition) by using a
developer console.
Chapter 5 187
Parameter Settings
interval
You can use the interval configuration variable to specify poll times for standard and
collector parameters.
paramSettingsStatusFlag
You can use the paramSettingsStatusFlag configuration variable to enable or disable
the use of PATROL KM for Event Management thresholds or poll times. By default,
they are enabled. For more information on using PATROL KM for Event
Management to manage thresholds and poll times, see “Managing Parameter
Thresholds and Poll Times” on page 104.
Note: To apply the setting globally, omit the object reference, as shown below:
Configuration
Variable /AS/EVENTSPRING/PARAM_SETTINGS/STATUSFLAGS/paramSettingsStatusFlag
Values 0 - PATROL KM for Event Management settings are ignored
1 - PATROL KM for Event Management parameter settings have been processed
2 - Refresh thresholds
4 - Refresh poll times
6 - Refresh thresholds and poll times
NOTE
You can use a special instance name, __ANYINST__, for all instances of a parameter.
processWildcards
You can use the processWildcards rule to enable the use of wildcards for instance
names when specifying parameter thresholds and poll times.
0 = disable wildcards
Example 1
Menu Command None
Access
Support supported by PATROL KM for Event Management version 2.700 or later
Chapter 5 189
Instance Filtering Settings
6
6 Parameters
This chapter list PATROL KM for Event Management parameters and shows their
default settings. The following topics are discussed:
Chapter 6 191
Parameter Summary
Parameter Summary
PATROL KM for Event Management parameters are in the following applications
classes:
■ AS_EVENTSPRING
■ AS_AVAILABILITY
■ NotifiedEvents
■ EscalatedEvents
■ BlackoutEvents
RefreshParamSettin updates parameter settings as required
gs
ResendAlertQueue resends specified alerts
RetriggerEventQue retriggers events that failed to be sent to a notification server
ue
AS_AVAILABILITY Application Class
AlertTest tests the notification systems and rules without forcing a production
parameter into an alert state
Chapter 6 193
Parameter Defaults
■ HostPingFailures
■ AgentPingFailures
■ SnmpPingFailures
Parameter Defaults
Table 88 lists the default properties for each PATROL KM for Event Management
parameter.
Active
Alarm1
Parameter Type Alarm2 Border Schedule Icon Units
AlertTest Con 1-50 N/A N/A Gauge N/A N Y
51-100
AgentLoginDenied Con N/A 0-0 N/A Graph N/A Y Y
N/A
NotifiedEvents Con N/A N/A N/A Graph N/A Y Y
N/A
Annotated
Active
Alarm1
Parameter Type Alarm2 Border Schedule Icon Units
BlackoutEvents Con N/A N/A N/A Graph N/A Y Y
N/A
EscalatedEvents Con N/A N/A N/A Graph N/A Y Y
N/A
EventCollector Coll N/A N/A 30 seconds N/A N/A N Y
RefreshParamSettings Std N/A 0-1000 1.5 minutes Graph N/A N Y
N/A
ResendAlertQueue Std N/A N/A 10 minutes Graph N/A N Y
N/A
RetriggerEventQueue Std N/A N/A 2 minutes Graph N/A N Y
N/A
AvailabilityMonitorCo Coll N/A N/A 2 minutes 3 N/A N/A N Y
ll N/A seconds
AgentPingFailures Con N/A N/A N/A Graph N/A N Y
1
HostPingFailures Con N/A N/A N/A Graph N/A Y Y
1
SnmpPingFailures Con 1 N/A N/A Graph N/A N Y
2
Chapter 6 195
Parameter Defaults
7
Troubleshooting PATROL KM for
7
Event Management
This chapter contains information for troubleshooting PATROL KM for Event
Management.
Chapter 7 197
Configuration Problems
Configuration Problems
This section contains troubleshooting information for the following common
configuration problems:
Explanation Solution
The PATROL KM for Event From the PATROL Configuration Manager, set the
Management is not configured to pass /AS/EVENTSPRING/useEnvOnlyForCmds rule to 0.
command-line arguments.
For more information, see “To Set the
/AS/EVENTSPRING/useEnvOnlyForCmds Value” on
page 199.
Default Values
If you configure the notification server using the Quick Config menu option, the
default value for /AS/EVENTSPRING/useEnvOnlyForCmds is 1 on Unix and
AS/400 (iSeries) environments, which does not support commas.
In Windows and VMS environments, the default value is 0, which does support
commas.
1 From the PATROL console, access the host KM menu commands as described in
“Accessing KM Commands and InfoBoxes” on page 212.
2 Choose the KM menu command Event Management => Alert Settings => Local Alert
Settings => Notification Command => Set For Classes.
3 From the Choose Target Class(es) dialog box, select / (for all application classes)
and select Accept.
Chapter 7 199
Configuration Problems
4 For the option Call command using Event Management KM environment variables
only, select No.
Explanation Solution
PATROL KM for Event Management is not Verify that the arsAction rule is configured to
configured correctly. perform notification.
Explanation Solution
Parameters and thresholds Begin baselining and adjusting parameter thresholds.
need tuning.
Review the e-mail alerts to determine which parameters are
generating alerts. Then adjust the parameter thresholds, deactivate
threshold ranges, or deactivate parameters, as necessary. You can
make these changes on one remote agent and then use the PATROL
Configuration Manager to deploy these changes to other agents.
Blackout periods are needed. If you are receiving alerts because systems are down for
maintenance, you should configure blackout periods that specify
when alerts are not generated. For more information, see
“Configuring Blackout Periods” on page 115.
The rule Set the rule /AS/EVENTSPRING/ALERT/arsAction to 0.
/AS/EVENTSPRING/ALER
T/arsAction is set to 4. If the arsAction rule is set to 4 for all PATROL objects, notifications
are sent for all events. Instead, you may want to disable notification
for all PATROL objects, by setting /AS/EVENTSPRING/arsAction
to 0 at the remote agent. Then, enable notification only for the
desired applications, instances, or parameters.
/AS/EVENTSPRING/ALERT/object/arsAction
Chapter 7 201
Configuration Problems
Explanation Solution
The notification command is Fix the notification command.
failing at the notification server.
Run the notification script from the command line using the
PATROL default user account. If the script fails, determine
why. Possible reasons could include:
If the script runs correctly, verify that you have entered the
correct script name in your PATROL KM for Event
Management rule. If you update the script, you must restart the
PATROL Agent for the change to be recognized. For more
information, see “Testing Notification Scripts” on page 70.
The PATROL default account does Check the permissions on the script file.
not have the proper permissions
to execute the script file.
The PATROL Agent on the Verify that the PATROL agent on the notification server is
notification server is not running. running.
The remote notification event did Resolve connection problems.
not reach the notification server.
Verify whether you can ping the notification server from the
remote agent. Use the same hostname specified during
notification configuration. For more information about
configuring remote agents, see “Configuring Remote Agents”
on page 73.
The remote agent is configured Verify the rules have correct values.
incorrectly.
■ /AS/EVENTSPRING/alertSystem should be set to
REMOTE.
■ /AS/EVENTSPRING/NOTIFICATION_SERVER1.defaultA
ccount rule exists at the remote agent. If this rule is not
present, you need to specify the notification server as
described in “Configuring Remote Agents” on page 73.
Explanation Solution
The notification rules are not Examine the annotation information in the NotifiedEvents
configured correctly. parameter at the remote agent and at the notification server.
Examine the NOTIFY_EVENT and the REMOTE_NOTIFY_EVENT
in the PATROL Event Manager. Determine whether the notification
settings at the remote agent are appropriate. If a NOTIFY_EVENT is
not being sent, see “NOTIFY_EVENTS not Generated when
Parameter is in Alarm” on page 205.
Explanation Solution
The notification server account is Supply a valid account and reset the parameter.
not valid.
For more information, see “To Supply a Valid Account” on
page 204.
A user has caused the PATROL Determine the user account that generated the failed login.
default account to be locked out.
On Windows, domain accounts are often locked out after 3
failed login attempts. If the PATROL default account is
locked out, PATROL no longer works properly. This could
happen if a user starts a console using an account that does
not have the rights to connect to the agents.
Chapter 7 203
Configuration Problems
1 From the remote agent machine, supply the correct notification server account. For
more information, see “Configuring Remote Agents” on page 73.
Review the AgentLoginDenied annotated data point to determine the account used
during the failed login. The annotated data point format is as follows:
U P:X.Y@Z
U = login name
Z==ipaddressoftheclientconnecting(e.g.,console,PatrolCli,remoteagent,
etc.
Example)
patrol T:936.1389@192.168.1.233
To analyze the annotated data more closely, you can run this Unix command:
dump_hist-paramAgentLoginDenied-annotate|grep@|awk-F@{'print$2'}|sort
| uniq
Explanation Solution
The availability Monitor a maximum of 100 agents.
monitor is monitoring
too many agents. An availability monitor should monitor a maximum of 100 agents. If it
monitors more than 100 agents, it may not be able to ping with the
frequency specified by the parameter AvailabilityMonitorColl.
Explanation Solution
The parameter is being set There is currently no workaround for this issue.
to ALARM by way of an
PSL command, not because Some KMs change the state of a parameter using a PSL command.
it exceeded its threshold. When this occurs, the parameter does not generate the standard state
change events 9, 11, or 39, that it generates when it exceeds thresholds
or is cleared. Thus, the PATROL KM for Event Management does not
detect the ALARM state and does not generate a NOTIFY_EVENT.
The wrong standard events Take the following steps:
catalog (StdEvents.ctg) is
being used. 1. For the PATROL Agent machine, obtain the updated catalog file,
StdEvents.ctg.EVS, and copy it to
%PATROL_HOME%\lib\knowledge.
Chapter 7 205
Configuration Problems
Explanation Solution
The allowsendparamonly variable exists in
Remove the allowsendparamonly variable.For
%PATROL_HOME%\common\patrol.d\pat instructions, see “Removing the allowsendparamonly
rol.conf file and is set to true. Variable” on page 206.
2 Using the PACFG (PATROL Agent Configuration) utility, specify that secured
location.
allowsendparamonly=true
Explanation Solution
The message subject line Shorten the subject line to 80 characters or less and the body text to 255
or body text contain too characters or less.
many characters.
In OpenVMS, the subject line of a mail message is limited to 80
characters and the e-mail message body is limited to 255 characters. If
you exceed these limits, notification messages may not be sent. For
more information, see “Using Notification Scripts” on page 64.
The notificiation rules are For more information about configuring notification rules, see
not configured properly. “Configuring Notification Servers” on page 71.
Explanation Solution
Availability targets have Add availability targets. For more information, see “Configuring
not been added. Availability Monitoring” on page 87.
Explanation Solution
The event_trigger2() statement obtains the application If this problem occurs, you will need to
class, instance, and parameter name from the change your notification rules so that
NOTIFY_EVENT details, not from the event origin. notifications are sent to the correct target.
For more information see “Event Details” on page 156.
Chapter 7 207
Gathering Diagnostic Information
■ NotifiedEvents
■ BlackoutEvents
■ EscalatedEvents
Installation Logs
One log file is created each time the installer is run. The name of the log file is a
combination of the computer name and a time stamp. The log file is located in the
%USERPROFILE%\Application Data\BMCINSTALL\ directory.
For example, a log file for user bhunt on a Windows Server computer BHUNT_1
could be:
C:\WINNT\Profiles\jrando\Application Data\BMCinstall\BHUNT_1-1005340189.log.
1 From the PATROL console, access the host Event Management application.
2 Right-click the Event Management application and select the menu command
InfoBox and described in “Accessing KM Commands and InfoBoxes” on page 212.
Chapter 7 209
Gathering Diagnostic Information
A
Accessing Menu Commands,
A
To access To access
Console menu commands InfoBoxes
PATROL Console for Microsoft In either the Desktop tree tab or In either the Desktop tree tab or
Windows Servers work area, right-click a the work area, right-click an
computer or application icon application class or parameter
and choose KM Commands icon and choose InfoBox from
from the pop-up menu. the pop-up menu.
PATROL Console for Unix In the work area, right-click a With the middle mouse button,
computer or application icon to click an application class or
display a pop-up menu that parameter icon.
contains KM-specific
commands.
PATROL Central Operator - In the navigation pane, In the navigation pane,
Windows Edition right-click a managed system or right-click a PATROL object
application icon and choose and choose InfoBox from the
Knowledge Module pop-up menu.
Commands from the pop-up
menu.
PATROL Central Operator - In the tree view area, right-click In the tree view area, right-click
Web Edition an application icon and choose a PATROL object and choose
Knowledge Module Commands Infobox from the pop-up menu.
from the pop-up menu.
NOTE
If you are trying to access Help from a Unix console, see the PATROL Installation
Reference Manual for specific instructions about installing and setting up a browser in
the Unix environment.
■ Double-click a
parameter in the KM
tab of the console;
from the properties
dialog box, click the
Help tab; then click
Show Help.
PATROL Console From the console menu Choose Attributes => Right-click a parameter
for Unix bar, choose Help On => Application Classes and icon and click Help On.
Knowledge Modules. double-click the
application name. Click
Show Help in the
Application Definition
dialog box.
Index
Symbols
%AGENT_VERSION% 160
%ALARM_MAX% 159
A
%ALARM_MIN% 159 accounts
%APPCLASS% 158 adminstrative rights required for 28
%APPINSTANCE% 158 availability monitoring 92
%AVE10% 158 console connection 28
%CUSTOM_ID1% 160 domain 28
%CUSTOM_ID2% 160 generating failed login alarms 204
%DATE% 158 operator 28
%EVENT_CATALOG% 160 root 29
%EVENT_CLASS% 160 setting up for installation 27
%EVENT_ID% 159 Unix 28
%EVENT_SEVERITY% 160 Windows 27
%EVENT_STATUS% 160 action scripts, AlarmPoint 98
%EVENT_TYPE% 160 active (configuration variable) 180
%HOSTNAME% 157 ActiveX control 66
%ICON_NAME% 158 addresses
%IPADDRESS% 157 default 72
%LAST10% 158 email, multiple 198
%LAST10TP% 159 paging 99
%LAST10TS% 159 AgentLoginDenied 203
%NOTIFY_EVENT_ID% 160 defined 192
%OS_TYPE% 159 resetting 204
%PARAMETER_NAME% 158 troubleshooting 203
%PARAMETER_STATUS% 158 using annotation data 204
%PARAMETER_VALUE% 158 AgentPingFailures 194
%PARENT_INSTANCE% 158 agents
%PATROL_HOME% 160 applying settings to 111
%TCP_PORT% 157 assigning notification servers to 73
%TIME% 158 configuring 73–75
%TIMEZONE% 158 maximum to monitor 61
%UDP_PORT% 157 monitoring for availability 87–93
%USERDEFINED% 159 persistent connection to 75
__ANYINST__ 149, 166, 189 protocol settings 79
__appl_class__ 124 tuning 91
__instance__ 124 where to install 32
__nfile__ 124 alarm ranges
__output__ 125 default 194
__OVERRIDE__ 174 setting 106
__param__ 124 AlarmPoint
__param_status__ 124 benefits 95
__param_value__ 124 integrating with 94–103
__src_event_id__ 124 java client 21, 96
__udefvar__ 125, 143 notification script for 95
215
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
217
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
E F
failed login 204
editing failover
notification messages 79 configuring 89
scripts 67–69 features 17
electronic product download (EPD) site 31 filtering objects to monitor 112
emailTargets filterList
defined 171 defined 190
using 19 using 114
enabling filterType
ftp 29 defined 190
notification 141 using 113
parameters 109 first time installation 37
PATROL KM for Event Management thresholds 112 fixes, installing 30
recovery actions 121 ftp, enabling 29
enterprise console 59
environment variables
LANG 45
PATH 45
H
PATROL_BROWSER 46 Help, online 211
219
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
N NOTIFY_EVENT, continued
troubleshooting 203
negative value, parameter 202 nsRemoteTargetSetting 175
Netscape Navigator 44
new PATROL users
easy install option 35
installing for the first time 37
O
NFS 29 objects, PATROL 153
notification OpenVMS
local versus remote 162 ping command 94
scripts, using 64–71 scripts 67
server 17, 58 subject line limitations 80
system, configuring 72 support for 26
types supported 69 troubleshooting 207
notification messages operating systems, support for 26
body text 80 operator accounts 28
length 80 OS (operating system)
rewording 79 command type 142
subject line 80 type, variable 159
where to send from 72 OS(operating system)
notification scripts supported 26
backing up 69 output window, system 208
customizing 69 overrides
editing 67 allowing 163
specifying 72 variable 174
testing 70
notification servers
benefits of 58 P
configuring 71–72
PACFG (PATROL Agent Configuration) utility 206
defining 58
pagerTargets 172
monitoring for availability 60
parameters
primary and backup 58
activating 105
protocol settings 79
AgentLoginDenied 192
providing security for 59
AgentPingFailures 194
notification targets
AlertTest 192, 193
defining 72
AvailabilityMonitorColl 194
types 70
BlackoutEvents 193
NOTIFICATION_SERVER1
default values 194
defined 170
EscalatedEvents 193
using 73
EventCollector 193
NOTIFICATION_SERVER1.defaultAccount
HostPingFailures 194
defined 170
list of 192
troubleshooting 202
NotifiedEvents 192
using 73
RefreshParamSettings 193
NOTIFICATION_SERVER2
ResendAlertQueue 193
defined 170
RetriggerEventQueue 193
using 73
set value 166
NOTIFICATION_SERVER2.defaultAccount 170
SnmpPingFailures 194
NotifiedEvents
variables for 158
annotations 181, 208
paramSettingsStatusFlag
defined 192
defined 188
troubleshooting 203
using 111
usage example 143
parent instance variable 158
NOTIFY_EVENT
partitions, installing on 29
description 156
patches, installing 30
missing 205
PATH environment variable 45
triggering 156
221
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
StdEvents.ctg.EVS 205
stopping U
notification 85 UDP Port variable 157
the monitoring of objects 112 UDP protocol 79
subject line umask setting 29
back slashes in 81 uninstalling 48
length limitations 80 units, parameter 194
notification message 80 Unix
rewording 79 account requirements 28
rewording variables 81 browser requirements 44
support, customer 3 scripts 64
supported platforms 26 subject line limitations 80
system output window 208 using for availability monitoring 61
system requirements 26 unloading KMs
with the PATROL Console for Unix 57
with the PATROL Console for Windows 57
T Updated (configuration variable) 183
upgrading 43
tabs in variables 157 backing up scripts prior to 30
targets from an earlier version of the KM 43
availability monitoring 88 useEnvOnlyForCmds
custom 21 changing value of 199
example 136 defined 164
rules 171–174 troubleshooting 198
using multiple 198 user account 45
where to locate 61 User defined variables 159
Targets (configuration variable) 182 userdefined configuration variable 157
TCP port variable 157
TCP protocol 79
technical support 3
telnet, enabling 29 V
testing variables
AlarmPoint java client 97 alarm settings 159
notification scripts 70 alert 158
notification using AlarmPoint 103 application class 158
recovery actions 149 date 158
rules 84 disableNotifyAnnotations 181
thresholds event catalog 160
applying to agent 111 event class 160
configuration variable 186 event ID 159
disabling 112 event severity 160
PATROL KM for Event Management 104 event status 160
rule for 187 event type 160
setting 104 hostname 157
tuning 201 icon name 158
time variables 158, 159 instance name 158
Tivoli 59 IP address 157
Trigger NOTIFY_EVENT option 101 maxEventsToReport 181
triggering alarms 106 message-replacement 157–161
troubleshooting 197–209 OS type 159
ttTarget parameter 158
defined 173 parent instance 158
using 70 PATROL Agent version 160
typical installation option 35 PATROL_BROWSER 46
pconfig 17
pingArgs 186
pingAttempt 185
223
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
variables, continued
pingPacketSize 185
TCP port 157
time 158, 159
UDP port 157
user-defined 159
using tabs or commas in 157
VB (Visual Basic) 65
verifying discovery 64
version, determining 209
Visual Basic (VB) 65
VMware, support for 29
W
What If? feature 84
wilcards 107
Windows
accounts 27
scripts 65