H3C IMC Application Manager Administrator Guide-7.3-5W105

HomeSupportNetwork Operations & ManagementIntelligent Management Center 7Configure & DeployUser ManualsH3C IMC Application Manager Administrator Guide-7.3-5W105
01-Text
Title Size Download
01-Text 10.54 MB

Contents

Application Manager overview·· 1

Application scenario· 1

Applications monitored by APM·· 1

Monitored applications· 1

Common monitor 4

Specific monitor 4

Application monitor mode· 4

Remote monitor 5

Local monitor 5

Monitor method· 5

APM monitor features· 6

Application monitor management 6

Topology and application group management 7

Agent management 7

Configuration management 7

Widget management 8

Application management report 8

Quick start 9

Accessing APM·· 9

Classic mode· 9

Breadcrumb navigation menu· 9

APM navigation tree· 10

Desktop mode· 12

APM perspectives· 14

Application manager perspective· 14

Tenant self maintenance perspective· 15

Quick start guidelines· 15

Remote monitor 15

Local monitor 19

Quick service process· 21

Application monitor report 21

Common operations· 27

Selecting devices· 28

Sorting a list 29

Monitor management 31

Application monitor 31

Viewing the application monitor list 32

Restarting a server 33

Customizing the application monitor list 34

Viewing associated applications· 35

Viewing root cause analysis· 35

Querying application monitors· 36

Adding an application monitor 37

Modifying an application monitor 37

Deleting application monitors· 37

Setting the management status of an application monitor 37

Start polling· 38

Viewing the APM server details· 38

Importing/exporting usernames and passwords· 38

Exporting application data· 39

Importing applications· 39

Exporting an import template· 40

Configuring the import template· 40

Importing applications· 41

Host monitoring· 41

Viewing a host monitor in host mode· 41

Viewing a host monitor in list mode· 42

Class monitoring· 43

Custom views· 44

Viewing the custom view list 44

Viewing custom view details· 44

Adding a custom view· 45

Modifying a custom view· 45

Deleting a custom view· 46

Viewing a custom view report 46

Topology and application group management 47

Topology management 47

Topology tools and right-click menu· 47

Viewing an application topology· 48

Viewing a dependency topology· 50

Viewing a host topology· 51

Viewing a group topology· 52

Viewing a converged topology· 55

Application group management 56

Viewing the application group list 56

Viewing the application group details· 57

Adding an application group· 58

Modifying an application group· 58

Deleting an application group· 59

APM agent management 61

Installing and upgrading an APM agent 61

Installing an APM agent locally· 61

Installing an APM agent remotely· 61

Upgrading an APM agent locally· 62

Upgrading an APM agent remotely· 63

Managing APM agents· 63

Viewing the APM agent list 63

Viewing agent details· 63

Starting an APM agent 64

Stopping an APM agent 64

Viewing the auto discovery result 64

Adding an application monitor 64

Deleting an APM agent 65

Configuration management 66

Threshold management 66

Viewing the global threshold List 67

Adding threshold configuration· 68

Modifying global threshold configuration· 69

Deleting monitor indexes from threshold configuration· 70

Configuring a monitor index to use global threshold or custom threshold· 70

Exporting custom thresholds· 71

Modifying custom threshold configuration· 71

Baseline configuration· 72

Viewing the baseline configuration list 72

Modifying baseline configuration· 72

Port configuration· 73

Viewing the application default port list 74

Modifying the application default port list 75

Probe configuration· 75

Viewing the probe list 75

Viewing the probe details· 76

Adding a probe· 76

Modifying a probe· 76

Deleting a probe· 77

Deploying network configuration to probes· 77

Parameter configuration· 77

APM administrator configuration· 78

Viewing the APM administrator list 78

Adding an APM administrator 78

Modifying an APM administrator 79

Deleting a template· 79

Template configuration· 79

Viewing the template configuration list 79

Adding an agent template· 80

Adding an application template· 80

Modifying an agent template· 81

Modifying an application template· 81

Deleting a template· 81

Application data display· 83

Widgets· 83

Application Topology widget 83

Application Monitor widget 84

Host Monitor widget 85

Dashboard· 85

Application List widget 85

Server-Memory widget 86

Application Group widget 87

Server-CPU widget 88

Server-Flux widget 89

Server-Disk widget 90

URL Sequence widget 90

Application Topology widget 91

Windows OS monitor 93

Windows· 93

Adding a Windows application monitor 93

Modifying a Windows application monitor 95

Viewing the Windows application monitor report 96

Windows performance counters· 103

Adding a Windows performance counter application monitor 103

Modifying a Windows performance counter application monitor 105

Viewing the Windows performance counter application monitor report 106

UNIX server monitor 109

AIX· 109

Adding an AIX application monitor 109

Modifying an AIX application monitor 111

Viewing the AIX application monitor report 112

SCO UNIX· 120

Adding an SCO UNIX application monitor 120

Modifying an SCO UNIX application monitor 122

Viewing the SCO UNIX application monitor report 123

Solaris· 128

Adding a Solaris application monitor 128

Modifying a Solaris application monitor 131

Viewing the Solaris application monitor report 132

FreeBSD·· 137

Adding a FreeBSD application monitor 137

Modifying a FreeBSD application monitor 139

Viewing the FreeBSD application monitor report 140

Mac OS· 146

Adding a Mac OS application monitor 146

Modifying a Mac OS application monitor 149

Viewing the Mac OS application monitor report 149

OpenBSD·· 155

Adding an OpenBSD application monitor 155

Modifying an OpenBSD application monitor 157

Viewing the OpenBSD application monitor report 158

HP-UX· 164

Adding an HP-UX application monitor 164

Modifying an HP-UX application monitor 166

Viewing the HP-UX application monitor report 167

AS400· 172

Adding an AS400 application monitor 172

Modifying an AS400 application monitor 174

Viewing the AS400 application monitor report 174

Linux server monitor 179

Linux· 179

Adding a Linux application monitor 179

Modifying a Linux application monitor 182

Viewing the Linux application monitor report 182

NeoKylin· 190

Adding a NeoKylin application monitor 190

Modifying a NeoKylin application monitor 193

Viewing the NeoKylin application monitor report 194

Rocky· 200

Adding a Rocky application monitor 200

Modifying a Rocky application monitor 203

Viewing the Rocky application monitor report 203

Database server monitor 209

SQL Server 209

Adding a SQL Server application monitor 209

Modifying a SQL Server application monitor 211

Viewing the SQL Server application monitor report 211

MySQL· 219

Adding a MySQL application monitor 219

Modifying a MySQL application monitor 220

Viewing MySQL application monitor report 221

Oracle· 225

Adding an Oracle application monitor 225

Modifying an Oracle application monitor 227

Viewing the Oracle application monitor report 227

DB2· 243

Adding a DB2 application monitor 243

Modifying a DB2 application monitor 245

Viewing the DB2 application monitor report 245

Caché· 253

Adding a Caché application monitor 253

Modifying a Caché application monitor 254

Viewing the Caché application monitor report 255

Informix· 257

Configuring an Informix server 257

Adding an Informix application monitor 257

Modifying an Informix application monitor 258

Viewing the Informix application monitor report 259

MemCached· 262

Adding a MemCached application monitor 262

Modifying a MemCached application monitor 263

Viewing the MemCached application monitor report 264

MongoDB· 266

Adding a MongoDB application monitor 266

Modifying a MongoDB application monitor 268

Viewing the MongoDB application monitor report 268

DM·· 272

Adding a DM application monitor 272

Modifying a DM application monitor 274

Viewing the DM application monitor report 274

Oracle ASM·· 280

Adding an Oracle ASM application monitor 280

Modifying an Oracle ASM application monitor 282

Viewing the Oracle ASM application monitor report 282

PostgreSQL· 284

Adding a PostgreSQL application monitor 284

Modifying a PostgreSQL application monitor 285

Viewing the PostgreSQL application monitor report 286

DBQuery· 289

Adding a DBQuery application monitor 289

Modifying a DBQuery application monitor 291

Viewing the DBQuery application monitor report 292

Sybase· 293

Adding a Sybase application monitor 293

Modifying a Sybase application monitor 295

Viewing the Sybase application monitor report 295

Xugu· 298

Adding a Xugu application monitor 298

Modifying a Xugu application monitor 300

Viewing the Xugu application monitor report 300

Application server monitor 306

.NET server 306

Adding a .NET server application monitor 306

Modifying a .NET server application monitor 308

Viewing the .NET server application monitor report 308

JBoss server 310

Configuring the JBoss server and the APM server 310

Adding a JBoss server application monitor 311

Modifying a JBoss server application monitor 312

Viewing the JBoss server application monitor report 313

Tomcat server 315

Configuring the Tomcat server to support JMX monitoring· 315

Adding a Tomcat server application monitor 316

Modifying a Tomcat server application monitor 318

Viewing the Tomcat server application monitor report 318

Lync Server 2010· 321

Adding a Lync Server 2010 application monitor 321

Modifying a Lync Server 2010 application monitor 323

Viewing the Lync Server 2010 application monitor report 323

Lync Server 2013· 332

Adding a Lync Server 2013 application monitor 332

Modifying a Lync Server 2013 application monitor 334

Viewing the Lync Server 2013 application monitor report 335

Oracle Application Server 343

Configuring the Oracle AS· 344

Adding an Oracle AS application monitor 344

Modifying an Oracle AS application monitor 346

Viewing the Oracle AS application monitor report 346

WebLogic server 349

Copying Weblogic API files to the APM server 349

Adding a WebLogic server application monitor 349

Modifying a WebLogic server application monitor 351

Viewing the WebLogic server application monitor report 351

GlassFish server 356

Adding a GlassFish server application monitor 356

Modifying a GlassFish server application monitor 358

Viewing the GlassFish server application monitor report 358

WebSphere server 360

Adding a WebSphere server application monitor 360

Modifying a WebSphere server application monitor 362

Viewing the WebSphere server application monitor report 362

Jetty· 366

Adding a Jetty application monitor 366

Modifying a Jetty application monitor 368

Viewing the Jetty application monitor report 368

Lotus Domino server 371

Configuring the Lotus Domino server 371

Adding a Lotus Domino server application monitor 371

Modifying a Lotus Domino server application monitor 373

Viewing the Lotus Domino server application monitor report 373

Domino Server Authentication· 376

Configuring the Lotus Domino server 377

Adding a Domino Server Authentication application monitor 378

Modifying a Domino Server Authentication application monitor 379

Viewing the Domino Server Authentication application monitor report 379

Web server monitor 380

Apache server 380

Configuring the Apache server 380

Adding an Apache server application monitor 380

Modifying an Apache server application monitor 382

Viewing the Apache server application monitor report 382

IIS server 384

Adding an IIS server application monitor 384

Modifying an IIS server application monitor 386

Viewing the IIS server application monitor report 386

Nginx server 389

Configuring the Nginx server 389

Adding an Nginx server application monitor 389

Modifying an Nginx server application monitor 391

Viewing the Nginx server application monitor report 391

PHP· 394

Adding a PHP application monitor 394

Modifying a PHP application monitor 395

Viewing the PHP application monitor report 396

Mail server monitor 398

Exchange Server 2003· 398

Adding an Exchange Server 2003 application monitor 398

Modifying an Exchange Server 2003 application monitor 400

Viewing the Exchange Server 2003 application monitor report 400

Exchange Server 2007· 405

Adding an Exchange Server 2007 application monitor 405

Modifying an Exchange Server 2007 application monitor 407

Viewing the Exchange Server 2007 application monitor report 407

Exchange Server 2010· 411

Adding an Exchange Server 2010 application monitor 411

Modifying an Exchange Server 2010 application monitor 414

Viewing the Exchange Server 2010 application monitor report 414

Exchange Server 2013· 417

Adding an Exchange Server 2013 application monitor 418

Modifying an Exchange Server 2013 application monitor 420

Viewing the Exchange Server 2013 application monitor report 420

POP3· 423

Adding a POP3 application monitor 423

Modifying a POP3 application monitor 425

Viewing the POP3 application monitor report 425

SMTP· 427

Adding an SMTP application monitor 427

Modifying an SMTP application monitor 428

Viewing the SMTP application monitor report 429

Web service monitor 431

RESTful Web service· 431

Adding a RESTful Web service application monitor 431

Modifying a RESTful Web service application monitor 432

Viewing the RESTful Web service application monitor report 433

SOAP-based Web service· 434

Adding a SOAP-based Web service application monitor 434

Modifying a SOAP-based Web service application monitor 436

Viewing the SOAP-based Web service application monitor report 436

LDAP service monitor 439

Active Directory service· 439

Adding an AD service application monitor 439

Modifying an AD service application monitor 440

Viewing the AD service application monitor report 441

LDAP service· 444

Adding an LDAP service application monitor 445

Modifying an LDAP service application monitor 446

Viewing the LDAP service application monitor report 447

File/Directory monitor 449

File· 449

Adding a file monitor 449

Modifying a file monitor 452

Viewing the file monitor report 452

Directory· 453

Adding a directory monitor 453

Modifying a directory monitor 456

Viewing the directory monitor report 456

Service monitor 459

SNMP service· 459

Adding an SNMP service application monitor 459

Modifying an SNMP service application monitor 461

Viewing the SNMP service application monitor report 461

DNS service· 463

Adding a DNS service application monitor 463

Modifying a DNS service application monitor 465

Viewing the DNS service application monitor report 465

Java Runtime· 467

Configuring Java Runtime to support RMI access· 467

Adding Java Runtime application monitor 468

Modifying Java Runtime application monitor 469

Viewing Java Runtime application monitor report 470

FTP service· 472

Adding an FTP service application monitor 472

Modifying an FTP service application monitor 474

Viewing the FTP service application monitor report 474

SFTP service· 477

Adding an SFTP service application monitor 477

Modifying an SFTP service application monitor 479

Viewing the SFTP service application monitor report 479

IPMI service· 481

Adding an IPMI service application monitor 481

Modifying an IPMI service application monitor 483

Viewing the IPMI service application monitor report 483

Ping test service· 485

Adding a ping test service application monitor 485

Modifying a ping test service application monitor 488

Viewing the ping test service application monitor report 488

TCP port 489

Adding a TCP Port application monitor 489

Modifying a TCP Port application monitor 491

Viewing the TCP Port application monitor report 491

Ceph· 492

Adding a Ceph application monitor 492

Modifying a Ceph application monitor 493

Viewing the Ceph application monitor report 494

Dell CMC· 496

Adding a Dell CMC application monitor 496

Modifying a Dell CMC application monitor 498

Viewing the Dell CMC application monitor report 498

Ping Command· 499

Adding a Ping Command application monitor 500

Modifying a Ping Command application monitor 501

Viewing the Ping Command application monitor report 501

Common Application· 503

Adding a Common Application application monitor 503

Modifying a Common Application application monitor 504

Viewing the Common Application application monitor report 505

HTTP service monitor 508

URL· 508

Adding a URL application monitor 508

Modifying a URL application monitor 509

Viewing the URL application monitor report 510

URL sequence· 511

Adding a URL sequence application monitor 512

Modifying a URL sequence application monitor 513

Viewing the URL sequence application monitor report 513

Middleware/Portal monitor 516

Office SharePoint 2007· 516

Adding an Office SharePoint 2007 application monitor 516

Modifying an Office SharePoint 2007 application monitor 517

Viewing the Office SharePoint 2007 application monitor report 518

Office SharePoint 2010· 523

Adding an Office SharePoint 2010 application monitor 523

Modifying an Office SharePoint 2010 application monitor 524

Viewing the Office SharePoint 2010 application monitor report 525

Office SharePoint 2013· 529

Adding an Office SharePoint 2013 application monitor 529

Modifying an Office SharePoint 2013 application monitor 530

Viewing the Office SharePoint 2013 application monitor report 531

ActiveMQ·· 535

Adding an ActiveMQ application monitor 535

Modifying an ActiveMQ application monitor 537

Viewing the ActiveMQ application monitor report 537

Hadoop· 539

Adding a Hadoop application monitor 540

Modifying a Hadoop application monitor 542

Viewing the Hadoop application monitor report 542

Oracle GoldenGate· 547

Adding an Oracle GoldenGate application monitor 548

Modifying an Oracle GoldenGate application monitor 550

Viewing the Oracle GoldenGate application monitor report 550

RabbitMQ·· 552

Adding a RabbitMQ application monitor 553

Modifying a RabbitMQ application monitor 554

Viewing the RabbitMQ application monitor report 555

TongLINK/Q·· 558

Adding a TongLINK/Q application monitor 558

Modifying a TongLINK/Q application monitor 559

Viewing the TongLINK/Q application monitor report 560

WebSphere MQ·· 567

Adding a WebSphere MQ application monitor 567

Modifying a WebSphere MQ application monitor 569

Viewing the WebSphere MQ application monitor report 569

SAP monitor 572

Prerequisites· 572

Adding a SAP application monitor 572

Modifying a SAP application monitor 574

Viewing the SAP application monitor report 574

Virtual device monitor 579

Citrix XenServer 579

Adding a Citrix XenServer application monitor 579

Modifying a Citrix XenServer application monitor 580

Viewing the Citrix XenServer application monitor report 581

Hyper-V· 585

Adding a Hyper-V application monitor 585

Modifying a Hyper-V application monitor 587

Viewing the Hyper-V application monitor report 587

KVM·· 590

Adding a KVM application monitor 591

Modifying a KVM application monitor 592

Viewing the KVM application monitor report 592

CAS· 598

Adding a CAS application monitor 598

Modifying a CAS application monitor 599

Viewing the CAS application monitor report 599

PowerCenter 605

Adding a PowerCenter application monitor 605

Modifying a PowerCenter application monitor 606

Viewing the PowerCenter application monitor report 606

VMware ESX· 611

Adding a VMware ESX application monitor 611

Modifying a VMware ESX application monitor 612

Viewing the VMware ESX application monitor report 613

VMware vCenter Server 620

Adding a VMware vCenter Server application monitor 620

Modifying a VMware vCenter Server application monitor 621

Viewing the VMware vCenter Server application monitor report 621

HW FusionCompute· 628

Adding an HW FusionCompute application monitor 628

Modifying an HW FusionCompute application monitor 629

Viewing the HW FusionCompute application monitor report 630

Storage device monitor 639

Common storage device application monitor 639

Adding a common storage device application monitor 639

Modifying a common storage device application monitor 640

Viewing the common storage device application monitor report 641

EMC CLARiiON application monitor 644

Adding an EMC CLARiiON application monitor 645

Modifying an EMC application monitor 646

Viewing the EMC application monitor report 646

HP 3PAR application monitor 651

Adding an HP 3PAR application monitor 651

Modifying an HP 3PAR application monitor 653

Viewing the HP 3PAR application monitor report 653

HP MSA P2000 application monitor 659

Adding an HP MSA P2000 application monitor 659

Modifying an HP MSA P2000 application monitor 660

Viewing the HP MSA P2000 application monitor report 661

HW OceanStor 18500 V3 application monitor 664

Adding an HW OceanStor 18500 V3 application monitor 664

Modifying an 18500 V3 application monitor 665

Viewing the 18500 V3 application monitor report 666

HW OceanStor S3900 application monitor 670

Adding an HW OceanStor S3900 application monitor 670

Modifying an HW OceanStor S3900 application monitor 672

Viewing the HW OceanStor S3900 application monitor report 672

IBM Storwize V5000 application monitor 676

Adding an IBM Storwize V5000 application monitor 677

Modifying an IBM Storwize V5000 application monitor 678

Viewing the IBM Storwize V5000 application monitor report 678

IBM Storwize V7000 application monitor 682

Adding an IBM Storwize V7000 application monitor 682

Modifying an IBM Storwize V7000 application monitor 683

Viewing the IBM Storwize V7000 application monitor report 684

H3C P5730 application monitor 687

Adding a P5730 application monitor 687

Modifying a P5730 application monitor 689

Viewing the P5730 application monitor report 689

Hitachi VSP application monitor 696

Adding a Hitachi VSP application monitor 696

Modifying a Hitachi VSP application monitor 697

Viewing the Hitachi VSP application monitor report 698

EMC VMAX 100K application monitor 700

Adding an EMC VMAX 100K application monitor 701

Modifying an EMC VMAX 100K application monitor 702

Viewing the EMC VMAX 100K application monitor report 702

APM service report 706

Realtime reports· 706

Application health reports· 706

Application available reports· 707

Scheduled reports· 708

Adding a scheduled report 708

Configuration examples· 711

Configuration example 1· 711

Network diagram·· 711

Configuration consideration· 712

Configuration procedure· 712

Configuration example 2· 715

Network diagram·· 715

Configuration consideration· 716

Configuration procedure· 716

 


Application Manager overview

Intelligent Management Center (IMC) is a converged network management product that manages resources, users, and services. It provides network management solutions based on the IMC platform and service components.

Application Manager (APM) is a resource component of IMC that monitors applications in a data center. During the monitor process, APM collects monitor index data and then generates application monitor reports. You can use the monitor reports to locate application performance bottlenecks and ensure available, reliable, and continuous services. The collected monitor data can also be used for further analysis of other IMC services.

Application scenario

As shown in Figure 1, applications are deployed on each server in the server clusters to provide services to users. APM is located on the network to monitor these applications.

Figure 1 Network diagram

APM F1.png

 

Applications monitored by APM

This section describes applications that can be monitored by APM, common monitor, and specific monitor.

Monitored applications

Table 1 lists applications that can be monitored by APM.

Table 1 Available applications

Category

Application Type

Windows Server

Windows XP

Windows Server

Windows Performance Counter

Unix Server

AIX UNIX

FreeBSD

OpenBSD

HP-UX

Solaris

MAC OS

SCO Unix

AS400

Linux server

Linux

Kylin

Rocky

Database server

MySQL

Oracle

MS SQL

Sybase

IBM DB2

PostgreSQL

Informix

Oracle ASM

DM

Cache

Database Query

xugu

MongoDB

MemCached

Application server

Microsoft .NET

JBoss

Tomcat

WebLogic

Oracle AS

WebSphere

GlassFish

Lotus Domino

Lync 2010

Lync 2013

Jetty

Domino Server Authentication Application Monitor

Web server

Apache

IIS

Nginx

PHP

Mail server

Exchange2003

Exchange2007

Exchange2010

Exchange2013

SMTP, POP3 mail server

Middleware

Office SharePoint 2007

Office SharePoint 2010

Office SharePoint 2013

WebSphere MQ

Active MQ

TongLINK/Q

Oracle GoldenGate

Hadoop

RabbitMQ

HTTP service

URL monitor

URL Sequence

WEB service

SOAP

REST

LDAP service

ActiveDirectory

Common LDAP

File system

File

Directory

Common Services

SNMP

DNS

Ping Test Monitor

JVM

FTP/SFTP

TCP Port

Ceph

IPMI

SAP

SAP

Virtual Machine

Hyper-V

KVM

VMware ESX

CAS

Citrix Xen

VMware vCenter Server

FusionCompute V100R005C00SPC300

Storage

HP MSA P2000

IBM V5000

Huawei S3900

IBM V7000

HP 3PAR

H3C P5730

EMC CLARiiON

HW OceanStor 18500 V3

 

Applications monitored by APM include operating systems, databases, application servers, services, and middleware. These applications provide key services for enterprises and organizations.

After an operator adds applications to APM, APM collects monitor data and evaluates the availability and health status of the applications.

Application monitor includes common monitor and specific monitor based on the application scope. APM can monitor most mainstream network applications by using common monitor and specific monitor.

Common monitor

Use common monitor to monitor the availability and health status of one class of applications based on their common characteristics. For example, you can use POP3 and SMTP application monitors to monitor multiple email systems that provide POP3 service and SMTP service.

Specific monitor

Use specific monitor to monitor the availability and health status of one type of application based on its specific indexes. Specific monitor gets more application index data than common monitor. You can implement in-depth monitoring on applications through specific monitor, such as Exchange 2003 application monitor and Exchange 2007 application monitor.

Application monitor mode

Before APM monitors applications, make sure the APM server and the hosts where applications are deployed can reach each other.

APM monitors applications in local or remote mode.

Remote monitor

APM accesses an application to obtain monitor index data by using SSH, Telnet, SNMP, WMI, JMX, API, or JDBC, as shown in Figure 2.

Figure 2 Remote monitor

APM F2.png

 

Local monitor

In this mode, you must deploy an APM agent on the host where the application is deployed. The APM agent obtains monitor index data of the application by using SSH, Telnet, SNMP, WMI, JMX, API, or JDBC. APM periodically communicates with the APM agent by using Agent messages to obtain monitor index data.

Figure 3 Local monitor

APM F3.png

 

Local monitor enhances data security and can collect monitor index data that remote monitor cannot (for example, Oracle database error log files). However, local monitor supports monitoring fewer types of applications.

Monitor method

Table 2 Monitor method

Monitor method

Default port

Description

SSH/Telnet (CLI)

·     TCP 23 (for Telnet)

·     TCP 22 (for SSH)

APM accesses the Linux or Unix OS by using Telnet or SSH, and executes commands to obtain monitor index data.

SNMP

UDP 161

Simple Network Management Protocol (SNMP) is supported by most operating systems and network devices. APM uses the SNMP agent deployed on the host to obtain monitor index data of the host. The default listening port cannot be modified.

WMI

TCP 135

Windows Management Instrumentation (WMI) is a core management technology that allows APM to collect monitor indexes from applications such as a Windows, IIS, .NET server, and AD directory.

JMX

TCP 1099

Java Management Extensions (JMX) provides a platform for managing applications, devices, and systems. APM collects Tomcat and JBoss monitor index data by using JMX.

JDBC

N/A

Java Database Connectivity (JDBC) is a Java API to execute SQL statements and provide access to multiple types of relation databases.

API

N/A

Application Programming Interface (API) includes predefined functions. APM uses the predefined functions to obtain monitor index data of applications.

 

APM monitor features

APM provides operators with the functions described in this section to monitor the applications.

Application monitor management

One of the functions that APM uses to monitor applications is through the application monitor management function. Once collected, the information can be displayed in different views based on your needs.

Figure 4 Application monitor and views

未命名.PNG

 

As shown in Figure 4, APM supports the following views:

·     Application monitorDisplays the collection of application parameters and background monitor processes. Background monitor processes obtain application indexes by using the application parameters. APM periodically collects application monitor indexes by using application monitors and analyzes data based on host monitor, class monitor, and custom view.

·     Host monitorAnalyzes and assesses the availability and health status of the host on which the applications run. APM provides host overview and a host monitor list.

·     Class monitorDisplays the health status for each class and each application type which is predefined in APM. An application class includes one or more application types. For more information, see Table 1.

·     Custom viewAllows you to customize a view as needed. You can add monitor indexes of different applications to one view to monitor indexes you focus on.

For more information, see "Monitor management."

Topology and application group management

Topology is closely related with application group management in APM.

·     Topology

APM displays the physical relationship and logical relationship among applications, access devices, and physical networks in a topology. Also, APM displays the availability and health status of applications in the topology. Typically, directly related applications are used together to provides a single service. For example, a website service can use the following applications: Linux, Apache, MySQL, and PHP. These applications are related to each other and any failure among them can affect the service operation. The topology visualizes the physical relationship and logical relationship among applications, access devices, and physical networks. This is convenient for operators to promptly locate problems and evaluate affected areas to save problem-solving time.

·     Application group management

Application group management allows operators to organize application monitors into several groups by function or purpose, and assign management authorities for the application monitor groups to different application administrators. Application group management simplifies the topology by displaying only the applications of the specified group rather than all applications.

For more information, see "Topology and application group management."

Agent management

In local monitor mode, an APM agent collects monitor index data from the host where the agent is deployed. APM periodically communicates with the agent by using Agent messages to obtain monitor index data.

The agent management feature allows you to manage agents deployed on hosts. You can also download, batch install, and upgrade APM agents. For more information, see "APM agent management."

Configuration management

The APM configuration management functions allow you to manage the activated alarm conditions, ports, probes, and system parameters.

·     Threshold ManagementAllows you to configure index value thresholds that, once reached, trigger a related alarm in the Alarm module of the IMC platform. You can configure the index name, Level-1 thresholds, and Level-2 thresholds.

·     Baseline ConfigurationAllows you to enable baseline function for an index and configure alarms levels. APM calculates index data in the most recent week of an index to obtain the baseline value. If the baseline function is enabled for an index and the baseline value is reached, APM triggers an alarm in the Alarm module of the IMC platform.

·     Port Configuration—Allows you to configure the application monitor port and traffic statistics port of an application. APM uses the application monitor port to monitor an application in remote monitor mode, and uses the traffic statistics port to collect traffic statistics. The traffic statistics port is also used by applications to provide services.

·     Probe ConfigurationAllows you to configure probes for APM to periodically collect application data and displays the data in monitor reports. Probe refers to a server where the probe application is deployed. Probe analyzes traffic of applications together with the mirroring function based on the application's IP address or the combination of IP address and port. You can configure the IP address and authentication password of a probe.

·     Parameter ConfigurationAllows you to configure APM system parameters. You can configure the lifetime for various types of data and the color RGB value indicating alarm level.

·     Template ConfigurationAllows you to configure the agent and application templates. These templates enable you to install agents and add application monitors in a simplified way. You can configure host information used for agent installation in an agent template, and configure application access parameters used for adding an application monitor.

For more information, see "Configuration management."

Widget management

To facilitate administrator use, APM provides the following types of Widget functions:

·     Application Topology—Displays applications, hosts, access devices, physical networks, and their relationships in a topology.

·     Application MonitorMonitors application availability and health status based on performance indexes.

·     Host MonitorMonitors operating system availability and health status for the host on which an application runs.

For more information, see "Application data display."

Application management report

IMC can generate reports based on application management report templates provided by APM. APM provides the following templates:

·     Health status reportDisplays the health status of applications monitored by APM.

·     Availability reportDisplays the availability statistics of applications monitored by APM.

IMC can generate realtime reports and scheduled reports based on the templates. Realtime reports are available to operators at any time. Scheduled reports can be emailed to operators for archiving. For more information about the report function of the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.


Quick start

When you use APM for the first time, read this chapter to obtain necessary guidelines.

Accessing APM

IMC provides the following APM access modes:

·     Classic—Log in to the classic IMC interface (default access mode). You can access APM functions through the navigation menu.

·     Desktop—Log in to the Web desktop. You can add APM functions to the Web desktop as applications, and then click the application icons to use APM functions.

You can select the access mode on the IMC login page or on the upper right of an IMC operation page. This guide describes APM functions in classic mode.

Classic mode

In classic mode, you can access APM functions through the navigation menu. APM provides a breadcrumb navigation menu and a navigation tree, which have the same navigation menu options (see "APM navigation menu options").

·     Breadcrumb navigation menuPoint to a menu option to display the submenu.

·     Navigation tree—Click a menu option to display the submenu.

Unless otherwise stated, operation procedures in this guide use the navigation tree.

Breadcrumb navigation menu

As shown in Figure 5, the APM breadcrumb navigation menu has two levels.

Figure 5 Breadcrumb navigation menu

 

APM navigation tree

Figure 6 shows the APM navigation tree.

To expand the navigation menu:

1.     Click the Resource tab.

2.     From the navigation tree, click Application Manager.

Figure 6 APM navigation tree

 

APM navigation menu options

Table 3 APM navigation menu options

Item

Function

Quick Start

Displays the quick start page that provides operation links for auto discovery, adding applications, and application monitors. You can click these links to quickly add application monitors.

Custom View

Displays the custom view page. You can view, add, modify, and delete custom views on the page. Also, you can view custom view reports.

Application Monitor

Displays the application monitor page. You can query, add, modify, and delete application monitors on the page. Also, you can view application monitor reports.

Application Topology

Displays the application topology window. You can view the connection relationship between applications, hosts, access devices, and physical networks. Also, you can view dependencies between applications, health status of applications and hosts, and availability of applications and hosts.

Host Monitor

Displays the host monitor page. This page includes the Host tab and List tab. By default, the Host tab is displayed.

·     The Host tab displays the health status and availability of applications running on all hosts.

·     The List tab displays the CPU usage, memory usage, availability, and health status of operating systems on all hosts.

Class Monitor

Displays the class monitor page. You can view the health status and availability of each application type on this page. An application type includes multiple applications. The health status of an application type is determined by the worst health status of all applications.

Application Group

Displays the application group page. You can view, add, modify, and delete application groups on this page. Point to the Expand icon  to view the application group shortcut menu.

Add Application

Displays the page for adding applications. It is the shortcut menu for adding applications on the application monitor page.

Auto Discovery

Displays the auto discovery page. Operators who use APM for the first time can quickly add applications by using the auto discovery function.

Agent Management

Displays the agent management page. You can download, install, and delete APM agents on this page.

Configurations

Displays the Configurations page. Configuration management includes the following contents:

·     Threshold Configuration—Allows you to manage the default threshold configuration for application monitor indexes.

·     Baseline ConfigurationAllows you to manage baseline configuration for application monitor indexes.

·     Port Configuration—Allows you to manage the default mappings between applications and application monitor ports, as well as traffic statistics ports.

·     Probe Configuration—Allows you to view, add, modify, and remove probes.

·     Parameter ConfigurationAllows you to manage APM service parameters.

·     Template ConfigurationAllows you to manage application templates and APM agent templates.

 

Desktop mode

Figure 7 shows the APM desktop version. You can click Add application to add applications to APM.

Figure 7 Web desktop

 

Table 4 shows the supported APM applications.

Table 4 Supported APM applications

Item

Function

Quick Start

Displays the quick start page that provides operation links for auto discovery, adding applications, and application monitors. You can click these links to quickly add application monitors.

Custom View

Allows you to view, add, modify, and delete custom views on the page. Also, you can view custom view reports.

Application Monitor

Allows you to query, add, modify, and delete application monitors. Also, you can view application monitor reports.

Application Topology

Allows you to view the application topology and perform operations on the topology.

Host Monitor

Allows you to view host information. This page includes the Host tab and List tab. By default, the Host tab is displayed.

·     The Host tab displays the health status and availability of applications running on all hosts.

·     The List tab displays the CPU usage, memory usage, availability, and health status of operating systems on all hosts.

Class Monitor

Allows you to view the health status and availability of each application type.

Application Group

Allows you to view, add, modify, and delete application groups.

Add Application

Allows you to add application monitors.

Auto Discovery

Automatically discovers applications on the network.

Agent Management

Allows you to download, install, and delete APM agents.

Configurations

Configuration management includes the following contents:

·     Threshold ConfigurationManage the default threshold configuration for application monitor indexes.

·     Baseline ConfigurationManage baseline configuration for application monitor indexes.

·     Port ConfigurationManage the default mappings between applications and application monitor ports as well as traffic statistics ports.

·     Probe ConfigurationView, add, modify, and remove probes.

·     Parameter ConfigurationManage APM service parameters.

·     Template ConfigurationManage application templates and APM agent templates.

 

APM perspectives

You can access APM from the following perspectives:

·     Default Perspective—Log in to IMC in classic mode, or select the Default Perspective from the perspectives menu after you log in to IMC. For more information about the classic mode, see Classic mode.

·     Desktop View—Log in to IMC in desktop mode, or select the Default Perspective from the perspectives menu after you log in to IMC. For more information about the desktop mode, see Desktop mode.

·     Application Manager Perspective—In this perspective, IMC displays only APM related functions, including application management, topology, alarm, device management, and system management functions. Other components and part of the IMC PLAT functions are not displayed.

·     Tenant Self Maintenance Perspective—In this perspective, IMC displays functions that are available to tenants according to the configured tenant privileges.

Application manager perspective

To open the application manager perspective:

1.     Log in to the classic IMC interface.

2.     Click the perspective switching icon , and then select the Application Manager Perspective from the popup menu.

Figure 8 Application manager perspective

 

Tenant self maintenance perspective

To open the tenant self maintenance perspective:

1.     Log in to the classic IMC interface.

2.     Click the perspective switching icon , and then select the Tenant Self Maintenance Perspective from the popup menu.

Figure 9 Tenant self maintenance perspective

 

Quick start guidelines

APM can monitor applications in remote or local mode.

Remote monitor

To monitor applications in remote mode, APM must access the network to obtain application index data. Operators can use APM to quickly monitor applications on the network by following the flow as shown in Figure 10.

Figure 10 Remote monitor flowchart

 

Preparations

Before you monitor an application, complete the following tasks:

1.     Obtain general information related to the target application. General information includes:

¡     Application type

¡     Host IP address of the application

¡     Dependencies with other applications

¡     Telephone number, email, and other contact information for the administrators who manage the application

2.     Add the host on which the target application resides to the IMC platform. For more information, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

3.     Complete necessary configuration if the target application is of any of the following types:

¡     JBoss Server

¡     Apache Server

¡     Tomcat AS Server

¡     WebLogic AS Server (8.1)

¡     Oracle AS Server

¡     Java Runtime

¡     SAP

Auto Discovery

Using Auto Discovery, APM automatically detects applications running on the target hosts and adds application monitors. Adding application monitors through Auto Discovery includes the following phases:

·     Application discovery phase—APM detects applications running on the target hosts based on port-to-application mappings.

·     Adding application monitor phaseOperators add application monitors to APM based on the auto discovery result.

Not all applications supported by APM can be detected. To monitor an application that cannot be automatically detected, manually add the application to APM (see "Adding an application"). To detect applications correctly, you can modify the mappings between applications and application monitor ports in port configuration (see "Configuration management").

Table 5 provides the applications that can be automatically detected and their default application monitor ports.

Table 5 Applications that can be automatically detected in remote monitor mode

Class

Type

Application monitor port

Windows Server Monitor

Windows

TCP-135

Unix Server Monitor

AIX

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

FreeBSD

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

OpenBSD

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

HP-UX

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

SCO UNIX

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

Solaris

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

Mac OS

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

Linux Server Monitor

Linux

·     TCP-22 (SSH)

·     TCP-23 (Telnet)

Database Server Monitor

SQL Server

TCP-1433

MySQL

TCP-3306

Oracle

TCP-1521

DB2

TCP-50000

DBQuery

TCP-50000

Informix

TCP-9088

PostgreSQL

TCP-5432

Sybase

TCP-5000

Application Server Monitor

.NET Server

TCP-135

JBoss Server

TCP-1099

Tomcat Server

TCP-1099

Lync 2010 Server

TCP-135

Lync 2013 Server

TCP-135

Glassfish Server

TCP-8686

Jetty Server

TCP-8443

Lotus Domino Server

TCP-63148

Oracle Application Server

TCP-8888

WebLogic Server

TCP-7001

WebSphere Server

TCP-8880

Web Server Monitor

Apache Server

TCP-80

IIS Server

TCP-80

PHP

TCP-80

Mail Server Monitor

Exchange 2003

TCP-135

Exchange 2007

TCP-135

Exchange 2010

TCP-135

POP3

TCP-110

SMTP

TCP-25

Middleware Monitor

Office SharePoint 2007

TCP-135

Office SharePoint 2010

TCP-135

Office SharePoint 2013

TCP-135

Active MQ

TCP-1199

WebSphere MQ

TCP-1414

HTTP Service Monitor

URL

TCP-80

LDAP Service Monitor

Active Directory

TCP-135

LDAP Service

TCP-389

Service Monitor

SNMP

UDP-161

FTP

TCP-21

SFTP

TCP-22

DNS

TCP-53

Java Runtime

TCP-1099

Storage device monitor

HP MSA P2000

TCP-5989

 

To use auto discovery to add an application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Auto Discovery.

The Application Discovery page opens.

3.     Click Add.

The Select Devices dialog box opens.

You can locate target hosts by clicking the By View or Advanced tab. For information about selecting devices, see "Selecting devices."

4.     Click Start on the Application Discovery page.

APM starts detecting the applications running on the selected hosts and displays the detection result list.

It might take a long time if APM detects multiple target hosts. To finish the automatic detection, click End during the application detection.

5.     In the detection result list, click Add to Monitor of the application you want to monitor, and then set application monitor parameters.

6.     Click OK.

Adding an application

Perform this task to add applications to APM that cannot be detected through auto discovery.

To add an application:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Add Application.

3.     Click the type link for the target application.

4.     Set application monitor parameters.

5.     Click OK.

Application monitor

APM obtains application index data at an interval and displays data in a monitor report or custom view report for operators. Operators can set alarm thresholds and enable the data baseline function based on the collected data as needed.

If IMC SHM is also deployed on the APM server, operators can use the index data obtained by APM to generate SLA in SHM.

Local monitor

To monitor applications in local mode, APM must obtain application index data by using an APM agent. Figure 11 shows the local monitor flowchart.

Figure 11 Local monitor flowchart

 

Preparations

Before you monitor an application, complete the following tasks:

1.     Verify that an APM agent can obtain data of the application to be monitored.

Table 6 Applications that can be monitored by an APM agent

Class

Type

Remarks

Windows Server Monitor

Windows

The following operating systems are supported:

·     Windows XP

·     Windows Server 2003

·     Windows Server 2008

·     Windows Server 2012

Windows Performance Counter

N/A

Linux Server Monitor

Linux

Red Hat

Database Server Monitor

SQL Server

SQL Server 2000/2005/2008

MySQL

MySQL 5.x

Oracle

Oracle Database 8.x/9i/10g/11g

DB2

DB2/NT 8.2.0

PostgreSQL

PostgreSQL 9.3.1

Sybase

Sybase Adaptive Server Enterprise 12.5.2 and later versions

Application Server Monitor

.NET Server

All versions

JBoss Server

JBoss Application Server 4.x/5.0.1

Tomcat Server

Tomcat 5.x/6.x/7.0

Lync 2010 Server

Lync Server 2010

Glassfish Server

GlassFish 3.x

Jetty Server

Jetty 9.0.5

Lotus Domino Server

Lotus Domino 9.x

WebLogic Server

WebLogic 9.x/10.x

Web Server Monitor

IIS Server

IIS 6.0

Mail Server Monitor

Exchange 2003

Exchange 2003

Exchange 2007

Exchange 2007

Exchange 2010

Exchange 2010

Middleware Monitor

Office SharePoint

Office SharePoint 2007

Active MQ

ActiveMQ 5.8.0

LDAP Service Monitor

Active Directory

Active directory deployed on Windows Server 2003/2008

File/Directory Monitor

File

N/A

Directory

N/A

Service Monitor

Java Runtime

N/A

Virtual Device Monitor

Hyper-V

Hyper-V 2012

KVM

KVM 0.9.3

 

2.     Obtain general information related to the target application. General information includes:

¡     Application type

¡     Host IP address of the application

¡     Dependencies with other applications

¡     Telephone number, email, and other contact information for the administrators who manage the application

3.     Complete the necessary configuration if the target application is Tomcat AS Server or Java Runtime.

Installing an APM agent

Operators can install an APM agent on a target host locally or remotely. APM agents can be deployed only on Windows and Linux.

Auto discovery

Auto discovery in local monitor mode takes effect only on hosts where an APM agent is deployed.

The APM agent automatically locates applications when it starts up and reports the discovery result to the APM server.

Adding an application

Operators can view the auto discovery results reported by APM agents and add applications to APM as needed.

Application monitor

APM obtains application index data at an interval and displays data in a monitor report or custom view report for operators. Operators can set alarm thresholds and enable the data baseline function based on the collected data as needed.

If IMC SHM is also deployed on the APM server, operators can use the index data obtained by APM to generate SLA in SHM.

Quick service process

The quick service process provides a quick guide to use APM.

To open the quick service process view:

1.     Select Quick Service Process from the View list in the top right corner of the IMC home page.

2.     In the Select Template Category area, select Application Manager.

The quick service process view for APM opens, as shown in Figure 12.

Figure 12 Quick service process

 

The page includes the following areas:

¡     Application MonitoringClick Start to monitor an application. You can also click the icons in this area to add an application monitor.

¡     Monitor Management—Click an icon to manage application monitors.

Application monitor report

After adding an application monitor to the monitoring list, APM collects and analyzes the monitored application indexes, and displays the index and performance data in a monitoring report.

Viewing the monitoring report

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

All application monitors are displayed on the Application Monitor page.

3.     Click the name of the desired application monitor.

APM displays the monitoring report. The report will be updated at the polling interval configured when the application monitor was added.

The following example is a monitoring report of the Windows application monitor. Fields on the monitoring report vary by application type.

Figure 13 Windows application monitor report

total.png

 

Pie chart

The pie chart shows the proportion of application availability states. Point to a section of the pie chart to view the percentage of each availability state, as shown in Figure 14.

Figure 14 Pie chart

可用性.PNG

 

Dashboard

Typically, the dashboard shows CPU or memory indexes. Data in the middle of the dashboard is collected from the most recent APM poll of the application, as shown in Figure 15. You can click the Dashboard icon  to switch to the trend graph.

Figure 15 Dashboard

仪表盘.PNG

 

Trend graph

Typically, the trend graph shows the change trend of indexes in the last hour. Point to a time to view the data from that period, as shown in Figure 16. When the trend graph shows the change trend for multiple indexes, you can click an index legend name to hide the change trend for the index.

Figure 16 Trend graph

trend.PNG

 

Horizontal bar chart

The horizontal bar chart shows the disk or file system index. Point to the horizontal bar chart to view the disk usage collected when APM most recently polled the application, as shown in Figure 17.

Figure 17 Horizontal bar chart

 

List

The list shows multiple indexes for processes and services. Typically, a maximum of 10 entries are displayed in a list by default. To view more entries, click More, as shown in Figure 18.

Figure 18 List

 

Icons

·     Refresh

Click the Refresh icon icon_refresh_16x16.png to refresh data in the report. By default, the report displays data collected when APM most recently polled the application. To prevent data from being frequently refreshed, the icon disappears for several seconds after you click it.

·     Refresh icon in a specific area

Click the Refresh icon icon_refresh_16x16.png to refresh data in the area.

·     Health State

Click the Health State icon icon_health_orange_16x16.png to view the health status of the application. By default, the report shows the health status of the application collected when APM most recently polled the application. For more information about the health status, see "Monitor management."

·     Weekly History

Click the Weekly History icon icon_history_last_7_day_16x16.png to view availability statistics of the application in the most recent 7 days. The data is collected hourly. You can point to the chart to view the percentage of availability states for a specific time period.

Figure 19 Weekly History

7天历史.PNG

 

·     Monthly History

Click the Monthly History icon icon_history_last_30_day_16x16.png to view availability statistics of the application in the most recent 30 days. The data is collected daily. You can point to the chart to view the percentage of availability states on a specific day.

Figure 20 Monthly History

 

·     Set Threshold

Click the Set Threshold icon to set alarm thresholds for the application, as shown in Figure 21. When the specified threshold is reached, APM generates an alarm. For information about configuring alarm thresholds, see "Configuration management."

Figure 21 Set Threshold

 

·     History Record

Click the History Record icon to view the history trend of the application in a line graph. The time range can be Last 1 Hour icon_history_last_1_hour_16x16.png, Last 6 Hours icon_history_last_6_hour_16x16.png, Today icon_history_today_16x16.png, Yesterday icon_history_yesterday_16x16.png, This Week icon_history_this_week_16x16.png, This Month icon_history_this_month_16x16.png, or This Year icon_history_this_year_16x16.png.

¡     Data for the last 1 hour, the last 6 hours, and today are collected at the polling interval. Figure 22 shows the trend for the last 1 hour.

¡     Data for yesterday, this week, and this month are collected hourly. The graph also displays the maximum, minimum, and average values. Figure 23 shows yesterday's trend.

¡     Data for this year is collected daily. The statistics graph also displays the maximum, minimum, and average values. Figure 24 shows this year's trend.

Figure 22 Trend for the last 1 hour

 

Figure 23 Trend for yesterday

 

Figure 24 Trend for this year

 

·     Time range of the trend graph

To set the time range for the trend graph, click the Last 1 Hour icon icon_history_last_1_hour_16x16.png, Last 6 Hours icon icon_history_last_6_hour_16x16.png, Today icon icon_history_today_16x16.png, Yesterday icon icon_history_yesterday_16x16.png, This Week icon icon_history_this_week_16x16.png, This Month icon icon_history_this_month_16x16.png, or This Year icon icon_history_this_year_16x16.png.

·     Dashboard/Trend graph

Click the Dashboard icon  or the Trend Graph icon  to display index data in a dashboard or trend graph.

·     Configure

Click the Configure icon to configure indexes to be monitored. APM obtains monitored index data when APM polls the application next time. Typically, the Configure icon is located in the Process or Service area.

Common operations

Common APM operations include the following:

·     Selecting devices

·     Sorting a list

These operations are also applicable to other IMC components.

Selecting devices

Use this function to select hosts running applications so that APM can perform auto discovery and add application monitors. From the Select Devices window, you can filter hosts by view or advanced query.

Figure 25 Selecting devices

 

Filtering devices by view

1.     In the Query Conditions area, click the By View tab.

2.     Click the Expand icon  to the left of the IP view, device view, or custom view, and then select a subview.

All devices in the subview are displayed in the Devices Found area.

Filtering devices by advanced query

1.     In the Query Conditions area, click the Advanced tab.

2.     Specify one or more of the following query criteria:

¡     Device IP—Enter an IPv4 or IPv6 address of the device.  

If Exact Query is selected, enter a complete IPv4 or IPv6 address.

If Exact Query is not selected, enter a partial or complete IPv4 or IPv6 address. For example, if you enter 192.168, all devices whose IP addresses contain 192.168 are queried.

¡     Device IP List—Specify multiple IP addresses to be queried.

Click the Device IP List Configuration icon . The Device IP List Configuration window opens. Enter one or multiple device IP addresses in the Input Device IP field, and then click Add to add the entered IP addresses to the Device IP List field. (To enter multiple IP addresses, enter one IP address on each line.) Repeat the steps above to add all device IP addresses to be queried. To delete an IP address in the Device IP List field, select the IP address and then click Delete. Click OK to complete the operation. Make sure the device IP addresses to be queried have been added to the Device IP List field. To clear the Device IP List field, click the Clear icon .

¡     Device Label—Enter a partial or complete device label. For example, if you enter db, all devices with device labels that contain db are queried.

¡     Device Status—Select a device state from the list.

¡     Device Category—Select a device type from the list.

¡     Device Series—Select a device series from the list.

¡     Contact—Enter partial or complete contact information for the devices. For example, if you enter Bob, all devices with contact information that contains Bob are queried.

¡     Location—Enter partial or complete location information for the devices. For example, if you enter lab, all devices with location information that contains lab are queried.

¡     Device Reachability—Select a reachability state from the list: Reachable or Unreachable.

Empty fields are ignored.

3.     Click Query.

All matching devices are displayed in the Devices Found area.

Selecting devices

1.     Add devices to the Selected Devices area.

¡     To add one or more devices, select the devices in the Devices Found area, and then click the Add icon icon_down_20x20.png.

¡     To add all devices, click the Add all icon icon_bottom_20x20.png.

2.     Remove undesired devices from the Selected Devices area.

¡     To remove one or more devices, select the devices in the Selected Devices area, and then click the Remove icon icon_up_20x20.png.

¡     To remove all devices, click the Remove all icon icon_top_20x20.png.

3.     Click OK.

 

 

NOTE:

If only one device is found, the window does not include the Add all icon icon_bottom_20x20.png and the Remove all icon icon_top_20x20.png.

 

Sorting a list

If a list contains a large number of items (as shown in Figure 26), use the following aids to navigate the list:

·     Select 8, 15, 50, 100, or 200 at the lower right of the list to set the number of items you want to display per page.

·     Click the Next Page icon  to page forward in the list.

·     Click the Last Page icon  to page forward to the end of the list.

·     Click the Previous Page icon  to page backward in the list.

·     Click the First Page icon  to page backward to the beginning of the list.

·     Click a page number to display the specified page.

If the list contains more than 10 pages, click a large page number to display the remaining page numbers. For example, click page 8 to display page 11 and the rest.

Figure 26 Application monitor list

 

If a list contains a large number of fields (as shown in Figure 27), you can sort a list by every field that contains a Sort icon  in the column label:

·     When the list is sorted by a field in ascending order, the column label of the selected field is blue and contains an Ascending icon .

·     When the list is sorted by a field in descending order, the column label of the selected field is blue and contains a Descending icon .

Figure 27 Sorting an application monitor list

 


Monitor management

Monitor management in APM allows you to collect performance indexes, health statuses, and availability of applications, and provides analysis and statistics reports based on this information in various views. Important concepts and terms in monitor management include:

·     MonitorEmploys a background program to collect application index data by using a set of access parameters and to analyze the health status and availability for the application.

·     Host monitorOrganizes applications by host and displays the availability and the health status of each application.

·     Class monitorOrganizes applications by class and type and displays the health status of each application type.

·     Custom ViewDisplays the performance and health status of monitored applications.

Application monitor

All monitors in APM are defined as application monitors. APM provides the ability to query, add, modify, and delete the application monitors, as well as the ability to customize the application monitor list, manage/unmanage an application monitor, poll the monitored applications, and view associated applications and root cause analysis.

You can view the management status, availability, health status, and traffic statistics of applications through the application monitor list.

An application monitor has the following statuses:

·     Management status—Whether APM attempts to collect monitor indexes from the target application. The state can be Managed or Unmanaged. For applications in Managed state, APM attempts to collect their monitor indexes in each polling period. For applications in Unmanaged state, APM does not collect their monitor indexes. By default, the management status of an application is Managed.

·     Availability—State of the connection between the target application and APM. States include:

¡     Available—APM can connect with the target application and collect the specified monitored indexes.

¡     Inaccessible—APM can connect with the target application but cannot collect the specified monitored indexes. This status can trigger a critical alarm.

¡     Unavailable—APM cannot connect with the target application. This status can trigger a critical alarm.

¡     Unmanaged—The target application is not monitored by APM. If the management state is Unmanaged, the availability of the application also becomes Unmanaged.

·     Health Status—Evaluation result of the target application. By default, the states include:

¡     Healthy—The application is available and all indexes collected by APM do not meet the condition of a Level-1 threshold.

¡     Minor—The application is available but APM cannot collect partial monitored indexes. This health status can trigger a minor alarm.

¡     Major—The application is available and the monitored indexes collected by APM meet the condition of a Level-1 threshold. This health status can trigger a major alarm.

¡     Critical—The application is available and the monitored indexes collected by APM meet the condition of a Level-2 threshold, or the application is unavailable. This health status can trigger a critical alarm.

¡     Unknown—The application is inaccessible or unmanaged. This health status is represented by two consecutive hyphens (--) in APM.

You can modify the alarm severity level for the Level-1 Threshold Alarm of Application Management and Level-1 Threshold Alarm of Application Management traps. APM will send related alarms and calculate the health status according to the modified alarm severity levels. To modify the alarm severity level, navigate to Trap Management > Trap Definition of the IMC PLAT. For more information, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

Table 7 Relationship among management state, availability, and health status

Management status

Availability

Health status

 

Managed

icon_availability_green_16x16.png Available

icon_health_green_16x16.png Healthy

 

icon_health_yellow_16x16.png Minor

 

icon_health_orange_16x16.png Major

 

icon_health_red_16x16.png Critical

icon_availability_red_16x16.png Unavailable

 

icon_availability_yellow_16x16.png Inaccessible

icon_health_gray_16x16.png Unknown

 

Unmanaged

icon_availability_gray_16x16.png Unmanaged

 

 

Viewing the application monitor list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors. Information on the list was obtained when APM last polled the monitored applications.

Application monitor list contents

¡     Name—Name of the application monitor. Click the name to view the monitoring report for the monitored application.

¡     Application TypeType of the monitored application. Click the link for the application type to filter out other types of monitored applications. For more information about application type management, see "Application Manager overview."

¡     Host—IP address of the host on which the monitored application resides. This field is not displayed by default.

¡     Agent CollectionUse the APM agent to collect application index data. This field is not displayed by default.

¡     Speed (bps)—Total receiving and sending rate of the application, in bps. Point to the icon to view the historical records of Rx (bps) and Tx (bps). This field is displayed only when probes are configured for APM. For information about configuring probes, see "Configuration management."

¡     Rx (bps)—Receiving rate of the application, in bps. This field is not displayed by default.

¡     Tx (bps)—Sending rate of the application, in bps. This field is not displayed by default.

¡     Traffic (H)—Total traffic received and sent by the application in the last hour. This field is not displayed by default.

¡     In Traffic (H)—Traffic received by the application in the last hour. This field is not displayed by default.

¡     Out Traffic (H)—Traffic sent by the application in the last hour. This field is not displayed by default.

¡     Traffic (D)—Total traffic received and sent by the application today. This field is not displayed by default.

¡     In Traffic (D)—Traffic received by the application today. This field is not displayed by default.

¡     Out Traffic (D)—Traffic sent by the application today. This field is not displayed by default.

¡     Description—Description about the application monitor.

¡     Availability—Availability of the application. The availability can be icon_availability_green_16x16.png (Available), icon_availability_red_16x16.png(Unavailable), icon_availability_yellow_16x16.png (Inaccessible), or icon_availability_gray_16x16.png (Unmanaged). Point to the icon to view the application availability represented by different colors for the last hour.

¡     Health—Health status of the application. The health status can be icon_health_green_16x16.png (Healthy), icon_health_yellow_16x16.png (Minor), icon_health_orange_16x16.png (Major), icon_health_red_16x16.png (Critical), or icon_health_gray_16x16.png (Unknown). Point to the icon to view the application health status represented by different colors in the last hour.

¡     Dependency TopologyClick the Dependency Topology icon icon_dep_topo_16x16.png to view dependencies between the application and other applications in a topology view. This field is not displayed by default. For more information about the dependency topology, see "Topology and application group management."

¡     StatusManagement status of the application, which can be Managed or Unmanaged.

¡     Association—Click the Association icon icon_related_app_16x16.png to view applications associated with the application monitor. This field is displayed only when the application is a Windows operating system that is monitored through WMI. For more information, see "Viewing associated applications."

¡     AnalyzeClick the Analyze icon icon_analyze_16x16.png to view the causes for the unhealthy status of an application. For more information about root cause analysis, see "Viewing root cause analysis."

¡     ContactContact information of the application administrator. This field is not displayed by default.

¡     Restart Server—Click the Restart Server icon  to restart the server where the monitored application resides. For more information, see "Restarting a server."

¡     AlarmIf the application has unrecovered alarms, this field displays the alarm icon that represents the highest severity level of the alarms. Click the alarm icon to view the alarm list for the application.

¡     ModifyClick the Modify icon icon_modify_16x16.png to modify the parameters of the application monitor.

¡     DeleteClick the Delete icon icon_delete_16x16.png to delete the application monitor.

3.     Click Refresh to update the content of the application monitor view list.

Restarting a server

APM supports manual or automatic restarting of Linux, NeoKylin, or Windows servers. To restart a server in auto mode, APM must work with the Intelligent Policy Center module of the IMC platform.

Restarting a server in manual mode

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Restart Server icon  for an application monitor.

4.     In the confirmation dialog box, click OK.

Restarting a server in auto mode

1.     Click the Service tab.

2.     From the navigation tree, select Intelligent Policy Center > Event Configuration.

The Event Configuration page opens.

3.     Add an event:

a.     Click Add on the Event Configuration page.

The Add Event Configuration page opens.

b.     Select Device Alarm from the Type list.

c.     Click Select Alarms to select an alarm on the page that opens. In this example, select an alarm named Level-2 Threshold Alarm of Application Management.

d.     Use the default value of other parameters.

4.     Add a policy for the event:

a.     Access the page for adding a policy. (Details not shown.)

b.     Select Auto from the Execution Type list.

c.     Select Restart Server as the action.

d.     Click the Alarm Parameter icon  and configure a mapping between the action parameter (srcIp) and the alarm parameter (<%Device IP%>).

For more information about adding a policy, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

When a threshold alarm is generated for a monitored Linux, NeoKylin, or Windows application, the server where the application resides is restarted.

Customizing the application monitor list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click Custom Page.

The Custom Column page opens.

Customizable columns include:

¡     Name (Default)

¡     Type of application (Default)

¡     Host

¡     Agent Collection (Default)

¡     Speed (bps) (Default)

¡     Rx (bps)

¡     Tx (bps)

¡     Traffic (H) (Default)

¡     In Traffic (H)

¡     Out Traffic (H)

¡     Traffic (D) (Default)

¡     In Traffic (D)

¡     Out Traffic (D)

¡     Description

¡     Availability (Default)

¡     Health (Default)

¡     Dependency Topology

¡     Status (Default)

¡     Associate (Default)

¡     Analysis

¡     Contact

The speed, Rx, Tx, and traffic columns are displayed only when probes are configured for APM. For information about configuring probes, see "Configuration management."

4.     Select the columns you want to display in the application monitor list.

5.     Click the Move Up icon  or Move Down icon  to modify the rank of the columns in the application monitor list.

6.     Click Reset if you want to restore the default columns and rank of the application monitor list.

7.     Click OK.

Viewing associated applications

When a Windows application is monitored through WMI or by using an APM agent, APM automatically detects all unmonitored applications that are deployed on the Windows application. Operators can view these associated applications for the Windows application monitor.

To view associates applications:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Association icon icon_related_app_16x16.png for the Windows application monitor for which you want to view the associated applications.

The Result list page displays all unmonitored applications that are associated with the Windows application monitor.

Result list contents

¡     Device—IP address of the host on which the monitored Windows application is located.

¡     Device Name—Host name of the Windows OS.

¡     Application Type—Type of the application that is associated with the monitored Windows application and not monitored by APM.

¡     Application Monitor Port—Port through which the Auto Discovery function detects the application.

¡     Add to Monitor—Click Add to Monitor to add an application monitor for the associated application.

4.     Click Back to return to the application monitor list page.

Viewing root cause analysis

APM provides the root cause analysis function to analyze the health status of applications based on application monitor indexes. The root cause analysis function is available only to applications that are not healthy.

To view root cause analysis:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The Application Monitor list page displays all application monitors.

3.     Click the Analyze icon icon_analyze_16x16.png for the target application monitor.

The root cause analysis page opens, as shown in Figure 28.

Figure 28 Root cause analysis

 

4.     Expand application index nodes to view the causes.

5.     Click Close.

Querying application monitors

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Enter the complete or part of the application monitor name in the query area, and then click the Query icon  located to the right of the query area.

All matching application monitors are displayed. To filter application monitors by using more filter criteria, click the Expand icon  to expand the query criteria panel.

4.     Set the appropriate query criteria:

¡     Name (supports fuzzy querying)

¡     Application type

¡     Availability

¡     Health status

¡     Application group

¡     Host (host IP address)

¡     Agent Collection

5.     Click Query.

All application monitors that match the query condition are displayed in the application monitor list. You can click an application type on the list to filter that type of monitored applications.

6.     To restore the complete application monitor list, click Reset.

Adding an application monitor

APM detects most applications through auto-discovery, except file and directory applications and those using different listening ports than most applications of the same type. To monitor undetected applications, you can manually add application monitors for them.

To add an application monitor manually:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click Add, and then select the type of the application you want to monitor.

4.     Set the parameters of the application monitor, which vary with application types.

For information about setting the application monitor parameters, see the description of adding an application monitor for each type of applications.

5.     Click OK.

Modifying an application monitor

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the application monitor you want to modify.

4.     Modify the parameters of the application monitor, which vary with application types.

For more information about modifying the application monitor parameters, see the description of modifying an application monitor for each type of application. You cannot modify the application type or the IP address.

5.     Click OK.

Deleting application monitors

When an application monitor is deleted, all of the associated monitor index data for that application monitor instance is deleted. You can delete any of the application monitors in APM with the exception of those referenced by custom views.

To delete one or more application monitors:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Delete icon icon_delete_16x16.png for every application monitor you want to delete. Or select target application monitors, click Delete, and confirm your operation.

Setting the management status of an application monitor

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Select the application monitors with the management status you want to change.

4.     Click Unmanage to stop monitoring the selected applications or click Manage to start collecting monitor indexes from the selected applications, depending on your needs.

Start polling

If an application is set to Manage state in APM, the application monitor collects application monitor index data at the interval polling time. If the application is set to Unmanaged state, the application monitor does not collect application monitor index data at the interval polling time. The start polling function can order APM to collect the application monitor index immediately, regardless of the management status.

To start polling:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Select the application monitors with the management status you want to change.

4.     Select the application monitor for which you want to start polling.

5.     Click Start Polling.

Viewing the APM server details

APM supports monitoring applications by using multiple APM servers. Specify the APM server when you add an application monitor.

To view the APM server details:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click APM Server.

The page displays the following contents:

¡     IPIP address of the APM server.

¡     TotalTotal number of applications monitored by the APM server.

¡     WMINumber of applications monitored by the APM server through WMI.

¡     CLINumber of applications monitored by the APM server through CLI.

¡     SNMPNumber of applications monitored by the APM server through SNMP.

¡     AgentNumber of applications monitored by the APM server by using the agent.

¡     OtherNumber of applications monitored by the APM server by using other methods.

4.     Click a number.

The list displays the corresponding application monitors.

Importing/exporting usernames and passwords

To manage usernames and passwords of different application monitors in batches, APM supports exporting usernames and passwords to an Excel file. If the usernames and passwords in the file are changed, you can import the new usernames and passwords to APM.

Exporting usernames and passwords

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Select application monitors for which you want to export the usernames and passwords.

4.     Click Export Password.

The usernames and passwords are exported to an Excel file.

You can change the usernames and passwords in the Excel file, and then save them locally.

 

 

NOTE:

·     In the Excel file, you can change only usernames and passwords, as well as the key and super password if an application monitor has. Modifying other contents in the file results in import failure.

·     If the application monitor does not have a username or password, the Excel file is empty.

 

Importing use names and passwords

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click Import Password.

The Upload Username and Password File page opens.

4.     Click Select File to select an Excel file exported by using the password export function.

5.     Click Upload File.

The settings to be imported are displayed.

6.     Verify the settings.

7.     Click Import.

 

 

NOTE:

To view the most recent import result, click View Import Result on the Import Password page. The import result is cleared when IMC restarts or you log off.

 

Exporting application data

APM supports exporting the application monitoring data to an Excel file.

To export application data:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Perform one of the following tasks:

¡     To export data from specific application monitors, select the application monitors, and then click Export Selected.

¡     To export data from all application monitors, click Export All.

4.     Save the Excel file locally.

Importing applications

This feature allows you to batch import applications of the same type. Unsupported application types are URL Sequence, Lync 2010 server, Lync 2013 server, Exchange 2003, Exchange 2007, Exchange 2010, and Exchange 2013.

To import applications, perform the following tasks:

1.     Export an import template.

2.     Configure the import template.

3.     Import applications.

Exporting an import template

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Import Application.

The Batch Import Application page opens.

3.     Click Select next to the Application Type field.

All available application types are displayed.

4.     Select an application type, and then click OK.

The Application Category and Application Type fields are automatically populated.

5.     Click Export to export an import template for the selected application type and save it locally.

Configuring the import template

1.     Open the locally saved import template file.

2.     Configure the application information to be imported.

Each line represents an application monitor.

Table 8 contains information specific to setting configuration items in an import template for bulk adding application monitors. For more information about setting the configuration items for an application monitor, see the procedure for adding that application monitor in this document.

Some configuration items are not available in an import template, and they are configurable only when you add application monitors one by one.

Table 8 Restrictions and guidelines about configuration items

Configuration item

Remarks

Use Template

The import template does not include this item.

The value for this item is Disable by default.

Related Applications

The import template does not contain this item.

After applications are imported, you can navigate to Application Manager > Application Monitor to configure related applications for an application.

Detect Application

The import template does not contain this item.

Application detection is enabled by default.

Monitor type template

The import template does not contain this item.

Monitor types of SSH, Telnet, and SNMP

To set the monitor type of SNMP, Telnet, or SSH in the import template:

1.     Configure the access parameters in the SNMP, Telnet, or SSH sheet.

2.     Copy the SNMP ID, Telnet ID, or SSH ID to the corresponding column of the app Config sheet.

Monitor type of SSH

The public key authentication method is not supported in the import template.

After applications are imported, you can navigate to Application Manager > Application Monitor to configure the public key authentication method for an application.

Use IPMI

The import template does not contain this item.

IPMI monitoring is disabled by default.

Windows application

When the monitor type is set to VMI, the import template does not support enabling event logging.

After the application is imported, you can navigate to Application Manager > Application Monitor to configure event logging for the application.

FTP service application

The import template automatically sets the Whether to Download File and Whether to Upload File configuration items to Yes for the FTP service application.

After the FTP service application is imported, you can navigate to Application Manager > Application Monitor to modify these configuration items for the application.

Windows performance counter applications

APM does not support batch importing Windows performance counter applications when it is deployed on Linux.

 

Importing applications

1.     Open the Batch Import Application page.

2.     Click Select next to the Application Type field.

All available application types are displayed.

3.     Select an application type, and then click OK.

The Application Category and Application Type fields are automatically populated.

4.     Click Select File to select a configured import template file.

5.     Click Upload to upload the import template file.

The applications to be imported are displayed in a list.

6.     Click Import All to import all applications in the list.

To stop importing the applications, click Stop All.

To clear the application list, click Clear All.

Host monitoring

Host monitoring focuses on the availability and the health status of applications on each host. You can view a host monitor in either Host mode or in List mode.

Viewing a host monitor in host mode

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Host Monitor.

The Host Monitor page displays all host monitors in the default Host mode, as shown in Figure 29. The Host mode organizes application monitors based on hosts. The background color of each monitored application stands for the health status of that application. The availability icon to the left of each application monitor name stands for the availability status of that application. For more information about the availability and health status, see "Application monitor."

3.     For a host managed by IMC, click the device label of the host to view its details. For more information about viewing host details, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

4.     Click an application monitor name to view the monitoring report for that application. The report contents vary with application types and will be described in subsequent chapters.

Figure 29 Host tab on the Host Monitor page

 

Viewing a host monitor in list mode

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Host Monitor.

The Host Monitor page displays all host monitors in the default Host mode.

3.     Click the List tab.

The Host Monitor List opens, as shown in Figure 30.

Host monitor list contents

¡     Host—Device label of the host machine. For a host managed by the IMC platform, click the device label to view its details. For more information about viewing host details, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

¡     OS—Operation system used in the host machine.

¡     CPU—CPU usage of the operating system. Click the History Record icon icon_history_16x16.png to view the history CPU usage trend graph. Options are Last 1 Hour icon icon_history_last_1_hour_16x16.png, Last 6 Hours icon icon_history_last_6_hour_16x16.png, Today icon icon_history_today_16x16.png, Yesterday icon icon_history_yesterday_16x16.png, This Week icon icon_history_this_week_16x16.png, This Month icon icon_history_this_month_16x16.png, and This Year icon icon_history_this_year_16x16.png.

¡     Memory—Memory usage of the operating system. Click the History Record icon icon_history_16x16.png to view the history memory usage trend graph. Options are Last 1 Hour icon icon_history_last_1_hour_16x16.png, Last 6 Hours icon icon_history_last_6_hour_16x16.png, Today icon icon_history_today_16x16.png, Yesterday icon icon_history_yesterday_16x16.png, This Week icon icon_history_this_week_16x16.png, This Month icon icon_history_this_month_16x16.png, and This Year icon icon_history_this_year_16x16.png.

¡     System Running TimeDuration from the time when the OS started up to the time when APM most recently polled the OS.

¡     Availability—Availability of the operating system of the host for the last poll query. The availability is icon_availability_green_16x16.png (Available), icon_availability_red_16x16.png (Unavailable), icon_availability_yellow_16x16.png (Inaccessible), or icon_availability_gray_16x16.png (Unmanaged). Point to the icon to view the availability represented by different colors for the last hour.

¡     Health—Health status of the operating system on the host for the last poll query. The health status is icon_health_green_16x16.png (Healthy), icon_health_yellow_16x16.png (Minor), icon_health_orange_16x16.png (Major), icon_health_red_16x16.png (Critical), or icon_health_gray_16x16.png (Unknown). Point to the icon to view the health status represented by different colors in the last hour.

¡     Host Topology—Click the Host Topology icon to view the host and related monitored applications in a topology view. For more information about the host topology, see "Topology and application group management."

¡     AnalyzeClick the Analyze icon to view the root cause analysis for the application. For more information, see "Viewing root cause analysis."

¡     ApplicationMonitored applications on the host, except the operating system. Click an application icon to view the monitoring report for the application.

4.     Click Refresh to update the content of the Host Monitor List.

Figure 30 Host monitor list

 

Class monitoring

Class monitoring focuses on the health status of applications. Application types are defined in APM. Every application type can have more than one application and the health status of the application depends on the worst health status.

To view application monitors by class:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Class Monitor.

The Class Monitor page displays all application monitors based on their classes and types, as shown in Figure 31. The leftmost column displays the monitor classes and other columns are application types sorted by class. The background colors stand for the health status of the application types. The overall health status depends on the worst health status.

3.     Click an application class name to view the list of all application types in that class.

The numbers next to the application class name represents the number of applications in healthy state out of the total number of applications for that class.

4.     Click an application type name to view the list of all applications for that type.

The numbers next to the application class name represents the number of applications in healthy state out of the total number of applications for that type.

5.     Point to an application type name to view the details of the health status. For example, Healthy: 1, Critical: 0, Major: 0, Minor: 0, --: 0.

Figure 31 Class monitor

 

Custom views

APM allows operators to combine concerned indexes of different applications into one custom page to supply the support for the whole service performance and health status.

Viewing the custom view list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Custom View.

The Custom View List page displays all custom views.

Custom view list contents

¡     Name—Name of the custom view.

¡     Description—Details of the custom view.

¡     Monitor Report—Click the Monitor Report icon icon_view_report_16x16.png to view the custom report.

¡     Modify—Click the Modify icon icon_modify_16x16.png to modify the custom view.

¡     Delete—Click the Delete icon icon_delete_16x16.png to delete the custom view.

3.     Click Refresh to update the content of the custom view list.

Viewing custom view details

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Custom View.

The Custom View List page displays all custom views.

3.     Click the name of a custom view to view its details.

Custom view details

¡     Name—Name of the custom view.

¡     Description—Description of the custom view.

¡     Application Index List—Entire application monitor indexes for the custom view.

¡     Application IndexApplication index name used by the custom view.

¡     Application Name—Name of the application to which the monitor index belongs.

¡     Application type—Type of the application to which the monitor index belongs.

3.    Click Back to return to the Custom View List page.

Adding a custom view

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Custom View.

The Custom View List page displays all custom views.

3.     Click Add.

The Add Custom View page opens.

4.     Enter the name and description of the custom view. Description is helpful for managing and maintaining the custom view.

5.     Click Add in the application index list.

The Select Application Index dialog box opens.

a.     Click the Unfold icon icon_status_start_16x16.png or Fold icon icon_status_start_16x16.png to expand or collapse an application type/application monitor index. One application type can contain one or more applications under the selected type.

b.     Select the appropriate application indexes for the custom view.

c.     Click OK.

The selected indexes are displayed in the application index list.

6.     Click the Move Up icon icon_next_16x16.png or Move Down icon icon_next_16x16.png to change the arrangement of the monitor indexes that display in the custom report.

7.     Click OK.

Modifying a custom view

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Custom View.

The Custom View List page displays all custom views.

3.     Click the Modify icon icon_modify_16x16.png for the custom view you want to modify.

The Add Custom View page opens.

4.     Modify the description of the custom view. Description is helpful for managing and maintaining the custom view. You cannot modify the name of the custom view.

5.     Click Add in the application index list.

The Select Application Index dialog box opens.

a.     Click the Unfold icon icon_status_start_16x16.png or Fold icon icon_status_start_16x16.png to expand or collapse an application type/application monitor index. One application type can contain one or more applications under the selected type.

b.     Select the appropriate application indexes for the custom view.

c.     Click OK.

6.     Click the Delete icon icon_delete_16x16.png for the application index that you do not want to display in the custom report, and then click OK to confirm the deletion.

7.     Click the Move Up icon icon_next_16x16.png or Move Down icon icon_next_16x16.png to change the arrangement of the monitor indexes that display in the custom report.

8.     Click OK.

Deleting a custom view

When you delete a custom view, the associated application monitor indexes and data are not deleted, and you can view the application monitor indexes and data for a deleted custom view through the monitor reports.

To delete a custom view:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Custom View.

The Custom View List page displays all custom views.

3.     Click the Delete icon icon_delete_16x16.png for the custom view you want to delete.

4.     Click OK to confirm the deletion.

Viewing a custom view report

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Custom View.

The Custom View List page displays all custom views.

3.     Click the Report icon icon_view_report_16x16.png for the custom view for which you want to view the monitoring report.

The custom view reports display different contents with each different monitor index. Different custom reports will be described in subsequent chapters.

The monitor index can set the same threshold value as that in the application monitor report. If you modify the threshold value in the custom view report, the threshold value in the application monitor report is also changed. For more information about threshold setting, see "Configuration management."


Topology and application group management

APM offers flexible topology and application group management functions:

·     TopologyAPM displays the physical relationship and logical relationship among applications, access devices, and physical network in a topology. Also, APM displays the availability and health status of applications in the topology.

·     Application group managementApplication group management allows operators to organize applications monitors into several groups by function or purpose and assign management authorities for the application monitor groups to different application administrators. Application group management simplifies the topology by displaying only the applications of the specified group rather than all applications.

Topology management

APM provides the following topology types:

·     Application topology

·     Dependency topology

·     Host topology

·     Group topology

·     Converged topology

Topologies present applications, hosts, access devices, physical network, and their relationships in a graphical way to improve management efficiency.

Topology tools and right-click menu

In APM, all topologies share the same tools and provide one or more right-click menu options for the monitored applications.

Except the bird's-eye view, all tools are located on top of a topology to provide viewing aids.

Table 9 Topology tools

Tool

Description

Enters the select mode, in which operators can select and drag nodes on the topology. This is the default mode when you enter the topology.

Changes the mouse cursor to a magnifier to enlarge specific parts of the topology.

Enables or disables the bird's-eye view of the application.

Zooms in the topology.

Zooms out the topology.

Restores the original size of the topology.

Fits the topology to the window.

Generates the snapshot picture of the topology.

Updates the topology layout.

Hides or displays alarms of the nodes on the topology.

Hides or displays interface numbers of the nodes on the topology.

Saves the topology after adjustment.

Displays the topology in a bird's-eye view, from which operators can quickly understand the general layout of the topology and locate the current screen of topology in the whole topology map.

Operators can click  to enable or disable the bird's-eye view of the topology.

 

You can quickly navigate to related functions of a monitored application by using the right-click menu options on the topology. On the application topology, the right-click menu options of an application icon also apply to hosts icons attached with an operating system logo (such as ).

Right-click menu options:

·     Application Monitor—Select this option to view the monitoring report of the monitored application.

·     Host Topology—Select this option to view the host topology. This option is available only for the host icon.

·     Dependency Topology—Select this option to view the dependency topology of the monitored application.

·     Query Alarm—Select this option to query alarms generated by the monitored application. This option is available only when the applications have alarms generated.

·     Traffic Trends—Select this option to view the trends of the rates at which the monitored application received and sent traffic in the last hour.

Dependency topologies, host topologies, and group topologies support only the Monitor Application option.

Viewing an application topology

The application topology displays the physical relationship and logical relationship among applications, hosts, access devices, and physical network.

Physical relationship includes the connection relationship between access devices and the physical network, the connection relationship between hosts and access devices, and the relationship between OS applications and hosts.

Logical relationship includes the dependencies between non-OS applications and the OS and the dependencies between applications.

To view the application topology:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Topology.

The application topology window opens, as shown in Figure 32. The topology shows all applications that the current operator has the management privileges to and the relationships among the applications, related hosts, access devices, and the physical network.

Figure 32 Application topology window

 

Table 10 Application topology icons

Icon

Description

icon_server_24x24.png

Represents a host for which APM does not monitor the operating system.

icon_server_windows_24x24.png

Represents a host for which APM is monitoring the operating system.

The logo attached to the host icon varies with operating systems.

icon_app_ad_24x24.png

Represents an application monitored by APM.

The icon varies with the application type. This icon indicates an Active Directory application.

 

This icon contains the following information:

·     Alarm—Number and highest severity of unrecovered alarms for an application. This icon is not displayed if no unrecovered alarm exists for the application.

·     Availability—Availability of an application for the last polling query. The icon varies with the availability. For more information, see "Monitor management."

·     Health status—Health status of an application for the last polling query. The icon varies with the health status. For more information, see "Monitor management."

核心交换机

Represents a device that provides network access for applications.

To display such devices on the topology, make sure you have added them to the IMC platform as access devices.

icon_phy_network_2_32x32.png

Represents the physical network to which an access device is connected.

Represents dependencies between two applications that use the same IP address.

A dashed line represents indirect dependencies between the applications. Indirect dependencies are generated when the current operator has no management privileges to one or more intermediate applications.

Represents dependencies between two applications that use different IP addresses.

A dashed line represents indirect dependencies between the applications. Indirect dependencies are generated when the current operator has no management privileges to one or more intermediate applications.

Represents the connection between a host and an access device or between an access device and the physical network.

For a host-to-access device connection, the port that connects the host to the access device is also displayed.

A dashed line represents an indirect connection between a host and the physical network. An indirect connection is displayed when the access device is not added to the IMC platform. For information about adding devices to IMC, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

 

Viewing a dependency topology

A dependency topology focuses on a single application and displays its dependencies with other applications, directly or indirectly.

You can view a dependency topology by using one of the following methods:

Method 1

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Dependency Topology icon icon_dep_topo_16x16.png for the application for which you want to view the dependency topology.

Method 2

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of the application monitor.

The application monitor report page opens.

4.     Click the Relationship icon icon_dep_topo_16x16.png located in the Monitor Information area for the target application.

Method 3

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Topology.

The application topology window opens.

3.     Right-click the application icon, and then select Dependency Topology from the popup menu.

The dependency topology window opens, as shown in Figure 33. The dependency topology contains only application icons and lines. For the icon description, see Table 10.

Figure 33 Dependency topology window

 

Viewing a host topology

A host topology focuses on a single host and displays dependencies of the operating system that runs on it with other applications.

To view a host topology:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Host Monitor.

The Host Monitor page displays all host monitors in the default Host mode.

3.     Click the Host tab.

The Host Monitor List is displayed.

4.     Click the Host Topology icon icon_dep_topo_16x16.png for the host for which you want to view the host topology.

The host topology window opens, as shown in Figure 34. The host topology filters out physical networks and hosts for which APM does not monitor the operating system. For the icon description, see Table 10.

Figure 34 Host topology window

depend topo.PNG

 

Viewing a group topology

Group topologies include logical group topology and physical group topology:

·     Logical group topology—With a selected application group as the root, displays all its subgroups, applications in each subgroup, and logical relationship between the subgroups.

·     Physical group topology—Displays the physical relationship and logical relationship between applications, access devices, and the physical network in a group (excluding subgroups).

Viewing a logical group topology

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

3.     Click the Group Topology icon icon_dep_topo_16x16.png for the target application group.

The logical group topology window opens.

Figure 35 Logical group topology window

group topo.PNG

 

Table 11 Logical group topology icons

Icon

Description

icon_app_windows_24x24.png

Represents an application monitored by APM.

The icon varies with the application type. This icon indicates a Windows application.

icon_group_node_24x24.png

Represents an application group. The operator with the management authority for the application group can view all applications of the application group in the topology. For more information about application group, see "Application group management"

The alarm icon represents the number and highest severity of unrecovered alarms for an application.

This icon is not displayed if no unrecovered alarm exists for the application.

The availability icon represents the availability of an application or application group for the last polling query.

The availability of an application group is determined by the application with the worst availability in the group or its subgroup. For information about the icon to display, see "Monitor management."

The health status icon represents the health status of an application for the last polling query.

The health status of an application group is determined by the application with the worst health status in the group or its subgroup. For more information about the icon to display, see "Monitor management."

The availability icon represents the availability of an application group. The availability of an application group is determined by the application with the worst availability in the group or its subgroup.

The health status icon represents the health status of an application group. The health status of an application group is determined by the application with the worst health status in the group or its subgroup.

Points to a subgroup or application that an application group contains.

 

Application group enables operators to manage applications by group based on the granted authorities. If an operator does not have the management authority for an application group, the operator cannot view applications of the application group in the logical group topology.

Viewing a physical group topology

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

3.     Click the Physical Topology icon icon_dep_topo_16x16.png for the target application group. You can also click the Phy Topology tab on the Logic Topology page.

The physical group topology window opens.

Figure 36 Physical group topology

phy topo.PNG

 

The application topology displays all applications on the network. The physical group topology displays the applications of an application group. Icons in the group topology are similar to those in the application topology. For more information about the icons, see Table 10.

The right-click menu of physical group topology includes only the Application Monitor option for you to display the application monitor report.

Viewing a converged topology

A converged topology converges multiple types of topologies into one topology. For more converged topology information, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To view a converged topology:

1.     Click the Resource tab.

2.     From the navigation tree, select View Management > Network Topology.

The topology page opens.

3.     From the topology navigation tree, select Converged Topology.

Figure 37 Converged topology window

 

Adding an application topology into a converged topology

1.     On the converged topology, right-click the blank space.

2.     Select Add Application from the right-click menu.

3.     On the popup window, select one or more applications, and then click OK to add the applications to the converged topology.

On the converged topology that includes applications:

·     If an application does not have unrecovered alarms, the color of the application icon is green. If an application has unrecovered alarms, the application icon shows a color that corresponds to the highest alarm severity level, and the background of the application icon flashes.

·     Click an application icon on the converged topology to display the key monitoring indexes of the application. Different applications have different key monitoring indexes. Common monitoring indexes for applications include:

¡     Availability—Availability of the application in the last polling of APM.

¡     Health—Health of the application in the last polling of APM.

¡     Monitor Report—Click the Monitor Report link to view the application's monitor report.

·     Right-click an application icon on the converged topology to open the operation menu of the application.

¡     Add Link—Click this item. On the opened window, select a node and click OK. A link will be added between the application and the node.

¡     Add to subview—Click this item. On the opened window, select a subview and click OK to add the application to the subview.

¡     Modify Label—Click this item. On the opened window, modify the application label and click OK. This operation modifies only the application label displayed on the converged topology.

¡     Delete—Click this item to delete the application from the converged topology.

Application group management

APM allows you to manage monitored applications in groups. By default, all monitored applications belong to the system default group named ungrouped and all operators can manage applications in ungrouped. Once a monitored application is assigned to an application group, the application can be managed only by operators who are granted privileges to manage that application group.

You can add four hierarchy subgroups under a parent group and there is no inheritance relationship between them. You can view, add, modify, and delete applications.

Viewing the application group list

You can view all application groups in the Application Group List.

To view the application group list:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

Application group list contents

¡     Name—Name of the application group. Click the name to view all monitored applications in the group.

¡     AvailabilityAvailability of the application group. It is determined by the application with the worst availability in the group or its subgroup. The field value is Available when the application group does not include any applications.

¡     Health StatusHealth status of the application group. It is determined by the application with the worst health status in the group or its subgroup. The field value is Healthy when the application group does not include any applications.

¡     Application Group Topology—Click the Application Group Topology icon icon_dep_topo_16x16.png to view the logical group topology. For more information about the group topology, see "Viewing a logical group topology."

¡     Physical Topology—Click the Physical Topology icon icon_dep_topo_16x16.png to view the physical group topology. For more information about the group topology, see "Viewing a physical group topology."

¡     Analyze—Click the Analyze icon icon_analyze_16x16.png to analyze the root cause for the alarms generated by applications in the group or subgroups.

Figure 38 Root cause analysis

analyze.PNG

 

¡     Details—Click the Details icon  to view detailed information about the application group.

¡     ModifyClick the Modify icon icon_modify_16x16.png to modify the application group.

¡     DeleteClick the Delete icon icon_delete_16x16.png to delete the application group.

3.     Click Refresh.

 

 

NOTE:

You can sort the application group list by name, availability, or health status by clicking the appropriate list label.

 

Viewing the application group details

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

3.     Click the Details icon  for the application group for which you want to view its details.

Application group details

¡     NameName of the application group.

¡     DescriptionDescription of the application group.

¡     Operator GroupNames of the operator groups to manage the application group and applications in the application group. For information about viewing operators in the group, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

¡     ApplicationAll applications that belong to the application group.

¡     Parent GroupApplication group's parent group. An application group can belong to only one parent group.

4.     Click Back to go back to the application list page.

Adding an application group

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

3.     Click Add.

The Add page opens.

4.     Specify a unique application group name.

5.     Describe the application group details in the Description field.

6.     Select groups of operators who are permitted to manage the application group and its member applications:

a.     Click Add. The Select Operator Group window opens.

b.     Select one or more operator groups as needed.

c.     Click OK.

All selected operator groups are displayed in the Operator Group box.

7.     Add applications to the application group:

a.     Click Add. The Select Application window opens.

b.     Select one or more applications as needed.

c.     Click OK.

All selected applications are displayed in the Application box.

8.     Select a parent group for the application group from the Parent Group list. If no parent relationship exists, leave this option blank.

9.     To send alarm notifications for monitored applications:

a.     Select enable from the Alarm Notification list.

b.     On the Mail Setting tab, enter an IP address in the Destination IP Address field, and then click Add.

c.     On the SMS Setting tab, enter a phone number in the Mobile Phone Number field, and then click Add.

d.     Select an alarm level from the Concerned Alarm Levels list.

e.     Select All Alarms or Selected Alarms from the Concerned Alarms list.

If Selected Alarms is selected, click Select, select alarm types to be included, and then click OK.

f.     Set the time range for alarm notifications in the Time Ranges field. The time range is set by week in hh:mm-hh:mm format.

10.     Click OK.

Modifying an application group

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

3.     Click the Modify icon icon_modify_16x16.png for the application group you want to modify.

4.     Enter a unique new name for the application in the Name field.

5.     Modify the description of the application group in the Description field.

6.     Modify the groups of operator who are permitted to manage the operator group and its member applications:

a.     Click Add.

The Select Operator Group page opens.

b.     Select one or more operator groups as needed.

c.     Click OK.

All selected operator groups are displayed in the Operator Group box.

d.     Select one or multiple operator groups that you no longer permit to manage the application group and its members in the Operator Group box.

e.     Click Delete.

Each selected operator group is removed from the Operator Group box.

7.     Modify applications in the group:

a.     Click Add.

The Select Application page opens.

b.     Select one or more applications as needed.

c.     Click OK.

All selected applications are displayed in the Application box.

d.     Select one or more applications you want to remove from the application group in the Application box.

e.     Click Delete.

f.     Click OK.

Each selected operator group is removed from the Application box.

8.     Select a new parent group from the Parent Group list. If no parent relationship exists, select the blank option from the list.

9.     To send alarm notifications for monitored applications:

a.     Select enable from the Alarm Notification list.

b.     On the Mail Setting tab, enter an IP address in the Destination IP Address field, and then click Add.

c.     On the SMS Setting tab, enter a phone number in the Mobile Phone Number field, and then click Add.

d.     Select an alarm level from the Concerned Alarm Levels list.

e.     Select All Alarms or Selected Alarms from the Concerned Alarms list.

If Selected Alarms is selected, click Select, select alarm types to be included, and then click OK.

f.     Set the time range for alarm notifications in the Time Ranges field. The time range is set by week in hh:mm-hh:mm format.

10.     Click OK.

Deleting an application group

Use caution when deleting an application group because this action simultaneously deletes any associated subgroups. Further, once an application group is deleted, applications in the deleted group are moved to ungrouped if they do not belong to any other application groups.

To delete an application group:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Group.

The application group list page displays all application groups.

3.     Click the Delete icon icon_delete_16x16.png for the application group you want to delete.

4.     Click OK.


APM agent management

An APM agent collects application index data from a target host in local monitor mode. Using an agent to collect data can secure the OS privileges and obtain data that cannot be obtained in remote monitor mode.

Installing and upgrading an APM agent

Make sure the APM agent has the same version as APM. You can install and upgrade an APM agent locally and remotely.

Installing an APM agent locally

To install an APM agent locally, operators must download the installation package (for Windows or Linux) to the local directory by using agent management.

To install an APM agent locally:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

3.     Click Download.

4.     Select Agent Package (Windows) or Agent Package (Linux) as needed.

The installation package is saved to the local directory.

5.     Copy the installation package to the destination host by using FTP, file sharing, or SCP, and decompress it.

6.     Double-click the install.bat script and enter the IP address of the IMC server as prompted.

If IMC is deployed in distributed mode, enter the IP address of the master server.

7.     Click OK.

Installing an APM agent remotely

This function uses WMI (Windows) or SSH (Linux) on the destination host. To install an APM agent remotely, you must obtain the IP address of the destination host and administrator username and password.

To install an APM agent remotely:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

3.     Click Install.

4.     Configure the following parameters:

¡     Destination Host IP—Enter the IP address of the destination host, and then click Add. The IP address is added to the Host List area.

¡     Host List—Displays the hosts on which the agent is remotely installed. To remove an IP address from the Host List area, select the IP address, and then click Delete.

¡     Host Type—Select a host type, Windows or Linux. If you click Select Template, this field is automatically populated.

¡     Installation Path—Enter the absolute agent installation path. In this example, enter D:\agent for Windows and /home/agent for Linux. If you click Select Template, this field is automatically populated.

¡     Username/Password—Enter the username and the password used for connecting to the destination host. If you click Select Template, this field is automatically populated.

-     For Windows, the username must have the administrator rights.

-     For Linux, the username must have the root rights and the rights to execute the installation file.

¡     Description—Enter a description of the installation task.

5.     Click Install.

Figure 39 Installing the APM agent remotely

 

 

NOTE:

To use an agent template, you must add the template to APM first. For information about adding an agent template, see "Configuration management."

 

Upgrading an APM agent locally

To upgrade an APM agent locally, operators must obtain the upgrade package (for Windows or Linux) by using agent management.

To upgrade an APM agent locally:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

3.     Click Download.

4.     Select Agent Upgrade Package (Windows) or Agent Upgrade Package (Linux) as needed.

The upgrade package is saved to the local directory.

5.     Copy the upgrade package to the Agent directory of the agent installation path.

6.     Extract the compressed files from the upgrade package into the current directory.

7.     Run update.bat in the AgentUpdate directory.

Upgrading an APM agent remotely

This function uses WMI (Windows) or SSH (Linux) on the destination host. To upgrade an APM agent remotely, make sure WMI or SSH is enabled.

After APM is upgraded, it automatically detects all managed APM agents and pushes upgrade packages for agent upgrade. If an APM agent fails to be upgraded remotely, upgrade the agent locally. For more information, see "Upgrading an APM agent locally."

Managing APM agents

You can use agent management to install, delete, start, or stop APM agents, or automatically detect applications.

Viewing the APM agent list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

Agent list contents

¡     Destination Host IP—IP address of the host where the APM agent is deployed. Click the IP address to view agent details.

¡     Version—Version of the APM agent.

¡     Installation Time—Time when the APM agent was installed.

¡     Upgrade Time—Time when the APM agent was most recently upgraded.

¡     Description—Descriptive information about the APM agent.

¡     Status—Current state of the APM agent.

¡     Operation—Operations that can be performed on the APM agent.

¡     Auto Discovery—The APM agent automatically detects all applications running on the destination host after installation completion. Click Result to view the auto discovery result.

¡     Managed Application—Applications monitored by the APM agent on the destination host.

¡     Delete—Click the Delete icon icon_delete_16x16.png to delete APM agents in incorrect status due to authentication error or connection failure.

Viewing agent details

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

3.     Click the IP address of an APM agent to view its details.

¡     Destination Host IP—IP address of the host where the APM agent is deployed.

¡     Host Type—OS of the destination host, Windows or Linux.

¡     Installation Path—Absolute APM agent installation path. For example, D:\agent on Windows and /home/agent on Linux.

¡     Description—Descriptive information about the APM agent.

4.     Click Back.

Starting an APM agent

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

3.     Click the Start icon  for an APM agent.

The APM agent status becomes Starting. The Start icon is displayed only for APM agents in Stopped state.

4.     Click Refresh.

Stopping an APM agent

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

3.     Click the Stop icon  for an APM agent.

The APM agent status becomes Stopping. The Stop icon is displayed only for APM agents in Started state.

4.     Click Refresh.

Viewing the auto discovery result

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

3.     Click Result in the Auto Discovery column for an APM agent.

The Auto Discovery Result page opens.

¡     Device—IP address of the host where the APM agent is deployed.

¡     Application Type—Type of the application.

¡     Application Monitor Port—Port used to monitor the application.

¡     Add to Monitor—Click Add to Monitor for an unmonitored application to add monitor for the application. Click Add the same type of application for a monitored application to add monitor for the same type of applications.

Adding an application monitor

You can click Add to Monitor or Add the same type of application on the Auto Discovery Result page to add an application monitor.

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

3.     Click Result in the Auto Discovery column for an APM agent.

The auto discovery result page opens.

4.     Click Add to Monitor or Add the same type of application.

5.     On the page that opens, configure the application monitor parameters.

The Enable Agent Collection parameter is displayed only for application that can be monitored by an APM agent.

6.     Click OK.

Deleting an APM agent

This function deletes APM agents in incorrect status due to authentication error or connection failure.

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Agent Management.

The agent list is displayed.

3.     Click the Delete icon icon_delete_16x16.png for an APM agent.

4.     Click OK.


Configuration management

APM provides the following additional configuration management functions:

·     Threshold Management—Sets threshold alarm conditions for the monitoring application indexes. If the collected indexes meet the threshold alarm conditions, APM sends a corresponding alarm through the alarm function of the IMC platform. If the alarm notification and forwarding configuration is set correctly, operators can receive alarm information sent by APM through emails or short messages.

·     Baseline Configuration—Enables or disables the baseline function for application indexes. When you enable the baseline function for an application index, APM performs the following operations:

¡     Collects the index data.

¡     Generates initial baseline data after seven days.

¡     Generates stable baseline data after five weeks.

APM determines the index state according to the baseline data. Alarms are generated when the baseline data is in an abnormal state. If the alarm notification and forwarding configuration is set correctly, operators can receive alarm information sent by APM through emails or SMS messages.

·     Port Configuration—Sets default application monitor and traffic collection ports for applications. Through ports, APM can identify different applications in Auto Discovery and traffic collection.

·     Probe Configuration—Manages a list of probes. A probe is a server where the probe application is installed. Operators can collect the network traffic of applications by mirroring network traffic to the probe.

·     Parameter Configuration—Sets APM system parameters, including the monitor data retention periods and data background colors.

·     Template Configuration—Provides application templates for application monitors and agent templates for remotely installed agents. Using templates simplifies the configuration and reduces the chances of making mistakes.

Threshold management

APM predefines multiple monitor indexes for each type of applications, and sets the threshold alarm conditions for certain key monitor indexes. Operators can view application monitor indexes configured with the threshold alarm function and their threshold configurations. To enable the threshold alarm function for other application monitor indexes, use the monitor index adding function in threshold configuration.

By default, when application monitor indexes meet Level-1 threshold conditions, APM sends major alarms. When application monitor indexes meet Level-2 threshold conditions, APM sends critical alarms. You can modify the alarm severity level for the Level-1 Threshold Alarm of Application Management and Level-2 Threshold Alarm of Application Management traps. APM will send related alarms and calculate the health status according to the modified alarm severity levels. To modify the alarm severity level, navigate to Trap Management > Trap Definition of the IMC PLAT. For more information, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

Application monitor thresholds can be global or custom, depending on the effective range. You can set a global threshold for a monitor index only in threshold configuration. You can set a custom threshold in the application monitor report or custom view report. By default, monitor indexes enabled with the threshold alarm function use global thresholds.

·     Global threshold—Applies to a specific widely deployed application type. The same application type has the same global threshold.

·     Custom thresholdMonitors a single application. With custom thresholds, applications of the same type can use different thresholds. You can enable and modify custom thresholds for a monitor index only after you add a global threshold for the monitor index.

This section describes how to query, add, modify, and delete alarm indexes, and how to configure monitor indexes to use global thresholds or custom thresholds in reports.

Viewing the global threshold List

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Threshold Configuration.

The Global Threshold List displays all monitor indexes enabled with the threshold alarm function and the global threshold of each index.

4.     Click an application category to view monitor indexes for this application category.

The Application Type field also refreshes.

To view baseline configurations for all application categories, click Unlimited next to Application Category.

5.     Click an application type to view monitor indexes for this application type.

To view baseline configurations for all application types of an application category, click the application category, and then click Unlimited next to Application Type.

Global Threshold List contents

¡     Application Type—Type of the application.

¡     Application Unit—Name of the application unit to which the monitor index belongs. Each application unit corresponds to an independent area in the application monitor report.

¡     Index—Name of the application monitor index enabled with the threshold alarm function.

¡     Threshold Condition—Threshold condition, which can be Greater than or equal to (≥), Less than or equal to (≤), Include, or Exclude.

¡     Enable Level-1 Threshold—Displays whether the Level-1 threshold for the monitor index has been set.

¡     Level-1 Threshold—Level-1 threshold value of the monitor index.

¡     Trigger Times—Number of times that the monitor index meets the Level-1 threshold to trigger an alarm.

¡     Enable Level-2 Threshold—Displays whether the Level-2 threshold for the monitor index has been set.

¡     Level-2 Threshold—Level-2 threshold value of the monitor index.

¡     Trigger Times—Number of times that the monitor index meets the Level-2 threshold to trigger an alarm.

¡     Modify—Click the Modify icon icon_modify_16x16.png to modify the predefined or user-defined global threshold values.

¡     Delete—Click the Delete icon icon_delete_16x16.png to delete the predefined or user-defined global threshold values.

6.     Click Refresh to refresh the global threshold list.

7.     Click Back to return to the Configurations page.

Adding threshold configuration

With this function, operators can manually enable the threshold alarm function and set thresholds for monitor indexes. In addition, operators can configure monitor indexes to use global thresholds or custom thresholds in the application monitor report or custom view report.

To add threshold configuration for a monitor index:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Threshold Configuration.

The Global Threshold List is displayed.

4.     Click Add.

The Add Threshold page opens.

5.     Configure the following parameters for the monitor index:

¡     Application Type—Click Select, and then select an application type from the popup window. The selected application type name automatically populates the Application Type field.

¡     Application Unit/Index/Threshold Type—Click Select, and then select an application monitor index from the popup window (options vary with application type), and then click OK. The name, type, and application unit of the selected monitor index automatically populate the Index, Threshold Type, and Application Unit fields.

¡     Threshold Condition—Select a threshold condition from the list (options vary with the monitor index type). For the Value type, options are Greater than or equal to and Less than or equal to. For the String type, options are Include and Exclude.

¡     Unit—Select a unit type of the monitor index from the list. The value depends on the monitor index type. Some indexes do not contain a unit type, such as the physical thread count of a .NET server.

6.     Configure the Level-1 threshold parameters for the monitor index.

APM generates a major alarm when the monitor index meets the Level-1 threshold. If you enable the Level-2 threshold, APM generates a major alarm when the monitor index meets the Level-1 threshold but does not meet the Level-2 threshold.

¡     Enable Level-1 Threshold—Configure the Level-1 threshold setting for the monitor index.

¡     ThresholdIf you enable the Level-1 threshold, set a Level-1 threshold value in the Threshold field.

¡     Trigger Times—If you enable the Level-1 threshold, set an alarm trigger frequency in the Trigger Times field. When the monitor index meets the Level-1 threshold once, the field value increases by one. APM generates a Level-1 threshold alarm if the monitor index meets the Level-1 threshold for the number of times specified by Trigger Times.

7.     Configure the Level-2 threshold parameters for the monitor index.

APM generates a critical alarm when the monitor index meets the Level-2 threshold.

¡     Enable Level-2 Threshold—Configure the Level-2 threshold setting for the monitor index. If you enable the Level-2 threshold, set a Level-2 threshold value in the Threshold field. APM activates a critical alarm when the monitor index meets the threshold.

¡     ThresholdIf you enable the Level-2 threshold, set a Level-2 threshold value in the Threshold field.

¡     Trigger Times—If you enable the Level-2 threshold, set an alarm trigger frequency in the Trigger Times field. When the monitor index meets the Level-2 threshold once, the field value increases by one. APM generates a Level-2 threshold alarm if the monitor index meets the Level-2 threshold for the number of times specified by Trigger Times.

8.     Click OK.

Modifying global threshold configuration

To modify global threshold configuration of a monitor index:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Threshold Configuration.

The Global Threshold List is displayed.

4.     Click the Modify icon icon_modify_16x16.png for the threshold you want to modify.

The Modify Threshold page opens.

5.     Modify basic parameters of the monitor index as needed:

¡     Application TypeCannot be modified.

¡     Application UnitCannot be modified.

¡     Index—Cannot be modified.

¡     Threshold Type—Cannot be modified.

¡     Threshold Condition—Modify the threshold condition. Options vary with the monitor index type. For the Value type, options are Greater than or equal to and Less than or equal to. For the String type, options are Include and Exclude.

¡     Unit—Modify the threshold unit type. The value depends on the monitor index type. Some indexes do not contain a unit type, such as the physical thread count of a .NET server.

You cannot modify the application type, application unit, index, and threshold type.

6.     Modify the Level-1 threshold parameters for the monitor index.

APM generates a major alarm when the monitor index meets the Level-1 threshold. If you enable the Level-2 threshold, APM generates a major alarm when the monitor index meets the Level-1 threshold but does not meet the Level-2 threshold.

¡     Enable Level-1 Threshold—Modify the Level-1 threshold setting for the monitor index. You can modify the Level-1 threshold value or disable the Level-1 threshold as needed.

¡     ThresholdIf you enable the Level-1 threshold, set a Level-1 threshold value in the Threshold field.

¡     Trigger Times—If you enable the Level-1 threshold, set an alarm trigger frequency in the Trigger Times field. When the monitor index meets the Level-1 threshold once, the field value increases by one. APM generates a Level-1 threshold alarm if the monitor index meets the Level-1 threshold for the number of times specified by Trigger Times.

7.     Modify the Level-2 threshold parameters for the monitor index.

APM generates a critical alarm when the monitor index meets the Level-2 threshold.

¡     Enable Level-2 Threshold—Modify the Level-2 threshold setting for the monitor index. You can modify the Level-2 threshold value or disable the Level-2 threshold as needed.

¡     ThresholdIf you enable the Level-2 threshold, set a Level-2 threshold value in the Threshold field.

¡     Trigger Times—If you enable the Level-2 threshold, set an alarm trigger frequency in the Trigger Times field. When the monitor index meets the Level-2 threshold once, the field value increases by one. APM generates a Level-2 threshold alarm if the monitor index meets the Level-2 threshold for the number of times specified by Trigger Times.

8.     Click OK.

Deleting monitor indexes from threshold configuration

You can delete only the monitor indexes for which the threshold alarm function is manually enabled. After a monitor index is deleted, operators cannot set thresholds for the monitor index on the Threshold Setting page navigated from an application monitor report page or a custom application monitor report page.

To delete a monitor index:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Threshold Configuration.

The Global Threshold List opens.

4.     Click the Delete icon icon_delete_16x16.png for the monitor index you want to delete.

5.     Click OK.

Configuring a monitor index to use global threshold or custom threshold

You can configure a monitor index to use a global threshold or custom threshold in the application monitor report or custom view report. By default, monitor indexes enabled with the threshold alarm function use global threshold.

To configure a monitor index to use global threshold or custom threshold:

1.     Click the Resource tab.

2.     Use one of the following methods to open the Threshold Setting page:

Method 1

a.     From the navigation tree, click Application Manager > Application Monitor.

b.     Click the target application name on the application monitor list.

c.     Click the Set Threshold icon  for the target monitor index on the application monitor report page.

For a monitor index not enabled with the threshold alarm function, enable the threshold alarm function for the monitor index. For more information, see "Adding threshold configuration."

Method 2

a.     From the navigation tree, click Application Management > Custom View to open the custom monitor list.

b.     Click the Monitor Report icon icon_view_report_16x16.png for the target custom monitor on the custom monitor list.

c.     Click the Set Threshold icon  for the target monitor index on the custom monitor report page.

For a monitor index not enabled with the threshold alarm function, enable the threshold alarm function for the monitor index. For more information, see "Adding threshold configuration."

 

 

NOTE:

The threshold you set for a monitor index on the application monitor report page also applies to the same monitor index on the custom monitor page. The threshold you set for a monitor index on the custom monitor page also applies to the same monitor index on the application monitor report page.

 

3.     Select Custom or Global for Threshold Type.

¡     If you select Custom for the Threshold Type field, set a custom threshold for the monitor index. For more information, see "Modifying global threshold configuration."

¡     If you select Global for the Threshold Type field, the monitor index uses the global threshold set in the threshold configuration.

4.     Click OK.

Exporting custom thresholds

1.     Click the Resource tab.

2.     From the navigation tree, select Application Management > Configurations.

3.     Click Threshold Config.

4.     Click Custom Thresholds.

5.     Perform one of the following tasks:

¡     To export specific custom thresholds, select the thresholds, and then click Export.

¡     To export all custom thresholds, click Export All.

A dialog box opens.

6.     Specify a path to save the exported file.

Modifying custom threshold configuration

To modify custom threshold configuration of a monitor index:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Threshold Configuration.

4.     Click the Custom Threshold tab.

5.     Click the Modify icon icon_modify_16x16.png for the threshold you want to modify.

The Modify Threshold page opens.

6.     Modify basic parameters of the monitor index as needed:

¡     Threshold Type—Select the Custom type.

¡     Threshold Condition—Modify the threshold condition. Options vary with the monitor index type. For the Value type, options are Greater than or equal to and Less than or equal to. For the String type, options are Include and Exclude.

¡     Unit—Modify the threshold unit type. The value depends on the monitor index type. Some indexes do not have a unit, such as the physical thread count of a .NET server.

7.     Modify the Level-1 threshold parameters for the monitor index.

APM generates a major alarm when the monitor index meets the Level-1 threshold. If you enable the Level-2 threshold, APM generates a major alarm when the monitor index meets the Level-1 threshold but does not meet the Level-2 threshold.

¡     Enable Level-1 Threshold—Modify the Level-1 threshold setting for the monitor index. You can modify the Level-1 threshold value or disable the Level-1 threshold as needed.

¡     ThresholdIf you enable the Level-1 threshold, set a Level-1 threshold value in the Threshold field.

¡     Trigger Times—If you enable the Level-1 threshold, set an alarm trigger frequency in the Trigger Times field. APM generates a Level-1 threshold alarm if the monitor index meets the Level-1 threshold for the number of times specified by Trigger Times.

8.     Modify the Level-2 threshold parameters for the monitor index.

APM generates a critical alarm when the monitor index meets the Level-2 threshold.

¡     Enable Level-2 Threshold—Modify the Level-2 threshold setting for the monitor index. You can modify the Level-2 threshold value or disable the Level-2 threshold as needed.

¡     ThresholdIf you enable the Level-2 threshold, set a Level-2 threshold value in the Threshold field.

¡     Trigger Times—If you enable the Level-2 threshold, set an alarm trigger frequency in the Trigger Times field. APM generates a Level-2 threshold alarm if the monitor index meets the Level-2 threshold for the number of times specified by Trigger Times.

9.     Click OK.

Baseline configuration

The baseline function of an application index can only be enabled or disabled globally. When you enable the baseline function for an application index, specify a baseline alarm level for the index.

Viewing the baseline configuration list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Baseline Configuration.

The baseline configuration list displays all application monitor indexes that can be enabled with the baseline function.

4.     Click an application category to view monitor indexes for this application category.

The Application Type field also refreshes.

To view baseline configurations for all application categories, click Unlimited next to Application Category.

5.     Click an application type to view the monitor indexes for this application type.

To view baseline configurations for all application types of an application category, click the application category, and then click Unlimited next to Application Type.

Baseline configuration list contents

¡     Application Type—Type of the application.

¡     Application Unit—Name of the application unit to which the baseline configuration belongs. Each application unit corresponds to an independent area in the application monitor report.

¡     Index—Name of the application monitor index that is enabled with the baseline function.

¡     Enabled—Displays whether the baseline function for the monitor index has been enabled.

¡     Shield TimesInterval for generating baseline alarms of the monitor index.

¡     Alarm LevelLevel of the baseline alarm. Options are Critical, Major, and Minor.

¡     Modify—Click the Modify icon icon_modify_16x16.png to modify the baseline configuration of the monitor index.

6.     Click Refresh to refresh the baseline configuration list.

7.     Click Back to return to the Configurations page.

Modifying baseline configuration

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Baseline Configuration.

4.     Click the Modify icon icon_modify_16x16.png for the baseline configuration you want to modify.

The Modify Baseline page opens.

5.     Modify the following baseline configuration parameters:

¡     Application TypeCannot be modified.

¡     Application UnitCannot be modified.

¡     IndexCannot be modified.

¡     Enabled—Select whether to enable the baseline function for the index.

¡     Shield Times—Set an interval for generating baseline alarms of the index.

¡     Alarm Level—Select a baseline alarm level.

6.     Click OK.

Port configuration

An application can listen to data and provide services through multiple ports. With these ports, APM finds applications running on the host and reads monitor indexes to calculate traffic statistics.

Port configuration allows operators to modify the settings of default application monitor port and traffic collection port for applications.

·     Application Monitor Port—The Auto Discovery function scans the applications installed or deployed on a host through this type of ports.

·     Traffic Collection Port—Applications use this type of port to provide services. Through these ports, APM can identify traffic of different application types running on the same IP address.

The following table displays the default port settings preloaded in APM. If an application does not have a default application monitor port, APM cannot detect the application through Auto Discovery. If an application does not have a default traffic collection port and the application is not an operating system, APM does not monitor its traffic. Operating system applications do not have default traffic collection ports, including Windows, AIX, SCO UNIX, FreeBSD, OpenBSD, HP-UX, Solaris, Mac OS, and Linux. APM identifies their traffic by IP address.

Table 12 Application default port list

Application type

Application monitor port

Traffic collection port

Windows

Performance Counter

TCP 135

N/A

AIX

FreeBSD

HP-UX

Linux

Mac OS

OpenBSD

Solaris

TCP 23 (through Telnet)

TCP 22 (through SSH)

N/A

SQL Server

TCP 1433

TCP 1433

MySQL

TCP 3306

TCP 3306

Oracle

TCP 1521

TCP 1521

DB2

TCP 50000

TCP 50000

DBQuery

N/A

N/A

Sybase

TCP 5000

TCP 5000

.NET Server

TCP 135

TCP 135

JBoss Server

Tomcat Server

TCP 1099

TCP 1099

Oracle Application Server

TCP 8888

TCP 8888

WebLogic Server

TCP 7001

TCP 7001

Glassfish Server

TCP 8686

TCP 8686

WebSphere Server

TCP 8080

TCP 8080

Apache

IIS Server

PHP

TCP 80

TCP 80

Exchange 2003

Exchange 2007

TCP 135

TCP 135

POP3

TCP 110

TCP 110

SMTP

TCP 25

TCP 25

Office SharePoint

TCP 135

N/A

WebSphere MQ

TCP 1414

TCP 1414

REST Service

SOAP Service

N/A

N/A

URL

TCP 80

N/A

Active Directory

TCP 135

TCP 135

LDAP Service

TCP 389

N/A

File

Directory

N/A

N/A

SNMP Service

UDP 161

UDP 161

FTP Service

TCP 21

TCP 21

SFTP Service

TCP 22

TCP 22

DNS Service

TCP 53

TCP 53

Java Runtime

TCP 1099

TCP 1099

 

Viewing the application default port list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Port Configuration.

The Default Configuration list is displayed.

Default configuration list contents

¡     Application Type—Name of the application type.

¡     Application Monitor Port—Default port value that identifies the type of applications in Auto Discovery.

¡     Traffic Collection Port—Default port value for data traffic collection.

¡     Modify—Click the Modify icon icon_modify_16x16.png to modify default port settings for the application type.

4.     Click Refresh to refresh the application default port list.

5.     Click Back to return to the Configurations page.

Modifying the application default port list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Port Configuration.

The Default Configuration list is displayed.

4.     Click the Modify icon icon_modify_16x16.png for the application type for which you want to modify the default ports.

5.     Modify the following parameters:

¡     Application Type—Cannot be modified.

¡     Application Monitor Port—Modify the default port value that identifies the application type in Auto Discovery.

¡     Traffic Collection Port—Modify the default port value for traffic collection. For information about the application types for which you can modify the default traffic collection ports, see Table 12.

6.     Click OK.

The modification has no effect on the applications already monitored.

Probe configuration

To collect traffic of applications, you must configure probes for APM to use. When no probes are configured or all probes are deleted, APM stops collecting application traffic and all application monitor reports no longer contain the application traffic area.

For operating system applications, probes identify their traffic by IP address. For other applications, probes identify their traffic by the combination of IP address and traffic collection port.

Probes must be installed and run on Linux. For more information about installing and configuring probes, see Probe Installation Guide.

Viewing the probe list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Probe Configuration.

The Probe List is displayed.

Probe list contents

¡     Name—Name of the probe. Click the name to view its details.

¡     IP Address—IP address of the probe.

¡     Description—Description of the probe.

¡     Modify—Click the Modify icon icon_modify_16x16.png to modify the probe settings.

¡     Delete—Click the Delete icon icon_delete_16x16.png to delete the probe.

4.     Click Refresh to refresh the probe list.

Viewing the probe details

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Probe Configuration.

The Probe List is displayed.

4.     Click the name of the probe whose details you want to view.

Probe details

¡     Name—Name of the probe.

¡     IP Address—IP address of the probe.

¡     Description—Description of the probe.

5.     Click Back to return to the probe list.

Adding a probe

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Probe Configuration.

The Probe List is displayed.

4.     Click Add.

5.     Configure the following parameters:

¡     Name—Enter the name of the probe. The name must be unique in APM.

¡     IP Address—Enter the IP address of the probe.

¡     Description—Enter a description of the probe.

¡     Password—Enter the password of the probe. The value must be the same as that configured on the probe.

6.     Click OK.

Modifying a probe

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Probe Configuration.

The Probe List is displayed.

4.     Click the Modify icon icon_modify_16x16.png for the probe you want to modify.

5.     Configure the following parameters:

¡     Name—Modify the name of the probe. The name must be unique in APM.

¡     IP AddressCannot be modified.

¡     Description—Modify the description of the probe.

6.     Click OK.

Deleting a probe

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Probe Configuration.

The Probe List is displayed.

4.     Click the Delete icon icon_delete_16x16.png for the probe you want to delete.

A confirmation dialog box opens.

5.     Click OK.

Deploying network configuration to probes

When you add an application monitor, APM automatically sends the network configuration (IP address or IP-to-port combination) of the monitored application to probes. If the network configuration failed to be delivered, troubleshoot the communication failure and manually deploy the network configuration to probes.

To deploy the network configuration of monitored applications to probes:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Probe Configuration.

The Probe List is displayed.

4.     Click Deploy.

APM deploys the network configuration of monitored applications to all probes on the list.

Parameter configuration

APM operating parameters include the monitor data retention periods and data background colors.

To modify APM operating parameters:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Parameter Configuration.

4.     Configure the following parameters as needed:

¡     Original Data Retention Time (Day)—Enter how many days APM will keep the original data collected from applications.

¡     Hourly Data Retention Time (Month)—Enter how many months APM will keep the hourly application data that is aggregated from the original data.

¡     Daily Data Retention Time (Year)—Enter how many years APM will keep the daily application data that is aggregated from the original data.

¡     Threshold-1 Color—Enter the RGB value of the background color for the monitor index data that meets the threshold-1 condition. Or you can click the box to select a color from the popup color panel. The default setting is RGB FFD200, representing orange.

¡     Threshold-2 Color—Enter the RGB value of the background color for the monitor index data that meets the threshold-2 condition. Or you can click the box to select a color from the popup color panel. The default setting is RGB FF0000, representing red.

¡     Whether IDC EnvironmentSelect Yes or No from the list. If you select Yes, you switch to the IDC cloud tenant environment, where the system displays functions according to your privileges, and you cannot switch back to non-IDC environment.

5.     Click OK next to each parameter you have configured.

6.     Click Back to return to the Configurations page.

APM administrator configuration

This feature is available only in IDC environment. Use this feature to configure the APM administrator privileges for an operator in the IMC system. For information about adding an operator to IMC, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

Viewing the APM administrator list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click APM Administrator Configuration.

The APM Administrator Configuration page opens.

APM Administrator configuration list contents

¡     Operator Name—Name used by the operator to log in to IMC.

¡     Operator Full Name—Full name of the operator.

¡     Type—Operator type. Options are System and Tenant. The System administrator has super administrator privileges.

¡     APM Server—APM server that can be managed by the operator.

¡     ModifyClick the Modify icon icon_modify_16x16.png to modify the operator configuration.

¡     Delete—Click the Delete icon icon_delete_16x16.png to delete the operator.

4.     Click Refresh to refresh the APM administrator list.

Adding an APM administrator

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click APM Administrator Configuration.

The APM Administrator Configuration page opens.

4.     Click Add.

The Add page opens.

5.     Configure the following basic information:

¡     Operator—Select an operator from the list.

¡     Type—Select the operator type. Options are System and Tenant.

¡     APM Server—Select the APM server that can be managed by the operator. The server 127.0.0.1 represents a centralized APM server or the primary server of a distributed APM server system. A System administrator can manage all servers by default.

6.     Click OK.

Modifying an APM administrator

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click APM Administrator Configuration.

The APM Administrator Configuration page opens.

4.     Click the Modify icon  for the APM administrator you want to modify.

5.     The Modify page opens.

6.     Configure the following basic information:

¡     Operator—Select an operator from the list.

¡     Type—Select the operator type. Options are System and Tenant.

¡     APM Server—Select the APM server that can be managed by the operator. The server 127.0.0.1 represents a centralized APM server or the primary server of a distributed APM server system. A System administrator can manage all servers by default.

7.     Click OK.

Deleting a template

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click APM Administrator Configuration.

The APM Administrator Configuration page opens.

4.     Click the Delete icon icon_delete_16x16.png for the APM administrator you want to delete.

A confirmation dialog box opens.

5.     Click OK.

Template configuration

APM provides application and agent templates. When you add application monitors or install agents remotely, use correct templates for them to simplify the configuration.

Viewing the template configuration list

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Template Configuration.

The Template Configuration page opens.

Template configuration list contents

¡     Template Name—Name of the template.

¡     Type—Type of the template. Options are Application Template (Application type), Agent Template(Windows), and Template(Linux).

¡     Description—Description of the template.

¡     ModifyClick the Modify icon icon_modify_16x16.png to modify the template configuration.

¡     Delete—Click the Delete icon icon_delete_16x16.png to delete the template.

4.     Click Refresh to refresh the template configuration list.

Adding an agent template

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Template Configuration.

The Template Configuration page opens.

4.     Click Add Template.

The Select Template Type window opens.

5.     Select Agent Template.

6.     Click OK.

The Add Agent Template page opens.

7.     Configure the following basic host information:

¡     Template Name—Enter a name for the template.

¡     Host Type—Select the host type that is compatible with the template. Options are Windows and Linux.

¡     Installation Path—Enter the absolute path used in the agent installation on the target host.

¡     Username—Enter the name of the user that has the administrator's privileges on the target host.

¡     Password—Enter the password for the user that has the administrator's privileges on the target host.

¡     Description—Enter a description for the template.

8.     Click OK.

Adding an application template

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Template Configuration.

The Template Configuration page opens.

4.     Click Add Template.

The Select Template Type window opens.

5.     Select Application Template.

6.     Select an application type from the Application Type list.

7.     Click OK.

The page for adding an application template for the selected application type opens.

8.     Configure the application monitoring parameters.

Different application types require different monitoring parameters. For more information, see the sections about adding application monitors for different application types.

9.     Click OK.

Modifying an agent template

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Template Configuration.

The Template Configuration page opens.

4.     Click the Modify icon  for the agent template you want to modify.

The Modify Agent Template page opens.

5.     Modify the following basic host information:

¡     Template Name—Cannot be modified.

¡     Host Type—Enter the host type that is compatible with the template. Options are Windows and Linux.

¡     Installation Path—Enter the absolute path used in the agent installation on the target host.

¡     Username—Enter the name of the user that has the administrator's privileges on the target host.

¡     Password—Enter the password for the user that has the administrator's privileges on the target host.

¡     Description—Enter a description of the template.

6.     Click OK.

Modifying an application template

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Template Configuration.

The Template Configuration page opens.

4.     Click the Modify icon  for the application template you want to modify.

The Modify Application Template page opens.

5.     Modify application monitoring parameters.

Different application types require different monitoring parameters. For more information, see the sections about adding application monitors for different application types.

6.     Click OK.

Deleting a template

Deleting templates does not affect existing applications and agents.

To delete a template:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Configurations.

The Configurations page opens.

3.     Click Template Configuration.

The Template Configuration page opens.

4.     Click the Delete icon icon_delete_16x16.png for the template you want to delete.

A confirmation dialog box opens.

5.     Click OK.


Application data display

APM displays application data by using widgets and a dashboard. You can custom the IMC home page or configure the dashboard to display data. For more information about the IMC home page and the dashboard, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

Widgets

You can custom widgets on the IMC home page. APM supports the Application Topology widget, Application Monitor widget, and Host Monitor widget.

Application Topology widget

Figure 40 shows the Application Topology widget. In the widget, you can view the availability and health states of applications, how applications and hosts are related to each other, and how the hosts are connected to the access devices and the physical network. The widget supports the same functions and operations as the application topology does. For more information, see "Topology and application group management."

Figure 40 Application Topology widget

 

By default, APM refreshes the Application Topology widget every 10 minutes.

To set the refresh interval for the Application Topology widget:

1.     Log in to IMC and add the Application Topology widget to the home page.

2.     Click the Set icon  in the right top corner of the Application Topology widget.

3.     Click Refresh Interval to open the Setting page.

4.     Select an interval from the list. Options are No Refresh, 1, 5, 10 and 30, in minutes. If you select No Refresh, click the Refresh icon 刷新.PNG in the right top corner of the widget to view the latest topology.

5.     Click OK.

Application Monitor widget

Figure 41 shows an Application Monitor widget. The contents displayed in the widget are the same as those in the application monitor list. Operators can control the displayed contents by customizing the application monitor list. For more information about customizing the application monitor list, see "Monitor management."

Figure 41 Application Monitor widget

 

Some contents of an application monitor widget might not be displayed due to the home page layout of IMC and browser window size. You can click the Move Left or Move Right icon on the title bar of the widget to view the contents that are not displayed.

By default, APM refreshes the Application Monitor widget every 10 minutes. You can modify the refresh interval and specify which applications to display.

Setting the filter conditions

The IMC home page can contain multiple Application Monitor widgets, each of which focuses on a group of applications filtered by application type, availability, or health state.

To set the filter conditions:

1.     Log in to IMC and add an Application Monitor widget to the home page.

2.     Click the Set icon  in the right top corner of the Application Monitor widget.

3.     Click Settings to open the Setting page.

4.     Specify the following parameters to filter applications to display in the widget:

¡     Name—Enter the name of the application monitor.

¡     Application Type—Select an application type from the list. For information about the options, see "Application Manager overview."

¡     Availability—Select availability from the list. Options are Unlimited, Available, Inaccessible, Unavailable, and Unmanaged.

¡     Health State—Select a health state from the list. Options are Unlimited, Healthy, Minor, Major, Critical, and --. The two consecutive hyphens (--) indicates that the application is inaccessible or unmanaged.

5.     Click Query. The widget displays the target applications.

6.     Click Reset. The widget displays all applications.

Setting the refresh interval

To set the refresh interval for an application monitor widget:

1.     Log in to IMC and add an Application Monitor widget to the home page.

2.     Click the Set icon  in the right top corner of the Application Monitor widget.

3.     Click Refresh Interval to open the Setting page.

4.     Select an interval from the list. Options are No Refresh, 1, 5, 10, and 30, in minutes. If you select No Refresh, click the Refresh icon 刷新.PNG in the right top corner of the widget to view the latest data.

5.     Click OK.

Host Monitor widget

Figure 42 illustrates the Host Monitor widget. In the widget, you can monitor the OS, CPU usage, content usage, availability, and health state of each host directly. You can open the operating system monitor report by clicking its name.

Figure 42 Host Monitor widget

 

Setting the refresh interval

By default, APM refreshes the Host Monitor widget every 10 minutes.

To set the refresh interval for the widget:

1.     Log in to IMC and add the Host Monitor widget to the home page.

2.     Click the Set icon  in the right top corner of the Host Monitor widget.

3.     Click Refresh Interval to open the Setting page.

4.     Select an interval from the list. Options are No Refresh, 1, 5, 10, and 30, in minutes. If you select No Refresh, the widget does not automatically refresh. To view the latest data, you must click the Refresh icon 刷新.PNG in the right top corner of the widget.

5.     Click OK.

Dashboard

APM can display application data in the dashboard. The following information describes the widgets supported by the dashboard.

Application List widget

The Application List widget displays application monitor parameters, as shown in Figure 43. For more information about the application monitor list, see "Monitor management."

Figure 43 Application List widget

 

To configure the Application List widget:

1.     Point to the My Favorites icon .

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Application List widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Click the Save icon .

An informational dialog box opens.

5.     Click OK.

Server-Memory widget

The Server-Memory widget displays the memory usage trend of servers in the most recent 1 hour, as shown in Figure 44.

Figure 44  Server-Memory widget

 

To configure the Server-Memory widget:

1.     Point to the My Favorites icon .

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Server-Memory widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Right-click the Server Memory Usage area and select Configure Parameters.

5.     Select servers, and then click OK.

6.     Click the Save icon .

An informational dialog box opens.

7.     Click OK.

Application Group widget

The Application Group widget has the same functions and operations as the group topology. For information about the functions and operations of the widget, see "Topology and application group management."

Figure 45 Application Group widget

 

To configure the Application Group widget:

1.     Point to the My Favorites icon.

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Application Group widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Right-click the Application Group area and select Configure Parameters.

5.     Select an application, and then click OK.

6.     Click the Save icon .

An informational dialog box opens.

7.     Click OK.

Server-CPU widget

The Server-CPU widget displays the CPU usage trend of servers in the most recent 1 hour, as shown in Figure 46.

Figure 46 Server-CPU widget

 

To configure the Server-CPU widget:

1.     Point to the My Favorites icon.

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Server-CPU widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Right-click the Server CPU Usage area and select Configure Parameters.

5.     Select servers, and then click OK.

6.     Click the Save icon .

An informational dialog box opens.

7.     Click OK.

Server-Flux widget

The Server-Flux widget displays the receive traffic (Rx) and send traffic (Tx) of servers in the most recent 1 hour, as shown in Figure 47.

Figure 47 Server-Flux widget

 

To configure the Server-Flux widget:

1.     Point to the My Favorites icon.

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Server-Flux widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Right-click the Server Traffic area and select Configure Parameters.

5.     Select servers, and then click OK.

6.     Click the Save icon .

An informational dialog box opens.

7.     Click OK.

Server-Disk widget

The Server-Disk widget displays the disk usage of servers, as shown in Figure 48.

Figure 48 Server-Disk widget

 

To configure the Server-Disk widget:

1.     Point to the My Favorites icon.

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Server-Disk widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Right-click the Server Disk Usage area and select Configure Parameters.

5.     Select servers, and then click OK.

6.     Click the Save icon .

An informational dialog box opens.

7.     Click OK.

URL Sequence widget

The URL Sequence widget displays the status of a URL sequence, whose content is the same as the URL sequence monitor report. For more information, see "HTTP service monitor."

Figure 49 URL Sequence widget

 

To configure the URL Sequence widget:

1.     Point to the My Favorites icon.

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the URL Sequence widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Right-click the URL Sequence area and select Configure Parameters.

5.     Select a URL sequence application, and then click OK.

6.     Click the Save icon .

An informational dialog box opens.

7.     Click OK.

Application Topology widget

The application topology widget has the same functions and operations as the application topology. For more information, see "Topology and application group management."

Figure 50 Application Topology widget

 

To configure the Application Topology widget:

1.     Point to the My Favorites icon.

2.     From the menu that opens, select Dashboard > Configuration.

The dashboard configuration window opens.

3.     In the widget area, select the Application Topology widget icon  and drag it to the panel below.

To change the widget size, drag the widget frames.

4.     Click the Save icon .

An informational dialog box opens.

5.     Click OK.


Windows OS monitor

APM monitors the following Windows OS applications:

·     Windows

·     Windows performance counters

This chapter describes how to add and modify Windows OS application monitors, and helps you view relevant monitor reports.

Windows

Windows operating systems provide a base platform for a variety of desktop-oriented applications. To ensure service quality, its performance and stability must be guaranteed.

Adding a Windows application monitor

APM can locally or remotely monitor Windows operating systems through WMI or SNMP. When you add Windows application monitors, follow these guidelines:

·     To monitor a Windows operating system through an agent, deploy the agent on the host on which the Windows operating system is installed. For more information about agents, see "APM agent management."

·     To monitor a Windows operating system through WMI:

¡     Enable and configure WMI for the host on which the Windows operating system is installed. For more information about enabling WMI on Windows, see the Microsoft Windows online help.

¡     Obtain the username and password of the user who has the Windows administrator's privileges.

·     To monitor a Windows operating system through SNMP:

¡     Enable and configure SNMP for the host on which the Windows operating system is installed. For more information about enabling SNMP on Windows, see the Microsoft Windows online help.

¡     Obtain the read-only and read-write community strings.

·     Add the Windows hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Window operating system application, make sure at least one probe is configured in APM. After a Windows application monitor is added, APM sends the IP address of the monitored Windows operating system application to the probes for traffic collection.

The following task is performed in remote monitor mode. When the local monitor mode is used, you need to configure only part of the parameters that are required for the remote monitor mode.

To add a Windows application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Management > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Windows of the Windows Server Monitor class.

The page for adding a Windows application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host where the Window operating system to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SNMP or WMI) through which APM monitors the application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SNMP is selected, configure the following parameters:

-     Edit SNMP Parameters—Select this option if you want to manually configure SNMP parameters for APM. Make sure the SNMP settings are the same as those on the Windows host.

-     Select an Existing Template—Select this option if you want to select an existing SNMP template for APM. For information about setting SNMP parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Parameter Type—Select the SNMP parameter type. Options are SNMPv1, SNMPv2c, and SNMPv3 Template. The SNMPv3 Template option is available only when Select an Existing Template is selected.

-     Read-Only Community String—Enter the SNMP read-only community string, with which APM can read MIB variables from the Windows host.

-     Read-Write Community StringEnter the read-write SNMP community string, with which APM can read MIB variables from or write MIB variables to the Windows host.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for an SNMP response from the Windows host. The value range is 1 to 60 seconds and the default is 4 seconds. If no SNMP response is received from the Windows host within the timeout time, APM considers the interaction a failure.

-     Retries (1-20)Enter how many times APM retries to send SNMP packets to the Windows host.

When WMI is selected, configure the following parameters:

-     Username—Enter the username of the Windows administrator.

If the administrator is a domain user, use domain name\username.

If the administrator is a local user, use host name\username, IP address\username, or username.

-     Password—Enter the password of the administrator.

-     Enable Event Logging—Select Enable or Disable from the list. If you select Enable, configure the event logging threshold and type. The event logging type can be Error, Warning, Information, Security Audit Success, or Security Audit Failure.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Windows applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Windows depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Windows application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Windows application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Windows application monitor. When the IP address of a Windows host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Windows application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Windows application monitor you want to modify.

The page for modifying the Windows application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Windows application monitor."

5.     Click OK.

Viewing the Windows application monitor report

After adding a Windows operating system application monitor, APM collects application index data to calculate its availability and health status. You can obtain monitor indexes for the Windows operating system by viewing the monitor report.

To view the Windows application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Windows application monitor to display the report.

Figure 51 shows part of a Windows application monitor report.

Figure 51 Part of a Windows application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Windows operating system.

·     IP Address—Windows host IP address.

·     Application Type—Type of the monitored application, which is always Windows.

·     Version—Version of the Windows operating system.

·     System Running Time—Duration since the startup of the Windows application to the time when APM last polled the Windows application.

·     Last Polling Time—Time when APM last polled the Windows operating system.

·     RelationshipClick the Relationship icon  to view dependencies between the Windows application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Windows operating system. This field is not displayed if no alarm is generated by the Windows operating system.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Windows operating system in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the Windows operating system in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Windows operating system in the last 30 days.

·     Available Time—Total amount of time that the Windows operating system was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Windows operating system was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Windows operating system was unavailable after 00:00 today.

·     Unmanaged Time—Total amount of time that the Windows operating system was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage Ratio—CPU usage of the Windows operating system in the last polling interval.

¡     Click the Set Threshold icon  to set the CPU usage alarm thresholds for the Windows operating system.

¡     Click the History Record icon icon_history_16x16.png to view statistics of the history graph of the CPU usage for the Windows operating system.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the Windows application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the Windows application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

CPU Performance

The CPU Performance area contains the following fields:

·     CPU Name—Name of the Windows server CPU.

·     Privileged TimePercentage of the privileged time to the total running time of the system.

·     Processor Time—CPU usage ratio of the system.

·     User Time—Percentage of the CPU user time to the total running time of the system.

·     Interrupt Time—Percentage of the CPU interrupts time to the total running time of the system.

·     Interrupts Rate—Number of CPU interrupts per second.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Paging

The Paging area contains the following fields:

·     Cache—Total cache capacity for paging.

·     Page Faults Rate—Number of page faults per second.

·     Page Reads Rate—Number of page reads per second.

·     Page Writes Rate—Number of page writes per second.

·     Pages Input Rate—Number of page inputs per second.

·     Pages Output Rate—Number of page outputs per second.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Ping Test

APM pings the Windows host every polling interval. In a ping test, APM sends up to three ICMP packets to the host. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Ping response time in the last ping test. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets sent in the last ping test. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP responses received by APM in the last ping test. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

Service

By default, APM does not monitor any service, and the service list is empty. APM collects state information of services after they are selected.

The Service area contains the following fields:

·     Config—Click the Config icon  to populate the Application Instance List with all detected services running on the Windows operating system. Select the desired services, and then click OK. APM collects state information about the selected services in the next polling interval.

·     Service Name—Original name of the service.

·     Display Name—Service name or alias displayed on the Windows service console. For example, on the Windows service console, the DHCP client service uses the alias DHCP Client Service rather than the original name Dhcp. Typically, the display name identifies a service more clearly.

·     State—State of the service in the last polling interval. Click the Start Service icon  or Stop Service icon  to start or stop a service. This function is available only for Windows operating systems monitored through WMI on IMC installed on a Windows server

Disk Usage Ratio

Use the Disk Usage Ratio area layout to view how data is allocated on each root disk (physical disk, partition, or logical volume).

The Disk Usage Ratio area contains the following fields:

·     Disk—Drive letter of the disk, which can be a physical drive, a partition, or a logical volume.

·     Usage Ratio—Disk space usage.

¡     Click the Set Threshold icon  for a disk to set space usage alarm thresholds for it.

¡     Click the History Record icon icon_history_16x16.png for a disk to view statistics of the history graph of the space usage of the disk.

·     In UseUsed space of the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the used disk space.

·     Free Space—Free space of the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the free disk space.

Share Disk

The Share Disk area contains the following fields:

·     Share Disk Name—Name of a share disk on the Windows server.

·     Share Disk Usage Ratio—Usage ratio of the share disk.

·     Share Disk In Use—Used space of the share disk.

·     Share Disk Size—Total space of the share disk.

·     Share Disk Incremental—Incremental between two successive collections.

·     Share Disk Path—Share path of the share disk.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

I/O State

The I/O State area contains the following fields:

·     Disk Name—Name of a disk on the Windows server.

·     I/O Read&Write Rate—Rate at which bytes are transferred to or from the disk during write or read operations.

·     I/O Read Rate—Rate at which bytes are transferred from the disk during read operations.

·     I/O Write Rate—Rate at which bytes are transferred to the disk during write operations.

·     Disk Queue Length—Number of requests outstanding on the disk at the time the performance data is collected.

·     Disk Read Time—Percentage of disk read time.

·     Disk Write Time—Percentage of disk write time.

·     Disk Reads Rate—Number of disk reads per second.

·     Disk Writes Rate—Number of disk writes per second.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Application Traffic

APM collects traffic statistics for the Windows operating system based on the IP address of the Windows host when probes are added to APM.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Windows operating system over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Windows operating system since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Name of the network interface card (NIC). APM monitors both physical and virtual (logical) network interface cards.

·     Bandwidth—Maximum bandwidth of the NIC.

·     Receive Rate—Receive rate of the NIC in the last polling interval.

¡     Click the Set Threshold icon  for the NIC to set alarm thresholds for the receive rate.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the receive rate.

·     Send RateSend rate of the NIC in the last polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on the NIC in the last polling interval.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on the NIC in the last polling interval.

TCP Connections

The TCP Connections area contains the following fields:

·     Active Connections Rate—Number of active connections per second.

·     Passive Connections Rate—Number of passive connections per second.

·     Failed Connections Rate—Number of failed connections per second.

·     Reset Connections Rate—Number of reset connections per second.

·     Established Connections—Number of established connections.

·     Received Segments Rate—Number of received segments per second.

·     Sent Segments Rate—Number of sent segments per second.

·     Retransmitted Segments Rate—Number of retransmitted segments per second.

Click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Adapter

The Adapter area contains the following fields:

·     Adapter ID—Device ID of the adapter.

·     Adapter Type—Type of the adapter.

·     Max Speed—Maximum transmission speed of the adapter.

·     Net Connection Status—Network connection status of the adapter. Values include:

¡     Disconnect

¡     Connecting

¡     Connected

¡     Disconnecting

¡     Hardware Not Present

¡     Hardware Disabled

¡     Hardware Malfunction

¡     Media Disconnected

¡     Authenticating

¡     Authentication Succeeded

¡     Authentication Failed

¡     Invalid address

¡     Credentials Required

·     Last Reset Time—Last reset time of the adapter.

·     MAC Address—MAC address of the adapter.

·     Adapter Description—Description of the adapter.

Process

By default, APM does not monitor any process, and the process list is empty. APM collects CPU and memory usages of selected processes.

The Process area contains the following fields:

·     Config—Click the Config icon  to quickly populate the Application Instance List with all detected processes running on the Windows operating system. Select the desired processes, and then click OK. APM collects CPU and memory usages of the selected processes in the next polling interval.

·     Process Name—Name of the process.

·     CLI—Command line used to start the process.

·     CPU Usage—CPU usage of the process in the last polling interval.

¡     Click the Set Threshold icon  for a process to set CPU usage alarm thresholds for the process.

¡     Click the History Record icon icon_history_16x16.png for a process to view the CPU usage history graph for the process.

·     Memory Usage—Memory usage of the process in the last polling interval. Click the History Record icon icon_history_16x16.png for a process to view the memory usage history graph for the process.

Process Number

The Process Number area contains the following field:

Process Number—Number of processes on the Windows server.

Thread Number

The Thread Number area contains the following field:

Thread Number—Number of threads on the Windows server.

Event

To monitor Windows events in APM, ensure the Monitor Type is set to WMI and the Enable Event Logging option is selected for the Windows application monitor.

The Event area contains the following fields:

·     Generation Time—Time when the event occurred.

·     Event Type—Type of the event. When adding Windows application monitors, you can specify event types. Options are Error, Warning, Information, Security Audit Success, and Security Audit Failure.

·     Log File—File that records the event.

·     Event Code—Event ID that is defined by Windows.

·     Source Name—Source of the event.

·     Event Category—Category of the event.

·     Description—Description of the event.

Memory Info

The Memory Info area contains the following fields:

·     Tag—Memory card tag on the Windows server.

·     Capacity—Capacity of memory.

·     Device Locator—Position of the memory card on the Windows server.

CPU Info

The CPU Info area contains the following fields:

·     CPU DeviceID—Device ID of the CPU.

·     Cores—Number of CPU cores.

·     Logical Processors—Number of logical processors of the CPU.

·     CPU Name—Name of the CPU.

·     Manufacturer—Manufacturer of the CPU.

·     Clock Speed—Clock speed of the CPU.

Base Board

The Base Board area contains the following fields:

·     Serial Number—Serial number of the base board.

·     Manufacturer—Manufacturer of the base board.

·     ProductModel of the base board.

·     Status—Status of the base board.

Fan Info

The Fan Info area contains the following fields:

·     Fan Name—Name of the fan.

·     Fan Status—Status of the fan.

Host

The Host area contains the following fields:

·     ManufacturerManufacturer of the host.

·     ModelModel of the host.

·     Host NameName of the host.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product that the board applies to.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

Windows performance counters

Microsoft Windows performance counters monitor the performance data of various Microsoft products. Windows performance counters monitor belongs to the common monitor. APM can read the values of the performance counters to help you monitor Microsoft products.

Adding a Windows performance counter application monitor

APM can locally or remotely monitor Windows performance counters through WMI. When you add Windows performance counters application monitors, follow these guidelines:

·     To monitor a Windows operating system through an agent, deploy the agent on the host on which the Windows operating system is installed. For more information about agents, see "APM agent management."

·     To monitor a Windows operating system through WMI:

¡     Enable and configure WMI for the host on which the Windows operating system is installed. For more information about enabling WMI on Windows, see the Microsoft Windows online help.

¡     Obtain the username and password of the user who has the Windows administrator's privileges.

·     Add the Windows hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     One application monitor can monitor at most 20 performance counters on an operating system. To monitor more performance counters, add more application monitors for the operating system.

The following task is performed in remote monitor mode. When the local monitor mode is used, you need to configure only part of the parameters that are required for the remote monitor mode.

To add a Windows performance counter application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Management > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Performance Counter of the Windows Server Monitor class.

The page for adding a Windows performance counter application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host where the Window operating system hosting the performance counters to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the Windows administrator. This field is available only when you select Disable from the Use Template list.

-     If the administrator is a domain user, use domain name\username.

-     If the administrator is a local user, use host name\username, IP address\username, or username.

¡     Password—Enter the password of the administrator. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Windows performance applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the Windows performance counter depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the Windows performance counter and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Windows performance counter application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

 

 

NOTE:

The performance counters to be monitored are configured in the monitor report of the Windows performance counter application. You do not need to specify them when adding the application monitor.

 

Modifying a Windows performance counter application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Windows performance counter application monitor. When the IP address of a Windows performance counter host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Windows performance counter application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Windows performance counter application monitor you want to modify.

The page for modifying the Windows performance counter application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Windows performance counter application monitor."

5.     Click OK.

Viewing the Windows performance counter application monitor report

After adding a Windows performance counter application monitor, operators must specify in the monitor report which performance counters are to be monitored. APM collects the index data of the specified performance counters to calculate their availability and health status. You can obtain monitor indexes for the performance counters by viewing the monitor report.

To view the Windows performance counter application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Windows performance counter application monitor to display the report.

Figure 52 shows part of a Windows application monitor report.

Figure 52 Part of a Windows performance counter application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Windows performance counter.

·     IP Address—IP address of the host running the Windows operating system.

·     Application Type—Type of the monitored application, which is always Performance Counter.

·     Last Polling Time—Time when APM last polled the Windows performance counter.

·     RelationshipClick the Relationship icon  to view dependencies between the Windows performance counter and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Windows performance counter. This field is not displayed if no alarm is generated by the Windows performance counter.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Windows performance counter in the last polling interval.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of Windows performance counter in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Windows performance counter in the last 30 days.

·     Available Time—Total amount of time that the Windows performance counter was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Windows performance counter was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Windows performance counter was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Windows performance counter was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Ping Test

APM pings the host where the Windows performance counters are located at every polling interval. In a ping test, APM sends out a maximum of three ICMP packets to the host. When it receives a response, APM considers the ping test a success and records the response time. If it does not receive a response after sending three ICMP packets, APM considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Ping response time in the last ping test. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets sent in the last ping test. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP responses received by APM in the last ping test. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

Performance Counter

By default, the performance counter list is empty. APM collects the index data of the selected performance counters. You can monitor up to 20 performance counters in one application monitor.

The Performance Counter area contains the following fields:

·     Config—Click the Config icon  to populate the Application Instance List with all detected performance counters on the Windows operating system. Select the desired performance counters, and then click OK. APM collects index data of the selected performance counters in the next polling interval.

·     Category—Category of the performance counter. The performance counter category corresponds to the Level-1 menu item in the left navigation tree of the Application Instance List window.

·     Instance—Instance of the performance counter category. For example, the Win32_PerfFormattedData_PerfOS_Processor category contains four instances, 1, 2, 3, 4, and _Total, which in turn represent CPU cores 1, 2, 3, 4, and the total CPU. The instance corresponds to the Level--2 menu item in the left navigation tree of the Application Instance List window.

·     Attribute/Value—Performance counter name and data.

Detailed information about performance counter

This area displays detailed information of each monitored performance counter.

The Detailed information area contains the following fields:

·     Catalog/Instance—Category and instance name of the performance counter.

·     Attribute/ValueAttribute and value collected for the performance counter in the last polling interval.


UNIX server monitor

AIX

AIX can be installed on various types of IBM servers. The performance and stability of AIX greatly affects the performance of applications running on it.

Adding an AIX application monitor

APM monitors AIX applications through CLI. When you add AIX application monitors, follow these guidelines:

·     Enable Telnet or SSH on AIX. For more information, see the AIX configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the AIX administrator's privileges.

·     Add AIX hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the AIX application, make sure at least one probe is configured in APM. After an AIX application monitor is added, APM sends the IP address of the monitored AIX application to the probes for traffic collection.

To add an AIX application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click AIX of the UNIX Server Monitor class.

The page for adding an AIX application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the AIX application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the AIX application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on AIX.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the AIX administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on AIX.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from AIX. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from AIX within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the AIX host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on AIX.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the AIX administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from AIX. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from AIX within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of AIX applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that AIX depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the AIX application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an AIX application monitor

Authorized users can modify all parameters except the IP address and the APM server for an AIX application monitor. When the IP address of a monitored AIX host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an AIX application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click AIX of the UNIX Server Monitor class.

4.     Click the Modify icon icon_modify_16x16.png for the AIX application monitor you want to modify.

The page for modifying the AIX application monitor opens.

5.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an AIX application monitor."

6.     Click OK.

Viewing the AIX application monitor report

After an AIX application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for AIX by viewing the monitor report.

To access the AIX application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an AIX application monitor to display the report.

Figure 53 shows part of an AIX monitor report.

Figure 53 Part of an AIX application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored AIX application.

·     IP Address—IP address of the AIX host.

·     Application TypeType of the monitored application, which is always AIX.

·     VersionVersion of the AIX operating system.

·     System Running TimeDuration since the startup of the AIX application to the time when APM last polled the AIX application.

·     Last Polling Time—Time when APM last polled the AIX application.

·     Relationship—Click the Relationship icon  to view dependencies between the AIX application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the AIX host. If no alarm is generated by AIX, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the AIX application in the last polling period.

¡     Click the Weekly History icon  to view the availability of the AIX application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the AIX application in the last 30 days.

·     Available Time—Total amount of time that the AIX application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the AIX application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the AIX application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the AIX application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage Ratio—CPU usage ratio of the AIX application in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical Memory—Physical memory of the AIX application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the AIX application, which corresponds to the disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the memory (including the physical memory and swap memory) usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

CPU Performance

The CPU Performance area contains the following fields:

·     CPU NameName of the AIX server CPU.

·     Load PercentagePercentage of the load time.

·     User Percentage—Percentage of the user time.

·     System Percentage—Percentage of the system time.

·     I/O Wait PercentagePercentage of the I/O wait time.

·     Idle PercentagePercentage of the idle time.

Paging

The Paging area contains the following fields:

·     Paging InNumber pages that are paged in during the interval.

·     Paging OutNumber pages that are paged out during the interval.

Connection State

·     Established Connections—Number of established TCP connections.

·     CLOSE_WAIT—Number of connections in CLOSE_WAIT state.

·     TIME_WAIT—Number of connections in TIME_WAIT state.

Ping Test

When the polling interval expires, APM pings the AIX host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the AIX application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that APM sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the packets sent.

·     Packets Received—Number of ICMP response packets that APM received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the packets received.

System Load

APM analyzes and displays the system load average for the monitored AIX in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the AIX system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load over the last 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load over the last 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load over the last 15 minutes.

System Call

The System Call area contains the following field:

·     System Calls—Number of AIX system calls per second.

Process Count

The Process Count area contains the following fields:

·     Active Process CountNumber of active processes in the AIX system.

·     Non-Root ProcessNumber of non-root user processes.

·     Await Resource ProcessNumber of processes that wait for resources.

File System Usage Ratio

The AIX file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system matches a physical disk partition or logical volume. The AIX application writes data to or reads data from the physical disk partition or logical volume by using the matching directory.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the AIX directory structure.

·     File System Usage Ratio—Space usage ratio of the AIX file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the partition or logical volume. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval. Zombie processes in AIX do not have process names.

·     IDUnique identifier of the zombie process on the OS.

·     Parent ID—ID of the parent process for the zombie process.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     Memory Usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

APM collects AIX traffic based on the IP address of the host where the application resides.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by AIX over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by AIX since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in AIX. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of AIX network interface cards.

·     Send RateSend rate of the network interface card in the last polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on the network interface card in the last polling interval.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on the network interface card in the last polling interval.

Error Log

APM examines the AIX error logs when APM polls AIX applications and displays the first 10 error logs obtained in the AIX application monitor report.

The Error Log area contains the following fields:

·     Time—Time when the error occurred in the last polling interval.

·     Log—Content of the error log in the last polling interval.

·     MoreClick More to view all error logs occurred in the last polling interval.

Process

By default, the list does not contain any processes. To monitor a process on AIX, click the Configuration icon  to select the processes to be monitored. APM collects the index data including CPU usage and memory usage for the monitored processes when APM polls applications next time.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     NameName of the monitored process. APM can respectively collect index data for the processes that have the same name but different Process Identifiers (PIDs). You cannot view the history graph of index data for the processes that have the same name.

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process of the process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     Memory UsageMemory usage ratio of the monitored process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

I/O State

APM can monitor the I/O status of the disk drivers in the AIX system.

The I/O State area contains the following fields:

·     Device NameName of the disk drivers in the AIX system.

·     I/O Rate—Size of the input/output data in the disk driver per second in the last polling interval.

·     I/Os/SecNumber of transfer times in the disk driver per second in the last polling interval. A transfer is an I/O request to the physical disk. Multiple logical requests can be integrated into a single I/O request to the disk. The size of the transferred data in each transfer is not fixed.

inode

An index node is called inode for short. The inodes are required when you create a file or directory in the AIX file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system of the AIX application.

·     Total—Total number of available inodes in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the inode usage ratio in the file system.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Session Information

The Session Information area displays AIX session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to the AIX application in the last polling interval.

·     TTY—TTY used by the user.

·     Login Time—Time when the user logged in to the AIX application.

·     Idle—Idle time after the user logged in to the AIX application.

·     Command—Most recently executed command after the user logged in to the AIX application.

Disk Mount

The Disk Mount area displays AIX disk mount information.

The Disk Mount area contains the following fields:

·     Disk NameName of the disk.

·     Disk StateMount status of the disk.

·     Disk LocationLocation where the disk is mounted.

·     Disk DescriptionDescription of the disk.

Adapter

The Adapter area displays AIX adapter mount information.

The Adapter area contains the following fields:

·     Adapter NameName of the adapter.

·     Adapter StateMount status of the adapter.

·     Adapter LocationLocation where the adapter is mounted.

·     Adapter DescriptionDescription of the adapter.

Cluster Information

The Cluster Information area displays AIX cluster information.

The Cluster Information area contains the following fields:

·     Group NameName of the group to which each node in the cluster belongs.

·     StatusStatus of each node in the cluster.

·     Node NameName of each node in the cluster.

MPIO

The MPIO area displays AIX MPIO information.

The MPIO area contains the following fields:

·     MPIO StateStatus of the MPIO.

·     MPIO DeviceName of the destination device of the MPIO.

·     MPIO ParentName of the source device of the MPIO.

Error Device Information

The Error Device Information area displays error information for the physical device where the OS is located.

The Error Device Information area contains the following fields:

·     IdentifierID of the error.

·     TimeTime when the error occurred.

·     TypeSeverity of the error. Options are:

¡     PThe error might be caused by loss of devices or functional components, performance degradation, or corruption of hardware or software.

¡     TThe error is temporary and has been eliminated after retries.

¡     IThe message is an informational message. No error occurred.

¡     UThe severity of the error is unknown.

·     ClassSource of the error. Options are:

¡     HHardware or media failure.

¡     SSoftware failure.

¡     OHuman error.

¡     UUnknown.

·     Resource NameName of the resource where the error occurred.

·     DescriptionDescription of the error.

Memory Info

The Memory Info area contains the following fields:

·     Memory Serial NumberSerial number of the memory card on the AIX server.

·     Memory SizeSize of the memory.

·     LocationMemory card position on the server.

Thermal

The Thermal area contains the following fields:

·     Thermal SensorName of the thermal sensor on the AIX server.

·     DegreesTemperature of the server, in degrees Celsius.

·     StatusTemperature status of the server.

·     LocationThermal sensor position on the server.

Fan Speed

The Fan Speed area contains the following fields:

·     Fan SensorName of the fan sensor on the AIX server.

·     Fan SpeedFan speed of the server

·     StatusFan status of the server.

·     LocationFan sensor position on the server.

Processor Info

The Processor Info area contains the following fields:

·     Processor NameName of the CPU processor on the AIX server.

·     Processor StateStatus of the CPU processor.

·     PositionCPU processor position on the server.

·     DescriptionDescription of the CPU processor.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product that the board applies to.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

SCO UNIX

SCO UNIX is a UNIX operating system developed by SCO.

Adding an SCO UNIX application monitor

APM can monitor SCO UNIX through CLI. When you add application monitors for SCO UNIX, follow these guidelines:

·     Enable and configure Telnet or SSH on SCO UNIX. For information about enabling Telnet or SSH on SCO UNIX, see the SCO UNIX configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the SCO UNIX administrator's privileges.

·     Add SCO UNIX hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the SCO UNIX application, make sure at least one probe is configured in APM. After an SCO UNIX application monitor is added, APM sends the IP address of the monitored SCO UNIX application to the probes for traffic collection.

To add an SCO UNIX application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click SCO UNIX of the UNIX Server Monitor class.

The page for adding an SCO UNIX application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the SCO UNIX application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the SCO UNIX application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on SCO UNIX.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the SCO UNIX administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on SCO UNIX.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from SCO UNIX. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from SCO UNIX within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the SCO UNIX host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on SCO UNIX.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the SCO UNIX administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from Solaris. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from SCO UNIX within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SCO UNIX applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that SCO UNIX depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the SCO UNIX application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an SCO UNIX application monitor

Authorized users can modify all parameters except the IP address and the APM server for an SCO UNIX application monitor. When the IP address of a monitored SCO UNIX host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an SCO UNIX application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the SCO UNIX application monitor you want to modify.

The page for modifying the SCO UNIX application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an SCO UNIX application monitor."

5.     Click OK.

Viewing the SCO UNIX application monitor report

After an SCO UNIX application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for SCO UNIX by viewing the monitor report.

To access the SCO UNIX application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an SCO UNIX application monitor to display the report.

Figure 54 shows part of an SCO UNIX monitor report.

Figure 54 Part of an SCO UNIX application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored SCO UNIX application.

·     IP Address—IP address of the SCO UNIX host.

·     Application TypeType of the monitored application, -which is always SCO UNIX.

·     VersionVersion of the SCO UNIX operating system.

·     System Running TimeDuration since the startup of the SCO UNIX application to the time when APM last polled the SCO UNIX application.

·     Last Polling Time—Time when APM last polled the SCO UNIX application.

·     Relationship—Click the Relationship icon  to view dependencies between the SCO UNIX application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the SCO UNIX host. If no alarm is generated by the SCO UNIX application, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SCO UNIX application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the SCO UNIX application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the SCO UNIX application in the last 30 days.

·     Available Time—Total amount of time that the SCO UNIX application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SCO UNIX application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the SCO UNIX application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SCO UNIX application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage—CPU usage ratio of the SCO UNIX application in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical memory—Physical memory of the SCO UNIX application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the SCO UNIX application, which corresponds to the disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Amount of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the memory (including physical memory and swap memory) usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the SCO UNIX host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the AIX application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that APM sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the packets sent.

·     Packets Received—Number of ICMP response packets that APM received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the packets received.

System Load

APM analyzes and displays the system load average for the monitored SCO UNIX application in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the SCO UNIX system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 15 minutes.

File System Usage Ratio

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the SCO UNIX directory structure.

·     File System Usage—Space usage of the SCO UNIX file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     Used Space—Used space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the partition or logical volume. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval. Zombie processes in SCO UNIX do not have process names.

·     Process IDUnique identifier of the zombie process on the OS.

·     Parent ID—ID of the parent process for the zombie process.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

APM collects SCO UNIX traffic based on the IP address of the host where the application is located.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by SCO UNIX over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by SCO UNIX since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in SCO UNIX.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of SCO UNIX network interface cards.

·     Send RateSend rate of the network interface card in the last polling interval.

·     Error Packet Receive Rate—Number of inbound erroneous packets per second on the network interface card in the last polling interval.

·     Error Packet Send Rate—Number of outbound erroneous packets per second on the network interface card in the last polling interval.

inode

Index nodes (inodes) are required when you create a file or directory in the SCO UNIX file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system of the SCO UNIX application.

·     Total inodes—Total number of available inodes in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of inodes in the file system.

·     Free inodes—Number of inodes that are not used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of idle inodes in the file system.

·     Used inodes—Number of inodes that have been used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of used inodes in the file system.

·     Usage—Usage of inodes in the file system in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the inode usage in the file system.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the inode usage in the file system.

Process

By default, the list does not contain any processes. To monitor a process on SCO UNIX, click the Configuration icon  to select the processes to be monitored. APM collects the index data including CPU usage for the monitored processes when APM polls applications next time.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     Process NameName of the monitored process. APM can respectively collect CPU usage and memory usage for the processes that have the same name but different PIDs.

·     Process IDUnique identifier of the monitored process on the OS.

·     Parent ID—ID of the parent process of the monitored process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

Session Information

The Session Information area displays SCO UNIX session login information.

The Session Information area contains the following fields:

·     Username—User logging in to the SCO UNIX application in the last polling interval.

·     TTY—TTY used by the user.

·     Login Time—Time when the user logged in to the SCO UNIX application.

·     Login IPClient IP address used when the user logged in to SCO UNIX.

·     Idle—Idle time after the user logged in to the SCO UNIX application.

·     Command—Most recently executed command after the user logged in to the SCO UNIX application.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

Solaris

Solaris can be installed on the servers with x86 or SPARC processors. The performance and stability of Solaris greatly affects the performance of applications or services running on it.

Adding a Solaris application monitor

APM monitors Solaris applications through SNMP or CLI. When you add Solaris application monitors, follow these guidelines:

·     To monitor Solaris applications through SNMP, enable SNMP on Solaris and obtain read-only and read-write community strings. For information about enabling SNMP on Solaris, see the Solaris online help.

·     To monitor Solaris applications through CLI, enable Telnet or SSH on Solaris and obtain the username and password of the Telnet or SSH user who has the Solaris administrator's privileges. For information about enabling Telnet or SSH on Solaris, see the Solaris configuration guide.

·     Add Solaris hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Solaris application, make sure at least one probe is configured in APM. After a Solaris application monitor is added, APM sends the IP address of the monitored Solaris application to the probes for traffic collection.

To add a Solaris application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Solaris of the UNIX Server Monitor class.

The page for adding a Solaris application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Solaris application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, Telnet, or SNMP) through which APM monitors the Solaris application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SNMP is selected, configure the following parameters:

-     Edit SNMP Parameters—Select this option if you want to manually configure SNMP parameters for APM. Make sure the SNMP settings are the same as those on Solaris.

-     Select an Existing Template—Select this option if you want to select an existing SNMP template for APM. For information about setting SNMP parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Parameter TypeSelect the SNMP parameter type. Options are SNMPv1, SNMPv2c, and SNMPv3 Template. The SNMPv3 Template option is available only when Select an Existing Template is selected.

-     Read-Only Community StringEnter the SNMP read-only community string, with which APM can read MIB variables from the Solaris host.

-     Read-Write Community StringEnter the read-write SNMP community string, with which APM can read MIB variables from or write MIB variables to the Solaris host.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for an SNMP response from Solaris. The value range is 1 to 60 seconds and the default is 4 seconds. If no SNMP response is received from Solaris within the timeout period, APM considers that the interaction has failed.

-     Retries (1-20)Enter how many times APM retries to send SNMP packets to the Solaris host.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on Solaris.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the Solaris administrator's privileges.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on Solaris.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from Solaris. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from Solaris within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the Solaris host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on Solaris.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the Solaris administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from Solaris. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from Solaris within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Solaris applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Solaris depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Solaris application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Solaris application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Solaris application monitor. When the IP address of a monitored Solaris host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Solaris application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Solaris application monitor you want to modify.

The page for modifying the Solaris application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Solaris application monitor."

5.     Click OK.

Viewing the Solaris application monitor report

After a Solaris monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for Solaris by viewing the monitor report.

To access the Solaris application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Solaris application monitor to display the report.

Figure 55 shows part of a Solaris monitor report.

Figure 55 Part of a Solaris application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored Solaris application.

·     IP Address—IP address of the Solaris host.

·     Application TypeType of the monitored application, which is always Solaris.

·     Version—Version of the Solaris operating system.

·     System Running Time—Duration since the startup of the Solaris application to the time when APM last polled the Solaris application.

·     Last Polling Time—Time when APM last polled the Solaris application.

·     Relationship—Click the Relationship icon  to view dependencies between the Solaris application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Solaris host. If no alarm is generated by Solaris, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Solaris application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the Solaris application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Solaris application in the last 30 days.

·     Available Time—Total amount of time that the Solaris application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Solaris application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Solaris application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Solaris application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the Solaris application in the last APM polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the Solaris application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the Solaris application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the Solaris host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the Solaris application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that APM sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that APM received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM analyzes and displays the system load average for the monitored Solaris application in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the Solaris system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 15 minutes.

File System Usage Ratio

The Solaris file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. The Solaris application writes data to or reads data from the physical disk partition or logical volume by using the corresponding directory.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the Solaris directory structure.

·     File System Usage Ratio—Space usage ratio of the Solaris file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the file system partition or logical volume. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval.

·     ID—ID of the zombie process in the last polling interval.

·     Parent ID—ID of the parent process for the zombie process in the last polling interval.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory Usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by Solaris over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Solaris since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in Solaris. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of Solaris network interface cards.

·     Send RateSend rate of the network interface card in the last APM polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on the network interface card in the last polling interval

·     Output Error Packet Rate—Number of outbound erroneous packets per second on the network interface card in the last polling interval.

Session Information

The Session Information area displays Solaris session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to Solaris in the last interval.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logged in to Solaris.

·     Login Time—Time when the user logged in to Solaris.

·     Idle—Idle time after the user logged in to Solaris.

·     Command—Most recently executed command after the user logged in to Solaris.

Process

By default, the list does not contain any processes. To monitor processes on Solaris, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     Process NameName of the monitored process. APM can separately collect index data for the processes that have the same name but different Process Identifiers (PIDs).

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process of the process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Threshold setting icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     Memory UsageMemory usage ratio of the monitored process in the last APM polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

I/O State

APM can monitor the I/O status of the disk drivers in the Solaris system.

The I/O State area contains the following fields:

·     Device Name—Name of the disk drivers in the Solaris system.

·     I/O Read Rate—Size of the output data in the disk driver per second in the last polling interval.

·     I/O Write Rate—Size of the input data in the disk driver per second in the last polling interval.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

FreeBSD

FreeBSD's performance and stability can greatly affect the performance of applications or services running on it.

Adding a FreeBSD application monitor

APM monitors FreeBSD applications through CLI. When you add FreeBSD application monitors, follow these guidelines:

·     Enable Telnet or SSH on FreeBSD. For more information enabling Telnet or SSH on FreeBSD, see the FreeBSD configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the FreeBSD administrator's privileges

·     Add FreeBSD hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the FreeBSD application, make sure at least one probe is configured in APM. After a FreeBSD application monitor is added, APM sends the IP address of the monitored FreeBSD application to the probes for traffic collection.

To add a FreeBSD application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click FreeBSD of the UNIX Server Monitor class.

The page for adding a FreeBSD application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the FreeBSD application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor to aid maintenance.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the FreeBSD application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on FreeBSD.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the FreeBSD administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on FreeBSD.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from FreeBSD. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from FreeBSD within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the FreeBSD host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on FreeBSD.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the FreeBSD administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from FreeBSD. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from FreeBSD within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of FreeBSD applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that FreeBSD depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the FreeBSD application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a FreeBSD application monitor

Authorized users can modify all parameters except the IP address and the APM server for a FreeBSD application monitor. When the IP address of a monitored FreeBSD host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a FreeBSD application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the FreeBSD application monitor you want to modify.

The page for modifying the FreeBSD application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a FreeBSD application monitor."

5.     Click OK.

Viewing the FreeBSD application monitor report

After a FreeBSD application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for FreeBSD by viewing the monitor report.

To access the FreeBSD application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a FreeBSD application monitor to display the report.

Figure 56 shows part of a FreeBSD monitor report.

Figure 56 Part of a FreeBSD application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored FreeBSD application.

·     IP Address—IP address of the FreeBSD host.

·     Application TypeType of the monitored application, which is always FreeBSD.

·     VersionVersion of the FreeBSD operating system.

·     System Running Time—Duration since the startup of the FreeBSD application to the time when APM last polled the FreeBSD application.

·     Last Polling Time—Time when APM last polled the FreeBSD application.

·     Relationship—Click the Relationship icon  to view dependencies between the FreeBSD application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the FreeBSD host. If no alarm is generated by FreeBSD, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the FreeBSD application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the FreeBSD application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the FreeBSD application in the last 30 days.

·     Available Time—Total amount of time that the FreeBSD application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the FreeBSD application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the FreeBSD application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the FreeBSD application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the FreeBSD application in the last APM polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the FreeBSD application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the FreeBSD application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the FreeBSD host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the FreeBSD application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM analyzes and displays the system load average for the monitored FreeBSD application in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the FreeBSD system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 15 minutes.

File System Usage Ratio

The FreeBSD file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. The FreeBSD application writes data to or reads data from the physical disk partition or logical volume by using the corresponding directory.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the FreeBSD directory structure.

·     File System Usage Ratio—Space usage ratio of the FreeBSD file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the file system partition or logical volume in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the change trend of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval.

·     ID—ID of the zombie process in the last polling interval.

·     Parent ID—ID of the parent process for the zombie process in the last polling interval.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory Usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by FreeBSD over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by FreeBSD since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in FreeBSD. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of FreeBSD network interface cards.

·     Send RateSend rate of a network interface card in the last polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on the network interface card in the last polling interval.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on the network interface card in the last polling interval.

inode

Index nodes (inodes) are required when you create a file or directory in the FreeBSD file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system on the FreeBSD server.

·     Total—Total number of available inodes in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the inode usage in the file system.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Process

By default, the list does not contain any processes. To monitor a process on FreeBSD, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     Process—Name of the monitored process. APM can respectively collect monitored data for the processes that have the same name but different Process Identifiers (PIDs).

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process of the process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Threshold setting icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     Memory UsageMemory usage ratio of the monitored process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

I/O State

APM can monitor the I/O status of the disk drivers in the FreeBSD system.

The I/O State area contains the following fields:

·     Device Name—Name of the disk drivers in the FreeBSD system.

·     I/O Read Rate—Size of the output data in the disk driver per second in the last polling interval.

·     I/O Write Rate—Size of the input data in the disk driver per second in the last polling interval.

Session Information

The Session Information area displays FreeBSD session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to FreeBSD in the last polling interval.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logged in to FreeBSD.

·     Login Time—Time when the user logged in to FreeBSD.

·     Idle—Idle time after the user logged in to FreeBSD.

·     Command—Most recently executed command after the user logged in to FreeBSD.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

Mac OS

The performance and stability of Apple's Mac OS can greatly affect the performance of applications or services running on it.

Adding a Mac OS application monitor

APM monitors Mac OS applications through SNMP or CLI. When you add Mac OS application monitors, follow these guidelines:

·     To monitor the Mac OS application through SNMP, enable SNMP on Mac OS and obtain read-only and read-write community strings. For information about enabling SNMP on Mac OS, see the Mac OS online help.

·     To monitor the Mac OS application through CLI, enable Telnet or SSH on Mac OS and obtain the username and password of the Telnet or SSH user who has the Mac OS administrator's privileges. For information about enabling Telnet or SSH on Mac OS, see the Mac OS configuration guide.

·     Add Mac OS hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Mac OS application, make sure at least one probe is configured in APM. After a Mac OS application monitor is added, APM sends the IP address of the monitored Mac OS application to the probes for traffic collection.

To add a Mac OS application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Mac OS of the UNIX Server Monitor class.

The page for adding a Mac OS application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Mac OS application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor to aid maintenance.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, Telnet, or SNMP) through which APM monitors the Mac OS application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SNMP is selected, configure the following parameters:

-     Edit SNMP Parameters—Select this option if you want to manually configure SNMP parameters for APM. Make sure the SNMP settings are the same as those on Mac OS.

-     Select an Existing Template—Select this option if you want to select an existing SNMP template for APM. For information about setting SNMP parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Parameter TypeSelect the SNMP parameter type. Options are SNMPv1, SNMPv2c, and SNMPv3 Template. The SNMPv3 Template option is available only when Select an Existing Template is selected.

-     Read-Only Community StringEnter the SNMP read-only community string, with which APM can read MIB variables from the Mac OS host.

-     Read-Write Community StringEnter the read-write SNMP community string, with which APM can read MIB variables from or write MIB variables to the Mac OS host.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for an SNMP response from Mac OS. The value range is 1 to 60 seconds and the default is 4 seconds. If no SNMP response is received from Mac OS within the timeout time, APM considers that the interaction has failed.

-     Retries (1-20)Enter how many times APM retries to send SNMP packets to the Mac OS host.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on Mac OS.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the Mac OS administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on Mac OS.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from Mac OS. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from Mac OS within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the Mac OS host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on Mac OS.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the Mac OS administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from Mac OS. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from Mac OS within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Mac OS applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Mac OS depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Mac OS application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Mac OS application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Mac OS application monitor. When the IP address of a monitored Mac OS host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Mac OS application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Mac OS application monitor you want to modify.

The page for modifying the Mac OS application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Mac OS application monitor."

5.     Click OK.

Viewing the Mac OS application monitor report

After a Mac OS application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for Mac OS by viewing the monitor report.

To access the Mac OS application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Mac OS application monitor to display the report.

Figure 57 shows part of a Mac OS monitor report.

Figure 57 Part of a Mac OS application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored Mac OS application.

·     IP Address—IP address of the Mac OS host.

·     Application TypeType of the monitored application, which is always Mac OS.

·     VersionVersion of the Mac OS application.

·     System Running Time—Duration since the startup of the Mac OS application to the time when APM last polled the Mac OS application.

·     Last Polling Time—Time when APM last polled the Mac OS application.

·     Relationship—Click the Relationship icon  to view dependencies between the Mac OS application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Mac OS host. If no alarm is generated by Mac OS, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Mac OS application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the Mac OS application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Mac OS application in the last 30 days.

·     Available Time—Total amount of time that the Mac OS application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Mac OS application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Mac OS application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Mac OS application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the Mac OS application in the last APM polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the Mac OS application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the Mac OS application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the Mac OS host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the Mac OS application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM analyzes and displays the system load average for the monitored Mac OS application in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the Mac OS system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 15 minutes.

File System Usage Ratio

The Mac OS file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. The Mac OS application writes data to or reads data from the physical disk partition or logical volume by using the corresponding directory.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the Mac OS directory structure.

·     File System Usage Ratio—Space usage ratio of the file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the file system partition or logical volume. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the change trend of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval.

·     ID—ID of the zombie process in the last polling interval.

·     Parent ID—ID of the parent process for the zombie process in the last polling interval.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory Usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by Mac OS over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Mac OS since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in Mac OS. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of Mac OS network interface cards.

·     Send RateSend rate of the network interface card in the last polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on the network interface card in the last polling interval.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on the network interface card in the last polling interval.

inode

Index nodes (inodes) are required when you create a file or directory in the Mac OS file system. If inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system on the Mac OS server.

·     Total—Total number of available inodes in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the inode usage in the file system.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Process

By default, the list does not contain any processes. To monitor a process on Mac OS, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     Process—Name of the monitored process. APM can separately collect monitored data for the processes that have the same name but different Process Identifiers (PIDs).

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process of the process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Threshold setting icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     Memory UsageMemory usage ratio of the monitored process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

I/O State

APM can monitor the I/O status of the disk drivers in the Mac OS system.

The I/O State area contains the following fields:

·     Device Name—Name of the disk driver in the Mac OS system.

·     I/O RateSize of the input/output data in the disk driver per second in the last polling interval.

·     Transfers/SecNumber of transfer times in the disk driver per second in the last polling interval. A transfer is represented by an I/O request to the physical disk. Multiple logical requests can be integrated into a single I/O request to the disk. The size of the transferred data in each transfer is not fixed.

Session Information

The Session Information area displays Mac OS session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to Mac OS in the last polling interval.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logged in to Mac OS.

·     Login Time—Time when the user logged in to Mac OS.

·     Idle—Idle time after the user logged in to Mac OS.

·     Command—Most recently executed command after the user logged in to Mac OS.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

OpenBSD

OpenBSD's performance and stability greatly affects the performance of applications running on it.

Adding an OpenBSD application monitor

APM monitors OpenBSD applications through CLI. When you add OpenBSD application monitors, follow these guidelines:

·     Enable Telnet or SSH on OpenBSD. For more information about enabling Telnet or SSH on OpenBSD, see the OpenBSD configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the OpenBSD administrator's privileges.

·     Add OpenBSD hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the OpenBSD application, make sure at least one probe is configured in APM. After an OpenBSD application monitor is added, APM sends the IP address of the monitored OpenBSD application to the probes for traffic collection.

To add an OpenBSD application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click OpenBSD of the UNIX Server Monitor class.

The page for adding an OpenBSD application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the OpenBSD application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor to aid maintenance.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the OpenBSD application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on OpenBSD.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the OpenBSD administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on OpenBSD.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from OpenBSD. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from OpenBSD within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the OpenBSD host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on OpenBSD.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the OpenBSD administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from OpenBSD. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from OpenBSD within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of OpenBSD applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that OpenBSD depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the OpenBSD application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an OpenBSD application monitor

Authorized users can modify all parameters except the IP address and the APM server for an OpenBSD application monitor. When the IP address of a monitored OpenBSD host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an OpenBSD application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the OpenBSD application monitor you want to modify.

The page for modifying the OpenBSD application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an OpenBSD application monitor."

5.     Click OK.

Viewing the OpenBSD application monitor report

After an OpenBSD application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for OpenBSD by viewing the monitor report.

To access the OpenBSD application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an OpenBSD application monitor to display the report.

Figure 58 shows part of an OpenBSD monitor report.

Figure 58 Part of an OpenBSD application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored OpenBSD application.

·     IP Address—IP address of the OpenBSD host.

·     Application TypeType of the monitored application, which is always OpenBSD.

·     VersionVersion of the OpenBSD application.

·     System Running Time—Duration since the startup of the OpenBSD application to the time when APM last polled the OpenBSD application.

·     Last Polling Time—Time when APM last polled the OpenBSD application.

·     Relationship—Click the Relationship icon  to view dependencies between the OpenBSD application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the OpenBSD host. If no alarm is generated by OpenBSD, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the OpenBSD application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the OpenBSD application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the OpenBSD application in the last 30 days.

·     Available Time—Total amount of time that the OpenBSD application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the OpenBSD application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the OpenBSD application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the OpenBSD application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the OpenBSD application in the last APM polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the OpenBSD application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the OpenBSD application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the OpenBSD host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the OpenBSD application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM analyzes and displays the system load average for the monitored OpenBSD application in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the OpenBSD system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 15 minutes.

File System Usage Ratio

The OpenBSD file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. The OpenBSD application writes data to or reads data from the physical disk partition or logical volume by using the corresponding directory.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the OpenBSD directory structure.

·     File System Usage Ratio—Space usage ratio of the file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the file system partition or logical volume. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the change trend of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval.

·     ID—ID of the zombie process in the last polling interval.

·     Parent ID—ID of the parent process for the zombie process in the last polling interval.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory Usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by OpenBSD over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by OpenBSD since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in OpenBSD. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of OpenBSD network interface cards.

·     Send RateSend rate of a network interface card in the last polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on the network interface card in the last polling interval.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on the network interface card in the last polling interval.

inode

Index nodes (inodes) are required when you create a file or directory in the OpenBSD file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system on the OpenBSD server.

·     Total—Total number of available inodes in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the inode usage in the file system.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Process

By default, the list does not contain any processes. To monitor a process on OpenBSD, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     Process—Name of the monitored process. APM can respectively collect monitored data for the processes that have the same name but different Process Identifiers (PIDs).

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process of the process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Threshold setting icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     Memory UsageMemory usage ratio of the monitored process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

I/O State

APM can monitor the I/O status of the disk drivers in the OpenBSD system.

The I/O State area contains the following fields:

·     Device Name—Name of the disk drivers in the OpenBSD system.

·     I/O RateSize of the input/output data in the disk driver per second in the last polling interval.

·     Transfers/SecNumber of transfer times in the disk driver per second in the last polling interval. A transfer is an I/O request to the physical disk. Multiple logical requests can be integrated into a single I/O request to the disk. The size of the transferred data in each transfer is not fixed.

Session Information

The Session Information area displays OpenBSD session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to OpenBSD in the last polling interval.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logged in to OpenBSD.

·     Login Time—Time when the user logged in to OpenBSD.

·     Idle—Idle time after the user logged in to OpenBSD.

·     Command—Most recently executed command after the user logged in to OpenBSD.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

HP-UX

HP-UX's performance and stability affects the performance of applications running on it. APM provides the ability to monitor HP-UX 11.00 or later versions of the operating system.

Adding an HP-UX application monitor

APM monitors HP-UX applications through CLI. When you add HP-UX application monitors, follow these guidelines:

·     Enable Telnet or SSH on HP-UX. For more information about enabling Telnet or SSH on HP-UX, see the HP-UX configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the HP-UX administrator's privileges.

·     Add HP-UX hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the HP-UX application, make sure at least one probe is configured in APM. After an HP-UX application monitor is added, APM sends the IP address of the monitored HP-UX application to the probes for traffic collection.

To add an HP-UX application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click HP-UX of the UNIX Server Monitor class.

The page for adding an HP-UX application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the HP-UX application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     DescriptionEnter a description for the application monitor to aid maintenance.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the HP-UX application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on HP-UX.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the HP-UX administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on HP-UX.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from HP-UX. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from HP-UX within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the HP-UX host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on HP-UX.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the HP-UX administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from HP-UX. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from HP-UX within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of HP-UX applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that HP-UX depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the HP-UX application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an HP-UX application monitor

Authorized users can modify all parameters except the IP address and the APM server for an HP-UX application monitor. When the IP address of a monitored HP-UX host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an HP-UX application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the HP-UX application monitor you want to modify.

The page for modifying the HP-UX application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an HP-UX application monitor."

5.     Click OK.

Viewing the HP-UX application monitor report

After an HP-UX application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for HP-UX by viewing the monitor report.

To access the HP-UX application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an HP-UX application monitor to display the report.

Figure 59 shows part of an HP-UX monitor report.

Figure 59 Part of an HP-UX application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored HP-UX application.

·     IP Address—IP address of the HP-UX host.

·     Application TypeType of the monitored application, which is always HP-UX.

·     VersionVersion of the HP-UX application.

·     System Running Time—Duration since the startup of the HP-UX application to the time when APM last polled the HP-UX application.

·     Last Polling Time—Time when APM last polled the HP-UX application.

·     Relationship—Click the Relationship icon  to view dependencies between the HP-UX application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the HP-UX host. If no alarm is generated by HP-UX, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the HP-UX application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the HP-UX application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the HP-UX application in the last 30 days.

·     Available Time—Total amount of time that the HP-UX application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the HP-UX application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the HP-UX application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the HP-UX application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the HP-UX application in the last APM polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the HP-UX application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the HP-UX application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the HP-UX host by sending up to three ICMP packets. If APM receives a response packet, the ping succeeds and APM records the response time. If APM does not receive a response after sending out three ICMP packets, APM considers that the ping test has failed.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the HP-UX application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM analyzes and displays the system load average for the monitored HP-UX application in 1 minute, 5 minutes, and 15 minutes. System load average is the average number of processes running on the HP-UX system during a specific time period. Excessive system load can cause performance problems. The thresholds of system load vary by CPU type.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the average system load in 15 minutes.

File System Usage Ratio

The HP-UX file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. The HP-UX application writes data to or reads data from the physical disk partition or logical volume by using the corresponding directory.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the HP-UX directory structure.

·     File System Usage Ratio—Space usage ratio of the HP-UX file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the file system partition or logical volume. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the change trend of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval.

·     ID—ID of the zombie process in the last polling interval.

·     Parent ID—ID of the parent process for the zombie process in the last polling interval.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory Usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by HP-UX over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by HP-UX since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of the network interface card in HP-UX. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of the network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of HP-UX network interface cards.

·     Send RateSend rate of a network interface card in the last polling interval.

Error Log

APM examines the HP-UX error logs during polling and displays the first 10 error logs obtained in the HP-UX application monitor report. Click More to view all error logs if the monitor report has more than 10 error logs.

The Error Log area contains the following fields:

·     Time—Time when the error occurred in the last polling interval.

·     Log—Content of the error log.

Process

By default, the list does not contain any processes. To monitor a process on HP-UX, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select the processes to be monitored in the monitor list window.

·     Process—Name of the monitored process. APM can respectively collect monitored data for the processes that have the same name but different Process Identifiers (PIDs).

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process of the process.

·     CPU Usage—CPU usage ratio of the monitored process in the last polling interval.

¡     Click the Threshold setting icon  to set alarm thresholds of the CPU usage ratio for the monitored process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio of the monitored process.

·     Memory UsageMemory usage ratio of the monitored process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio of the monitored process.

·     CPU Time—Duration that the process occupies the CPU in the last polling interval.

I/O State

APM can monitor the I/O status of the disk drivers in the HP-UX system.

The I/O State area contains the following fields:

·     Device Name—Name of the disk drivers in the HP-UX system.

·     I/O RateSize of the input/output data in the disk driver per second in the last polling interval.

·     Searches/SecNumber of search times in the disk driver per second in the last polling interval.

Session Information

The Session Information area displays HP-UX session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to HP-UX in the last polling interval.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logged in to HP-UX.

·     Login Time—Time when the user logged in to HP-UX.

·     Idle—Idle time after the user logged in to HP-UX.

·     Command—Most recently executed command after the user logged in to HP-UX.

inode

Index nodes (inodes) are required when you create a file or directory in the HP-UX file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system on the HP-UX server.

·     Total—Total number of available inodes in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds of the inode usage in the file system.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

AS400

AS400 is a small-sized to medium-sized multiuser commercial operating system developed by IBM. Its performance and stability determines the performance of applications running on it. APM provides the ability to monitor the AS400 V6R1M0 version.

Adding an AS400 application monitor

APM monitors AS400 applications through class libraries provided by AS400. When you add an AS400 application monitor, follow these guidelines:

·     Contact the AS400 administrator to obtain the username and password of AS400. As a best practice, use an AS400 account with the QSECOFR permission. If you use an AS400 account with the USER permission, make sure the account has the following permissions:

¡     Permission to access the QMPGDATA or QPFRDATA library.

¡     ALLOBJ, SAVSYS, JOBCTL, and SPLCTL permissions.

·     Add AS400 servers to the IMC platform so that APM can obtain and display network connections of the servers and their access devices in the application topology. For more information about adding servers to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To contain traffic statistics in the monitor report about an AS400 application, configure a minimum of one probe in APM. After an AS400 application monitor is added, APM sends the IP address of the monitored AS400 application to the probes for traffic collection.

To add an AS400 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click AS400 of the UNIX Server Monitor class.

The page for adding an AS400 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the server on which the AS400 application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the server managed in the IMC platform. If the server is already added to the IMC platform, you can also click Select and then select the server in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, use the application type_host IP address name format.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     DescriptionEnter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the AS400 username and password.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of AS400 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that AS400 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the AS400 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify the connectivity to the application by using the previous parameter settings. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an AS400 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an AS400 application monitor. When the IP address of a monitored AS400 server changes, operators must add a new application monitor for the server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an AS400 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the AS400 application monitor you want to modify.

The page for modifying the AS400 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an AS400 application monitor."

5.     Click OK.

Viewing the AS400 application monitor report

After an AS400 application monitor is added, APM collects index data for the application, and calculates its availability and health status. You can obtain monitor indexes for AS400 by viewing the monitor report.

To access the AS400 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an AS400 application monitor to display the report.

Figure 60 shows only a small part of an AS400 monitor report.

Figure 60 Part of an AS400 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StatusHealth status of the monitored AS400 application.

·     IP Address—IP address of the AS400 server.

·     Application DescriptionDescription of the monitored application.

·     Application TypeType of the monitored application, which is always AS400.

·     Relationship—Click the Relationship icon  to view dependencies between the AS400 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the AS400 server. If AS400 did not generate alarms, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the AS400 application in the most recent polling interval.

¡     Click the Weekly History icon  to view the availability of the AS400 application in the most recent 7 days.

¡     Click the Monthly History icon  to view the availability of the AS400 application in the most recent 30 days.

·     Available Time—Total amount of time that the AS400 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the AS400 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the AS400 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the AS400 application was in unmanaged state after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

System Status

The System Status area contains the following fields:

·     Main MemorySize of the main memory of AS400.

·     Processing Unit CountNumber of AS400 processing units.

·     Running Job Count—Total number of AS400 running system jobs.

·     Waiting Job Count—Number of jobs that are waiting to run on AS400.

CPU Usage

The CPU Usage area contains the following field:

·     CPU Usage RatioCPU usage of the AS400 application. Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

iASP

The iASP area contains the following field:

·     iASPIndependent auxiliary storage pools (iASP) of the AS400 application. Click the History Record icon icon_history_16x16.png to view the history graph of the iASP.

System ASP

The System ASP area contains the following fields:

·     System ASP UsageRatio of the available disk space size to the total disk space size in the system. Click the History Record icon icon_history_16x16.png to view the history graph of the system ASP usage.

·     System ASPAvailable disk space size in the system. Click the History Record icon icon_history_16x16.png to view the history graph of the system ASP.

Subsystem

The Subsystem area contains the following fields:

·     NameName of the subsystem, which is specified on the Start Subsystem (STRSBS) command.

·     LibraryName of the library to which the subsystem belongs.

·     Current Active Jobs—Number of active jobs in the subsystem. Multiple interactive jobs started from the same work station are counted as only one job.

·     Maximum Active JobsMaximum number of active jobs allowed in the subsystem.

·     StatusStatus of the subsystem. Options are:

¡     ACTIVE

¡     END (in the process of ending)

¡     RSTD (the controlling subsystem is in the restricted condition)

Message Queue

The Message Queue area contains the following fields:

·     Message IDID of the message.

·     SeverityA two-digit value in the range of 00 through 99. A higher value indicates a severer level.

·     TypeType of message. Options are:

¡     CompletionIndicates the completion of work.

¡     DiagnosticIndicates errors in a system function, application, or input data.

¡     InformationalProvides general non-error-related information.

¡     InquiryConveys information and asks for a reply.

¡     Sender CopyContains a copy of an Inquiry or Notify message that is kept in the sender message queue.

¡     RequestContains a command for processing by a request processor, for example, a command entry.

¡     Request_With_PromptingContains a request with prompting.

¡     NotifyIndicates that a program requires a corrective action or a reply.

¡     EscapeIndicates that a program must be terminated abnormally.

¡     Reply_not_Validity_CheckedContains a reply to an Inquiry or Notify message. The message validity is not checked.

¡     Reply_Validity_CheckedContains a reply to an Inquiry or Notify message. The message validity is checked.

¡     Reply_Message_Default_UsedContains a reply to an Inquiry or Notify message. The message is used by default.

¡     Reply_System_Default_UsedContains a reply to an Inquiry or Notify message. The system is used by default.

¡     Reply_from_System_Reply_ListContains a reply to an Inquiry or Notify message. The reply is from the system reply list.

·     DateDate when the message was sent.

·     Job IDID of the job that generates the message.

·     MessageContent of the message.

Job

The Job area contains the following fields:

·     Job Name—Job name identified by AS400.

·     User—The username is the same as the user profile name. The username can come from different sources, depending on the type of job.

·     IDJob number assigned by the system.

·     TypeType of active job. Options are:

¡     ASJAutostart.

¡     BCHBatch.

¡     BCIBatch immediate.

¡     EVK—Started by a procedure start request.

¡     INTInteraction.

¡     M36—Advanced 36 server job.

¡     MRTMultiple request terminal.

¡     PJPrestart job.

¡     PDJPrint drive job.

¡     RDRReader.

¡     SBSSubsystem monitor.

¡     SYSSystem.

¡     WTRWriter Status.

·     StatusStatus of the initial thread of the job. If initial thread is in transition, this field is empty.

·     I/O Operation CountNumber of I/O operations during intermission.

·     Response TimeAverage interaction response time of the job during intermission.

System Log

The System Log area contains the following fields:

·     Message IDID of the message.

·     SeverityA two-digit value in the range of 00 through 99. A higher value indicates a severer level.

·     TypeType of the log. Options are:

¡     1—Completion. It indicates the completion of work.

¡     2—Diagnostic. It indicates errors in a system function, errors in an application, or errors in input data.

¡     4—Informational. It provides general non-error-related information.

¡     5—Inquiry. It conveys information and asks for a reply.

¡     6—Sender Copy. It contains a copy of an Inquiry or Notify message that is kept in the sender message queue.

¡     8—Request. It contains a command for processing by a request processor, for example, a command entry.

¡     10—Request_With_Prompting. Contains a request with prompting.

¡     14—Notify. It indicates that a program requires a corrective action or a reply.

¡     15—Escape. It indicates that a program must be terminated abnormally.

¡     21—Reply_not_Validity_Checked. It contains a reply to an Inquiry or Notify message. The message validity is not checked.

¡     22—Reply_Validity_Checked. It contains a reply to an Inquiry or Notify message. The message validity is checked.

¡     23—Reply_Message_Default_Used. It contains a reply to an Inquiry or Notify message. The message is used by default.

¡     24—Reply_System_Default_Used. It contains a reply to an Inquiry or Notify message. The system is used by default.

¡     25—Reply_from_System_Reply_List. It contains a reply to an Inquiry or Notify message. The reply is from the system reply list.

·     MessageContent of the message.

·     DateDate when the log was sent.

Hardware Resource

The Hardware Resources area contains the following fields:

·     Resource NameName of the hardware resource.

·     Resource StatusStatus of the hardware resource.

·     Resource TypeType of the hardware resource.

·     Resource Serial NumberSerial number of the hardware resource.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by AS400 over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by AS400 since 00:00 today.


Linux server monitor

This chapter describes how to add and modify monitors for Linux servers, and how to view the monitor reports.

Linux

Linux is a popular open source operating system that has multiple release versions. By monitoring Linux, operators can view how the operating performance of a Linux server affects network applications on the system.

Adding a Linux application monitor

APM monitors Linux applications through agents, SNMP, or CLI. When you add Linux application monitors, follow these guidelines:

·     To monitor a Linux application through an agent, deploy the agent on the host on which the Linux operating system is installed. For more information about agents, see "APM agent management."

·     To monitor a Linux application through SNMP:

¡     Enable and configure SNMP for the host on which the Linux operating system is installed. For more information about enabling SNMP on Linux, see the Linux help.

¡     Obtain the read-only and read-write community strings.

·     To monitor a Linux application through CLI:

¡     Enable and configure Telnet or SSH on Linux. For more information about enabling Telnet or SSH on Linux, see the Linux configuration guide.

¡     Obtain the username and password of the Telnet or SSH user who has the Linux administrator's privileges.

·     Add the Linux hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Linux application, make sure at least one probe is configured in APM. After a Linux application monitor is added, APM sends the IP address of the monitored Linux application to the probes for traffic collection.

The following task is performed in remote monitor mode. When the local monitor mode is used, you need to configure only part of the parameters that are required for the remote monitor mode.

To add a Linux application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Linux of the Linux Server Monitor class.

The page for adding a Linux application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Linux application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, SNMP, or Telnet) through which APM monitors the Linux application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SNMP is selected, configure the following parameters:

-     Edit SNMP Parameters—Select this option if you want to manually configure SNMP parameters for APM. Make sure the SNMP settings are the same as those on Linux.

-     Select an Existing Template—Select this option if you want to select an existing SNMP template for APM. For information about setting SNMP parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Parameter TypeSelect the SNMP parameter type. Options are SNMPv1, SNMPv2c, and SNMPv3 Template. The SNMPv3 Template option is available only when Select an Existing Template is selected.

-     Read-Only Community StringEnter the SNMP read-only community string, with which APM can read MIB variables from the Linux host.

-     Read-Write Community StringEnter the read-write SNMP community string, with which APM can read MIB variables from or write MIB variables to the Linux host.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for an SNMP response from Linux. The value range is 1 to 60 seconds and the default is 4 seconds. If no SNMP response is received from Linux within the timeout time, APM considers that the interaction has failed.

-     Retries (1-20)Enter how many times APM retries to send SNMP packets to the Linux host.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on Linux.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the Linux administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on Linux.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from Linux. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from Linux within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the Linux host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on Linux.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the Linux administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from Linux. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from Linux within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Linux applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Linux depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Linux application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Linux application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Linux application monitor. When the IP address of a monitored Linux host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Linux application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Linux application monitor you want to modify.

The page for modifying the Linux application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Linux application monitor."

5.     Click OK.

Viewing the Linux application monitor report

After adding the Linux application monitor, APM collects application index data to calculate its availability and health status. You can obtain monitor indexes for Linux by viewing the monitor report.

To access the Linux application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Linux application monitor to display the report.

Figure 61 shows part of a Linux application monitor report.

Figure 61 Part of a Linux application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Linux application.

·     IP Address—IP address of the Linux host.

·     Application Type—Type of the monitored application, which is always Linux.

·     Version—Version of the Linux operating system.

·     Last Polling Time—Time when APM last polled the Linux application.

·     System Running Time—Duration since the startup of the Linux application to the time when APM last polled the Linux application.

·     Relationship—Click the Related Applications icon  to view dependencies between the Linux application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Linux host. This field is not displayed if no alarm is generated by the Linux application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Linux application in the last polling interval.

¡     Click the Weekly History icon  to view the availability of the Linux application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Linux application in the last 30 days.

·     Available Time—Total amount of time that the Linux application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Linux application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Linux application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Linux application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the Linux application in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     History RecordClick the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the Linux application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the Linux application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

CPU Performance

The CPU Performance area contains the following fields:

·     CPU Name—Name of the CPU.

·     Nice CPU—Time taken by the processes whose priorities were modified by using the Nice command.

·     Load PercentagePercentage of the load time.

·     User Percentage—Percentage of the user time.

·     System Percentage—Percentage of the system time.

·     I/O Wait PercentagePercentage of the I/O wait time.

·     Idle PercentagePercentage of the idle time.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Paging

The Paging area contains the following fields:

·     Paging In—Number of pages that were paged in.

·     Paging Out—Number of pages that were paged out.

·     Paging Total—Total number of pages that were paged in and out.

·     Paging In Rate—Number of pages that were paged in per second.

·     Paging Out Rate—Number of pages that were paged out per second.

·     Paging Rate—Number of pages that were paged in and out per second.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Ping Test

When the polling interval expires, APM pings the Linux host by sending up to three ICMP packets. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the Linux application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM counts the average system load over 1 minute, 5 minutes, and 15 minutes. The average system load records the average number of processes in the run queue over a specific time interval. An overloaded system results in severe performance issues. The load threshold value varies by CPU model.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 15 minutes.

File System Usage Ratio

The Linux file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. Use the File System Usage Ratio area to display how the available disk space is used.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the Linux directory structure.

·     File System Usage Ratio—Space usage ratio of the Linux file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free SpaceFree space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

I/O Response

The I/O Response area contains the following fields:

·     Disk Name—Name of a Linux server disk.

·     Response—Average time (in milliseconds) for I/O requests issued to the disk.

·     Average Queue—Average queue length of the requests that were issued to the disk.

·     Transfer Time—Percentage of CPU time during which I/O requests were issued to the disk.

Adapter

The Adapter area contains the following fields:

·     Adapter Name—Name of the adapter installed on the Linux server.

·     Adapter Status—Status of the adapter, UP or DOWN.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process in the last polling interval.

·     ID—ID of the zombie process in the last polling interval.

·     Parent ID—ID of the parent process for the zombie process in the last polling interval.

·     CPU Usage—CPU usage of the zombie process in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory usage—Memory usage of the zombie process in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU in the last polling interval.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Linux application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Linux application since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of a network interface card in Linux. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of a network interface card in the last polling interval. Click the Set Threshold icon  to set alarm thresholds for the receive rate of Linux network interface cards

·     Send RateSend rate of a network interface card in the last polling interval.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on a network interface card in the last polling interval.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on a network interface card in the last polling interval.

Error Log

APM examines the Linux error logs during polling and displays the first 10 error logs obtained in the polling in the Linux application monitor report. Click More to view all error logs in the last polling interval if the report has more than 10 error logs.

The Error Log area contains the following fields:

·     Time—Time when the error occurred.

·     Log—Content of the error log.

TCP Connections

The TCP Connections area contains the following fields:

·     Active Connections Rate—Number of active connections per second.

·     Passive Connections Rate—Number of passive connections per second.

·     Failed Connections Rate—Number of failed connections per second.

·     Reset Connections Rate—Number of reset connections per second.

·     Established Connections—Number of established connections.

·     Received Segments Rate—Number of received segments per second.

·     Sent Segments Rate—Number of sent segments per second.

·     Retransmitted Segments Rate—Number of retransmitted segments per second.

Process Number

The Process Number area contains the following field:

Process Number—Number of processes on the Linux server.

I/O State

APM can monitor the I/O status of disks, partitions, or logical volumes in Linux.

The I/O State area contains the following fields:

·     Device Name—Name of the disk, partition, or logical volume in Linux.

·     I/O Read Rate—Data output rate of the disk, partition, or logical volume in Linux.

·     I/O Write Rate—Data input rate of the disk, partition, or logical volume in Linux.

Process

By default, the list does not contain any processes. To monitor processes on Linux, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select processes to be monitored in the monitor list window.

·     Process Name—Name of the monitored process. For processes with the same name but different Process Identifiers (PIDs), APM collects the CPU usage ratio and the memory usage ratio for each process. For example, the application may generate a lot of httpd processes, and APM collects the CPU usage ratio and the memory usage ratio for each httpd process selected.

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process for the process.

·     CPU Usage—CPU usage ratio of the process.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     Memory Usage—Memory usage ratio of the process. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     CPU Time—Duration that the process occupies the CPU.

·     Arguments—Arguments of a process on the Linux server.

inode

The inodes are required when you create a file or directory in the Linux file system. If inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File System—File system on the Linux server.

·     Total—Total number of available inodes in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system inode usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Vol Group

Logical volume management manages disk partitions in the Linux operating system. It combines one or more physical disks to a volume group and creates a logical volume for the volume group. One logical volume equals a disk partition.

The Vol Group area contains the following fields:

·     Name—Name of the volume group.

·     Size—Size of the volume group. Click the History Record icon icon_history_16x16.png to view the history graph of the volume group size.

·     In Use—Volume group space that is used in the last polling interval. Click the History Record icon icon_history_16x16.png to view the change trend of the used volume group space.

·     Free Space—Volume group space that are not used in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the volume group space.

·     Usage Ratio—Usage of the volume group space in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the space usage of the volume group.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the space usage of the volume group.

Session Information

The Session Information area displays Linux session login information.

The Session Information area contains the following fields:

·     User Name—User logging in to Linux in the last polling interval.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logs in to Linux. The value of :0 indicates that the user logs in to Linux through the console.

·     Login Time—Time when the user logged in to Linux.

·     Idle—Idle time after the user logged in to Linux.

·     Command—Most recently executed command after the user logged in to Linux.

Memory Info

The Memory Info area contains the following fields:

·     LocatorPosition of the memory card on the server.

·     Memory Size—Size of the memory.

CPU Info

The CPU Info area contains the following fields:

·     LocatorPosition of the CPU on the server.

·     CoresNumber of CPU cores.

·     Logic ProcessorsNumber of CPU logic processors.

·     CPU ModelModel of the CPU.

Base Board

The Base Board area contains the following fields:

·     ManufacturerManufacturer of the base board.

·     Product NameModel of the base board.

·     Serial NumberSerial number of base board.

Chassis

The Chassis area contains the following fields:

·     ManufacturerManufacturer of the chassis.

·     Power Supply StateState of the chassis power supply.

·     Serial NumberSerial number of the chassis.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

NeoKylin

NeoKylin is an operating system that uses Linux kernels. By monitoring NeoKylin, operators can view how the operating performance of a NeoKylin server affects network applications on the system. APM supports monitoring NeoKylin V6.0.

Adding a NeoKylin application monitor

APM monitors NeoKylin applications through SNMP, CLI, or agents. When you add NeoKylin application monitors, follow these guidelines:

·     To monitor a NeoKylin application through an agent, deploy the agent on the host where the NeoKylin operating system is installed. For more information about agents, see "APM agent management."

·     To monitor a NeoKylin application through SNMP:

¡     Enable and configure SNMP for the host on which the NeoKylin operating system is installed. For more information about enabling SNMP on NeoKylin, see the NeoKylin online help.

¡     Obtain the read-only and read-write community strings.

·     To monitor a NeoKylin application through CLI:

¡     Enable and configure Telnet or SSH on NeoKylin. For more information about enabling Telnet or SSH on NeoKylin, see the NeoKylin configuration guide.

¡     Obtain the username and password of the Telnet or SSH user who has the NeoKylin administrator's privileges.

·     Add the NeoKylin hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the NeoKylin application, make sure at least one probe is configured in APM. After a NeoKylin application monitor is added, APM sends the IP address of the monitored NeoKylin application to the probes for traffic collection.

To add a NeoKylin application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click NeoKylin of the Linux Server Monitor class.

The page for adding a NeoKylin application monitor opens.

Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the NeoKylin application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, SNMP, or Telnet) through which APM monitors the NeoKylin application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SNMP is selected, configure the following parameters:

-     Edit SNMP Parameters—Select this option if you want to manually configure SNMP parameters for APM. Make sure the SNMP settings are the same as those on NeoKylin.

-     Select an Existing Template—Select this option if you want to select an existing SNMP template for APM. For information about setting SNMP parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Parameter TypeSelect the SNMP parameter type. Options are SNMPv1, SNMPv2c, and SNMPv3 Template. The SNMPv3 Template option is available only when Select an Existing Template is selected.

-     Read-Only Community StringEnter the SNMP read-only community string, with which APM can read MIB variables from the NeoKylin host.

-     Read-Write Community StringEnter the read-write SNMP community string, with which APM can read MIB variables from or write MIB variables to the NeoKylin host.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for an SNMP response from NeoKylin. The value range is 1 to 60 seconds and the default is 4 seconds. If no SNMP response is received from NeoKylin within the timeout time, APM considers that the interaction has failed.

-     Retries (1-20)Enter how many times APM retries to send SNMP packets to the NeoKylin host.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on NeoKylin.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the SSH username. The user must have the NeoKylin administrator's privilege.

-     PasswordEnter the password of the SSH user.

-     Private Key FileEnter the directory of the SSH private key file or browse to the file.

-     Private Key PasswordEnter the password to decrypt the SSH private key file.

-     Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     PortEnter the SSH port on NeoKylin.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from NeoKylin. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from NeoKylin within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the NeoKylin host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on NeoKylin.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password. The following parameters to be configured vary with authentication modes.

-     UsernameEnter the Telnet username. The user must have the NeoKylin administrator's privilege.

-     PasswordEnter the password of the Telnet user.

-     Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from NeoKylin. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from NeoKylin within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Use IPMI—Select Enable or Disable from the list. If you select Enable, configure the following parameters:

-     Host IP—Enter the IP address of the BMC for IPMI monitoring.

-     Username/Password—Enter the username and password of the BMC for IPMI monitoring.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of NeoKylin applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that NeoKylin depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the NeoKylin application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

4.     Click OK.

Modifying a NeoKylin application monitor

Authorized users can modify all parameters except the IP address and the APM server for a NeoKylin application monitor. When the IP address of a monitored NeoKylin host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a NeoKylin application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the NeoKylin application monitor you want to modify.

The page for modifying the NeoKylin application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a NeoKylin application monitor."

5.     Click OK.

Viewing the NeoKylin application monitor report

After a NeoKylin application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the NeoKylin application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a NeoKylin application monitor to display the report.

Figure 62 shows part of a NeoKylin application monitor report.

Figure 62 Part of a NeoKylin application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the NeoKylin application.

·     IP Address—IP address of the NeoKylin host.

·     Application Type—Type of the monitored application, which is always NeoKylin.

·     Version—Version of the NeoKylin operating system.

·     System Running Time—Duration since the startup of the NeoKylin application to the time when APM last polled the NeoKylin application.

·     Last Polling Time—Time when APM last polled the NeoKylin application.

·     Relationship—Click the Related Applications icon  to view dependencies between the NeoKylin application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the NeoKylin host. This field is not displayed if no alarm is generated by the NeoKylin application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the NeoKylin application.

¡     Click the Weekly History icon  to view the availability of the NeoKylin application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the NeoKylin application in the last 30 days.

·     Available Time—Total amount of time that the NeoKylin application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the NeoKylin application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the NeoKylin application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the NeoKylin application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the NeoKylin application.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the NeoKylin application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the NeoKylin application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the NeoKylin host by sending up to three ICMP packets. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the NeoKylin application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM counts the average system load over 1 minute, 5 minutes, and 15 minutes. The average system load records the average number of processes in the run queue over a specific time interval. An overloaded system results in severe performance issues. The load threshold value varies by CPU model.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 1 minute.

·     System Load/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 5 minutes.

·     System Load/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 15 minutes.

File System Usage Ratio

The NeoKylin file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or logical volume. Use the File System Usage Ratio area to display how the available disk space is used.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the NeoKylin directory structure.

·     File System Usage Ratio—Space usage ratio of the NeoKylin file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free Space—Free space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes. Click the History Record icon icon_history_16x16.png to view the history graph of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process.

·     ID—ID of the zombie process.

·     Parent ID—ID of the parent process for the zombie process.

·     CPU Usage—CPU usage of the zombie process.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory usage—Memory usage of the zombie process. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the NeoKylin application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the NeoKylin application since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of a network interface card in NeoKylin. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of a network interface card. Click the Set Threshold icon  to set alarm thresholds for the receive rate of NeoKylin network interface cards

·     Send RateSend rate of a network interface card.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on a network interface card.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on a network interface card.

Error Log

APM examines the NeoKylin error logs during polling and displays the first 10 error logs obtained in the polling in the NeoKylin application monitor report. Click More to view all error logs in the last polling interval if the report has more than 10 error logs.

The Error Log area contains the following fields:

·     Time—Time when the error occurred.

·     Log—Content of the error log.

Process

By default, the list does not contain any processes. To monitor processes on NeoKylin, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select processes to be monitored in the monitor list window.

·     Process Name—Name of the monitored process. For processes with the same name but different Process Identifiers (PIDs), APM collects the CPU usage ratio and the memory usage ratio for each process. For example, the application may generate a lot of httpd processes, and APM collects the CPU usage ratio and the memory usage ratio for each httpd process selected.

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process for the process.

·     CPU Usage—CPU usage ratio of the process.

¡     Click the Set Threshold icon  to set alarm thresholds for the NeoKylin process CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     Memory Usage—Memory usage ratio of the process. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     CPU Time—Duration that the process occupies the CPU.

I/O State

APM can monitor the I/O status of disks, partitions, or logical volumes in NeoKylin.

The I/O State area contains the following fields:

·     Device Name—Name of the disk, partition, or logical volume in NeoKylin.

·     I/O Read Rate—Data output rate of the disk, partition, or logical volume in NeoKylin.

·     I/O Write Rate—Data input rate of the disk, partition, or logical volume in NeoKylin.

inode

Index nodes (inodes) are required when you create a file or directory in the NeoKylin file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File SystemFile system of the NeoKylin system.

·     Total—Total number of available inodes in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system inode usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage in the file system.

Vol Group

Logical volume management manages disk partitions in the NeoKylin operating system. It combines one or more physical disks to a volume group and creates a logical volume for the volume group. One logical volume equals a disk partition.

The Vol Group area contains the following fields:

·     Name—Name of the volume group.

·     Size—Size of the volume group. Click the History Record icon icon_history_16x16.png to view the history graph of the volume group size.

·     In Use—Volume group space that is used. Click the History Record icon icon_history_16x16.png to view the change trend of the used volume group space.

·     Free Space—Volume group space that are not used. Click the History Record icon icon_history_16x16.png to view the history graph of the volume group space.

·     Usage Ratio—Usage of the volume group space.

¡     Click the Set Threshold icon  to set alarm thresholds for the space usage of the volume group.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the space usage of the volume group.

Session Information

The Session Information area displays NeoKylin session login information and contains the following fields:

·     User Name—User logging in to NeoKylin.

·     TTY—TTY used by the user.

·     Login IPClient IP address used when the user logs in to NeoKylin. The value of :0 indicates that the user logs in to NeoKylin through the console.

·     Login Time—Time when the user logged in to NeoKylin.

·     Idle—Idle time after the user logged in to NeoKylin.

·     Command—Most recently executed command after the user logged in to NeoKylin.

Memory

The Memory area displays memory information for the server where the OS is located. To monitor the memory, make sure the BMC is installed on the server.

The Memory area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Power Supply

The Power Supply area displays power supply information for the server where the OS is located. To monitor the power supply, make sure the BMC is installed on the server.

The Power Supply area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Temperature

The Temperature area displays temperature information for the server where the OS is located. To monitor the temperature, make sure the BMC is installed on the server.

The Temperature area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

·     Value—Temperature of the component.

Fan

The Fan area displays fan information for the server where the OS is located. To monitor the fans, make sure the BMC is installed on the server.

The Fan area contains the following fields:

·     Component Name—Name of the component.

·     Status—State of the component.

Board

The Board area displays board information about the server where the OS is located. To monitor the board, make sure the BMC is installed on the server.

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the product to which the board applies.

·     Production Date—Production date of the board.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—GUID of the board.

Chassis

The Chassis area displays chassis information for the server where the OS is located. To monitor the chassis, make sure the BMC is installed on the server.

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly.

·     Power-On Hours—Hours since the chassis was started.

Rocky

Rocky is an operating system that uses Linux kernels. By monitoring Rocky, operators can view how the operating performance of a Rocky server affects network applications on the system.

Adding a Rocky application monitor

APM monitors Rocky applications through SNMP, CLI, or agents. When you add Rocky application monitors, follow these guidelines:

·     To monitor a Rocky application through an agent, deploy the agent on the host where the Rocky operating system is installed. For more information about agents, see "APM agent management."

·     To monitor a Rocky application through SNMP:

¡     Enable and configure SNMP for the host on which the Rocky operating system is installed. For more information about enabling SNMP on Rocky, see the Rocky administrator guide.

¡     Obtain the read-only and read-write community strings.

·     To monitor a Rocky application through CLI:

¡     Enable and configure Telnet or SSH on Rocky. For more information about enabling Telnet or SSH on Rocky, see the Rocky administrator guide.

¡     Obtain the username and password of the Telnet or SSH user who has the Rocky administrator's privileges.

·     Add the Rocky hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Rocky application, make sure at least one probe is configured in APM. After a Rocky application monitor is added, APM sends the IP address of the monitored Rocky application to the probes for traffic collection.

To add a Rocky application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Rocky of the Linux Server Monitor class.

The page for adding a Rocky application monitor opens.

Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Rocky application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, SNMP, or Telnet) through which APM monitors the Rocky application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SNMP is selected, configure the following parameters:

-     Edit SNMP Parameters—Select this option if you want to manually configure SNMP parameters for APM. Make sure the SNMP settings are the same as those on Rocky.

-     Select an Existing Template—Select this option if you want to select an existing SNMP template for APM. For information about setting SNMP parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Parameter TypeSelect the SNMP parameter type. Options are SNMPv1, SNMPv2c, and SNMPv3 Template. The SNMPv3 Template option is available only when Select an Existing Template is selected.

-     Read-Only Community StringEnter the SNMP read-only community string, with which APM can read MIB variables from the Rocky host.

-     Read-Write Community StringEnter the read-write SNMP community string, with which APM can read MIB variables from, or write MIB variables to, the Rocky host.

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for an SNMP response from Rocky. The value range is 1 to 60 seconds and the default is 4 seconds. If no SNMP response is received from Rocky within the timeout time, APM considers that the interaction has failed.

-     Retries (1-20)Enter how many times APM retries to send SNMP packets to the Rocky host.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on Rocky.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password.

The following parameters to be configured vary with authentication modes:

Username—Enter the SSH username. The user must have the Rocky administrator's privilege.

PasswordEnter the password of the SSH user.

Private Key FileEnter the directory of the SSH private key file or browse to the file.

Private Key PasswordEnter the password to decrypt the SSH private key file.

Super PasswordEnter the super password with which an SSH user can elevate privileges after login.

-     Port—Enter the SSH port on Rocky.

-     Timeout (1-120 seconds)—Enter the maximum time period that APM waits for an SSH response from Rocky. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from Rocky within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)—Enter how many times APM retries to send SSH packets to the Rocky host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on Rocky.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password.

The following parameters to be configured vary with authentication modes:

UsernameEnter the Telnet username. The user must have the Rocky administrator's privilege.

PasswordEnter the password of the Telnet user.

Super PasswordEnter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)—Enter the maximum time period that APM waits for a Telnet response from Rocky. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from Rocky within the timeout time, APM considers that the interaction has failed.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Rocky applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Rocky depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Rocky application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

4.     Click OK.

Modifying a Rocky application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Rocky application monitor. When the IP address of a monitored Rocky host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Rocky application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Rocky application monitor you want to modify.

The page for modifying the Rocky application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Rocky application monitor."

5.     Click OK.

Viewing the Rocky application monitor report

After a Rocky application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Rocky application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Rocky application monitor to display the report.

Figure 63 shows part of a Rocky application monitor report.

Figure 63 Part of a Rocky application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Rocky application.

·     IP Address—IP address of the Rocky host.

·     Application Type—Type of the monitored application, which is always Rocky.

·     Version—Version of the Rocky operating system.

·     System Running Time—Duration since the startup of the Rocky application to the time when APM last polled the Rocky application.

·     Last Polling Time—Time when APM last polled the Rocky application.

·     Relationship—Click the Related Applications icon  to view dependencies between the Rocky application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Rocky host. This field is not displayed if no alarm is generated by the Rocky application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Rocky application.

¡     Click the Weekly History icon  to view the availability of the Rocky application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Rocky application in the last 30 days.

·     Available Time—Total amount of time that the Rocky application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Rocky application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Rocky application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Rocky application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the Rocky application.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the Rocky application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the Rocky application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the following formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the Rocky host by sending up to three ICMP packets. If APM receives a response, it considers the ping test a success and records the response time. If APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the Rocky application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

System Load

APM counts the average system load over 1 minute, 5 minutes, and 15 minutes. The average system load records the average number of processes in the run queue over a specific time interval. An overloaded system results in severe performance issues. The load threshold value varies by CPU model.

The System Load area contains the following fields:

·     System Load/Min—Average system load over the last 1 minute. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 1 minute.

·     System Loads/5 Min—Average system load over the last 5 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 5 minutes.

·     System Loads/15 Min—Average system load over the last 15 minutes. Click the History Record icon icon_history_16x16.png to view the history graph of the system load over the last 15 minutes.

File System Usage Ratio

The Rocky file directory structure contains one root directory and multiple subdirectories. File systems are mounted to the root directory or subdirectories under the root directory. Each file system corresponds to a physical disk partition or a logical volume. Use the File System Usage Ratio area to display how the available disk space is used.

The File System Usage Ratio area contains the following fields:

·     Name—Mount point of the file system in the Rocky directory structure.

·     File System Usage Ratio—Space usage ratio of the Rocky file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the file system usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the file system usage ratio.

·     In UseUsed space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the used file system space.

·     Free Space—Free space of the file system. Click the History Record icon icon_history_16x16.png to view the history graph of the free file system space.

Zombie Process Number

The Zombie Process Number area contains the following field:

·     Zombie Process Number—Number of zombie processes. Click the History Record icon icon_history_16x16.png to view the history graph of the zombie process number.

Zombie Process

The Zombie Process area contains the following fields:

·     Process Name—Name of the zombie process.

·     ID—ID of the zombie process.

·     Parent ID—ID of the parent process for the zombie process.

·     CPU Usage—CPU usage of the zombie process.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage of the zombie process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage of the zombie process.

·     Memory usage—Memory usage of the zombie process. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage of the zombie process.

·     CPU Time—Duration that the zombie process occupies the CPU.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Rocky application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Rocky application since 00:00 today.

Network Interface

The Network Interface area contains the following fields:

·     Interface Name—Identifier of a network interface card in Rocky. APM monitors both physical and virtual (logical) network interface cards.

·     Receive Rate—Receive rate of a network interface card. Click the Set Threshold icon  to set alarm thresholds for the receive rate of Rocky network interface cards

·     Send RateSend rate of a network interface card.

·     Input Error Packet Rate—Number of inbound erroneous packets per second on a network interface card.

·     Output Error Packet Rate—Number of outbound erroneous packets per second on a network interface card.

Error Log

APM examines the Rocky error log messages during polling and displays the first 10 error log messages obtained in the polling in the Rocky application monitor report. Click More to view all error log messages in the last polling interval if the report has more than 10 error logs.

The Error Log area contains the following fields:

·     Time—Time when the error occurred.

·     Log—Content of the error log message.

Process

By default, the list does not contain any processes. To monitor processes on Rocky, click the Configuration icon  to select the processes to be monitored. APM collects the index data for the monitored processes when APM polls applications next time, including the CPU usage ratio and memory usage ratio.

The Process area contains the following fields:

·     Config—Click the Config icon  to select processes to be monitored in the monitor list window.

·     Process Name—Name of the monitored process. For processes with the same name but different process identifiers (PIDs), APM collects the CPU usage ratio and the memory usage ratio for each process. For example, the application may generate a lot of httpd processes, and APM collects the CPU usage ratio and the memory usage ratio for each httpd process selected.

·     IDUnique identifier of the process on the OS.

·     Parent ID—ID of the parent process for the process.

·     CPU Usage—CPU usage ratio of the process.

¡     Click the Set Threshold icon  to set alarm thresholds for the Rocky process CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     Memory Usage—Memory usage ratio of the process. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     CPU Time—Duration that the process occupies the CPU.

I/O State

APM can monitor the I/O status of disks, partitions, and logical volumes in Rocky.

The I/O State area contains the following fields:

·     Device Name—Name of the disk, partition, or logical volume in Rocky.

·     I/O Read Rate—Data output rate of the disk, partition, or logical volume in Rocky.

·     I/O Write Rate—Data input rate of the disk, partition, or logical volume in Rocky.

inode

Index nodes (inodes) are required when you create files or directories in the Rocky file system. If the inodes are used up, you cannot create a file or directory in the file system.

The inode area contains the following fields:

·     File SystemFile system of the Rocky system.

·     Total—Total number of available inodes in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the total number of inodes in the file system.

·     Free—Number of inodes that are not used in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the number of idle inodes in the file system.

·     In Use—Number of inodes that have been used in the file system. Click the History Record icon icon_history_16x16.png to view the change trend of the number of used inodes in the file system.

·     inode Usage Ratio—Usage of inodes in the file system.

¡     Click the Set Threshold icon  to set alarm thresholds the inode usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of inode usage.

Vol Group

Logical volume management manages disk partitions in the Rocky operating system. It combines one or more physical disks to form a volume group, and allows you to create logical volumes on the volume group. One logical volume equals a disk partition.

The Vol Group area contains the following fields:

·     Name—Name of the volume group.

·     Size—Size of the volume group. Click the History Record icon icon_history_16x16.png to view the history graph of the volume group size.

·     In Use—Volume group space that is used. Click the History Record icon icon_history_16x16.png to view the change trend of the used volume group space.

·     Free Space—Volume group space that is not used. Click the History Record icon icon_history_16x16.png to view the history graph of the volume group space that is not used.

·     Usage Ratio—Usage of the volume group space.

¡     Click the Set Threshold icon  to set alarm thresholds of the space usage of the volume group.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the space usage of the volume group.

Session Information

The Session Information area displays Rocky session login information and contains the following fields:

·     User Name—User logged in to Rocky.

·     TTY—TTY line used by the user.

·     Login IPClient IP address used by the user at login. The value of :0 indicates that the user logged in to Rocky through the console.

·     Login Time—Time when the user logged in to Rocky.

·     Idle—Idle time after the user logged in to Rocky.

·     Command—Most recently executed command after the user logged in to Rocky.


Database server monitor

This chapter describes how to add and modify monitors for database servers, and how to view the monitor reports.

SQL Server

SQL Server is a Database Management System (DBMS) developed by Microsoft. The database performance and stability affects the operation of service applications. APM supports monitoring SQL Server applications.

Adding a SQL Server application monitor

APM can locally or remotely monitor SQL Server applications through JDBC. When you add SQL Server application monitors, follow these guidelines:

·     To locally monitor SQL Server applications, install agents on the hosts where SQL Server applications are deployed. For more information about installing agents, see "APM agent management."

·     Obtain the username and password of the user who has the SQL Server administrator's privileges and the authentication type.

·     Obtain the instance names for SQL Server applications if the default instance name is not used.

·     Add SQL Server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the SQL Server application, make sure at least one probe is configured in APM. After a SQL Server application monitor is added, APM sends the IP address and service port of the monitored SQL Server application to the probes for traffic collection.

To add a SQL Server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Management > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click SQL Server of the Database Server Monitor class.

The page for adding a SQL Server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the SQL Server application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the SQL Server application, 1433 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for the SQL Server application. This field is displayed only when at least one probe is configured for APM and when you select Enable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Authentication Type—Select an authentication type for the SQL Server application. Options are Windows authentication and SQL Server authentication. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the SQL Server administrator. This field is available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the SQL Server administrator. This field is available only when you select Disable from the Use Template list.

¡     Instance Name—Enter the SQL Server instance name that is the same as the name configured when the SQL Server was installed. Keep this field empty if the default instance name is used. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SQL Server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that SQL Server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between SQL Server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the SQL Server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a SQL Server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a SQL Server application monitor. When the IP address of the SQL Server host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a SQL Server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the SQL Server application monitor you want to modify.

The page for modifying the SQL Server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a SQL Server application monitor."

5.     Click OK.

Viewing the SQL Server application monitor report

After a SQL Server application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for the SQL Server application by viewing the monitor report.

To access a SQL Server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a SQL Server application monitor to display the report.

Figure 64 shows part of a SQL Server application monitor report.

Figure 64 Part of a SQL Server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the SQL Server application.

·     IP Address—IP address of the SQL Server host.

·     Application TypeType of the monitored application, which is always SQL Server.

·     Version—Version of the SQL Server application.

·     Port—Service port of the SQL Server application.

·     Last Polling Time—Time when APM last polled the SQL Server application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the SQL Server application and other applications in the dependency topology. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on SQL Server host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the SQL Server application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SQL Server application in the last polling interval.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the SQL Server application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the SQL Server application in the last 30 days.

·     Available Time—Total amount of time that the SQL Server application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SQL Server application was unavailable after 00:00 today.

·     Inaccessible TimeTotal amount of time that the SQL Server application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SQL Server application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Memory Usage

The Memory Usage area contains the following fields:

·     Total Memory—Total size of the dynamic memory used by the SQL Server application in the last polling interval.

·     SQL Buffer—Size of the dynamic memory used by the SQL Server application for SQL cache in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the SQL buffer.

·     Optimizer Memory—Size of the dynamic memory used by the SQL Server application to query optimization in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the optimizer memory.

·     Lock Memory—Size of the dynamic memory used by the SQL Server application for locks in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the lock memory.

·     Connection Memory—Size of the dynamic memory used by the SQL Server application to maintain connections in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the connection memory.

·     Granted Workspace Memory—Size of the dynamic memory that the SQL Server application allocated for processes to perform operations, such as hashing, sorting, copying, and creating indexes in the last polling interval.

·     Undetermined Memory—Number of processes that were waiting for the permissions to use the workspace memory in the last polling interval.

·     Memory Grants Outstanding—Number of processes that were permitted to use the workspace memory in the last polling interval.

Buffer Management

The Buffer Management area contains the following fields:

·     Buffer Hit Ratio—How often the required pages have been found in the buffer pool without reading from the disk in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the buffer hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the buffer hit ratio.

·     Page Lookups/Min—Number of requests to search for pages in the buffer pool per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the page lookups per minute.

·     Page Reads/Min—Number of database pages that were read from the disk per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the page reads per minute.

·     Page Writes/Min—Number of database pages that were written to the disk per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the page writes per minute.

·     Total Pages—Total number of pages in the SQL Server buffer, including stolen pages, available pages, and database pages in the last polling interval.

·     Database Pages—Number of database pages in the buffer pool in the last polling interval.

·     Free Pages—Available pages in the buffer pool in the last polling interval.

·     Disk ReadsTotal number of disk reads since the connection started.

·     Disk WritesTotal number of disk writes since the connection started.

Connection Statistics

The Connection Statistics area contains the following fields:

·     Connection Time—Time consumed when APM established the connection with the SQL Server application in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the connection time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the connection time.

·     Active Connections—Number of connections between the SQL Server application and its users in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of active connections.

·     Logins/sec—Number of newly established connections per second in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of logins per second.

·     Logouts/sec—Number of terminated connections per second in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of logouts per second.

·     Sessions—Number of sessions of the SQL Server.

·     Running Sessions—Number of running sessions of the SQL Server.

Buffer Details

The Buffer Details area contains the following fields:

·     Cache Hit Ratio—How often the required data has been found in the cache in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the cache hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the cache hit ratio.

·     Cache Objects in Use—Number of cache objects that were being used in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the cache objects being used.

·     Cache Object Counts—Number of cache objects in the cache in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the cache object count.

·     Cache Pages—Number of pages that the cache objects were using in the last polling interval. The size of each page is 8K. Click the History Record icon icon_history_16x16.png to view the history graph of cache pages.

Lock Details

The Lock Details area contains the following fields:

·     Lock Requests/sec—Number of lock requests and the lock conversions received by the SQL Server application per second in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the lock requests per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the lock requests per second.

·     Lock Waits/sec—Number of waiting lock requests per second in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the lock waits per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the lock waits per second.

·     Lock Timeouts/sec—Number of lock requests that timed out per second in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the lock timeouts per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the lock timeouts per second.

·     Number of Deadlocks/sec—Number of lock requests that resulted in deadlocks per second in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of deadlocks per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the number of deadlocks per second.

·     Average Wait Time—Average waiting time for each lock request in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the average wait time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the average wait time.

·     Locks—Total number of locks.

·     Deadlocks—Number of deadlocks.

·     Lock TimeOut—Lock timeout time. The value of -1 indicates that the lock never times out.

·     Table Locks—Number of table locks.

SQL Statistics

The SQL Statistics area contains the following fields:

·     Batch Requests/Min—Number of Transact-SQL command batches that the SQL Server application received per minute in the last polling interval. A high value of this index indicates good throughput. Click the History Record icon icon_history_16x16.png to view the history graph of the batch requests per minute.

·     SQL Compilations/Min—Times of SQL compilations per minute in the last polling interval. This value is in steady state after the activity of the SQL Server user becomes stable. Click the History Record icon icon_history_16x16.png to view the history graph of the SQL compilations per minute.

·     SQL Recompilations/Min—Times of SQL recompilations per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the SQL recompilations per minute.

·     Auto Param Attempts/Min—Times of the auto-parameterization attempts per minute in the last polling interval. The auto-parameterization attempt progress happens whenever the SQL Server instance tries to replace some characters with the parameters to parameterize Transact-SQL requests. To the similar requests, this progress can reuse the operation plan saved in the cache. Click the History Record icon icon_history_16x16.png to view the history graph of the auto parameter attempts per minute.

·     Auto Param Failures/Min—Times of the failed auto-parameterization attempts per minute in the last polling interval. The value should be small. Click the History Record icon icon_history_16x16.png to view the history graph of the auto parameter failures per minute.

Latch Details

The Latch Details area contains the following fields:

·     Latch Waits/Min—Number of waiting latch requests per second in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the latch waits per minute.

·     Average Latch Wait Time—Average waiting time (in millisecond) for latch requests in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the average latch wait time.

Access Method Details

The Access Method Details area contains the following fields:

·     Full Scans/Min—Times of unrestricted base-table or full-index scans per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the full scans per minute.

·     Range Scans/Min—Times of range scans by using indexes per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the range scans per minute.

·     Probe Scans/Min—Number of probe scans to directly find at most one single qualified row in an index or base table per second in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the probe scans per minute.

Waiting Tasks

The Waiting Tasks area contains the following field:

·     Waiting Tasks—Number of tasks that are waiting for processor, I/O, or memory resources. Click the History Record icon icon_history_16x16.png to view the history data for waiting tasks.

Database I/O

The Database I/O area contains the following field:

Database I/O—Transfer rate, in megabytes per second, of data from memory to disk, disk to memory, or disk to disk.

Resource Waits

The Resource Waits area contains the following fields:

·     Wait Category—Categories that accumulate wait type statistics.

·     Wait Time (ms/sec)—Wait time in milliseconds per second for all tasks that are waiting for one or more resources in the wait category since the last update interval.

·     Average Waiter Count—Number of tasks that are waiting for one or more resources in the wait category at a typical moment during the last sample interval.

·     Cumulative Wait Time—Total amount of time that tasks have waited.

Data File I/O

The Data File I/O area contains the following fields:

·     Database—Name of the database.

·     File Name—Name of the database file.

·     MB/sec Read—Most recent read activity, in megabytes per second, for the database file.

·     MB/sec Written—Most recent write activity, in megabytes per second, for the database file.

·     Size—Size of the database file.

·     Response Time—Average response time, in milliseconds, of the most recent read-and-write activity to the database file.

% Processor Time

The % Processor Time area contains the following field:

% Processor Time—Percentage of the time that the processor spends to execute non-idle threads for the instance across all CPUs. Click the History Record icon icon_history_16x16.png to view the history data for the processor time.

Blocked Process Number

The Blocked Process Number area contains the following field:

·     Blocked Process NumberNumber of blocked processes.

Application Traffic

APM collects SQL Server traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the SQL Server application over the last 1 hour in the last polling interval.

·     Today's Traffic—Total traffic sent and received by the SQL Server application since 00:00 today in the last polling interval.

Activity User Tasks

The Activity User Tasks area contains the following fields:

·     Session ID—Unique integer assigned to a user connection when the connection is established.

·     User Process—Displays 0 for a system process and 1 for a user process.

·     Login—SQL Server login name under which the session is currently executing.

·     Database—Name of the database.

·     Task State—State of the task.

·     Command—The kind of command.

·     Application—Name of the application program that created the connection.

·     Wait Time—Time, in milliseconds, in which this task is waiting for a resource. When the task is not waiting, the wait time is 0.

·     Wait Type—Name of the wait type.

·     Wait Resource—Name of the resource that is needed.

·     Blocked By—ID of the session that is blocking the task.

·     Memory Use (KB)—Amount of memory, in kilobytes, that is being used by the task.

·     Host Name—Name of the computer that made the connection to the instance of SQL Server.

·     Workload Group—Name of the Resource Governor workload group for the session.

Job Details

The Job Details area contains the following fields:

·     Name—Name of the job that has or has not run in the last polling interval.

·     Enabled—Indicates whether the job is enabled.

·     Result—Result of the job. An en dash (-) indicates that the job has never run.

·     Date—Date when the job started running.

·     Time—Time when the job started running.

·     Duration—Running duration of the job.

Database Status

The Database Status area contains the following fields:

·     Database—Database name.

·     Database Status—Status of the database.

·     Database Create Date—Date when the database was created.

Database Details

The Database Details area contains the following fields:

·     Database—Name of the running database in the SQL server application. "_Total" indicates statistics for all databases.

·     Size—Disk space for the database.

·     Used Size—Size of the database space that is used.

·     Free Size—Size of the database space that is not used.

·     Database Usage Ratio—Percentage of the used database space to the total database space.

·     Data File Size—Size of the data file.

·     Data File Path—Path where the data file is located.

·     Data File Number—Number of the data files.

·     Transactions—Number of transactions that the database started per minute.

·     Active Transactions—Number of active transactions of the database.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Database Log Details

The Database Log Details contains the following fields:

·     Database—Name of the database that the SQL server application runs. The value Total indicates that information about all databases is collected.

·     Log File—Disk space occupied by database log files.

·     Log Files Used—Size of used log files in the database.

·     Log File Usage Ratio—Usage ratio of the log files in the database. Log Files Usage Ratio = Log Files Used/Log Files x 100%.

·     Log Writes—Times of writing the log to the log file per minute.

·     Log Write Waits—Number of logs that were waiting to be written to the log files.

·     Log Write Wait Time—Total waiting time before the log was written to the log file.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index, and click the Set Threshold icon  to set alarm thresholds for a monitor index.

Top 10 SQL by Execution Durations

The Top 10 SQL by Execution Durations area displays top 10 SQL statements by accumulated execution duration.

The Top 10 SQL by Execution Durations area contains the following fields:

·     SQL—SQL statement.

·     Cumulative Execution Duration—Total duration used for parsing and executing the SQL statement.

·     Cumulative CPU Time—Duration that parsing and executing the SQL statement occupies the CPU.

·     Logical Reads—Number of logical reads of the SQL statement.

·     Physical Reads—Number of physical reads of the SQL statement.

·     Executions—Number of times that the SQL statement is executed.

Top 10 SQL by Logical Reads

The Top 10 SQL by Logical Reads area contains the following fields:

·     SQLTop 10 SQL statements by logic read.

·     Cumulative Execution Duration—Total duration used for parsing and executing the SQL statement.

·     Cumulative CPU Time—Duration that parsing and executing the SQL statement occupies the CPU.

·     Logical Reads—Number of times for logical reads of the SQL statement.

·     Physical Reads—Number of physical reads of the SQL statement.

·     Executions—Number of times that the SQL statement is executed.

Top 10 SQL by Physical Reads

The Top 10 SQL by Physical Reads area contains the following fields:

·     SQLTop 10 SQL statements by physical read.

·     Cumulative Execution Duration—Total duration used for parsing and executing the SQL statement.

·     Cumulative CPU Time—Duration that parsing and executing the SQL statement occupies the CPU.

·     Logical Reads—Number of logical reads of the SQL statement.

·     Physical Reads—Number of physical reads of the SQL statement.

·     Executions—Number of times that the SQL statement is executed.

Top 10 SQL By Cumulative CPU Time

The Top 10 SQL By Cumulative CPU Time area contains the following fields:

·     SQL—SQL statement.

·     Cumulative Execution Duration—Time taken to parse and execute the SQL statement.

·     Cumulative CPU Time—CPU time taken to parse and execute the SQL statement.

·     Logical Reads—Number of times for which the SQL statement has been logically read.

·     Physical Reads—Number of times for which the SQL statement has been physically read.

·     Executions—Number of times for which the SQL statement has been executed.

MySQL

MySQL is an open source DBMS that directly impacts the service performance. APM supports monitoring MySQL applications.

Adding a MySQL application monitor

APM can locally or remotely monitor MySQL applications through JDBC. When you add MySQL application monitors, follow these guidelines:

·     To locally monitor SQL Server applications, install agents on the hosts where MySQL applications are deployed. For more information about installing agents, see "APM agent management."

·     Obtain the username and password of the user who has the MySQL administrator's privileges.

·     Add MySQL hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the MySQL application, make sure at least one probe is configured in APM. After a MySQL application monitor is added, APM sends the IP address and service port of the monitored MySQL application to the probes for traffic collection.

To add a MySQL application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Management > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click MySQL of the Database Server Monitor class.

The page for adding a MySQL application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the MySQL application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for MySQL, 3306 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for MySQL. This field is displayed only when at least one probe is configured for APM and when you select Enable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the MySQL administrator. This field is available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the MySQL administrator. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of MySQL applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     APM Server—Select an APM server to monitor the application. The option is in server-address (application-type:n/N) format. The letter n indicates the number of the selected type of applications monitored on the APM server. The letter N indicates the number of all types of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that MySQL depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between MySQL and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the MySQL application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a MySQL application monitor

Authorized users can modify all parameters except the IP address and the APM server for a MySQL application monitor. When the IP address of the MySQL host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a MySQL application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays the application types that can be monitored by APM.

3.     Click the Modify iconicon_modify_16x16.png for the MySQL application monitor you want to modify.

The page for modifying the MySQL application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a SQL Server application monitor."

5.     Click OK.

Viewing MySQL application monitor report

After a MySQL application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for the MySQL application by viewing the monitor report.

To access a MySQL application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a MySQL application monitor to display the report.

Figure 65 shows part of a MySQL application monitor report.

Figure 65 Part of a MySQL application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the MySQL application.

·     IP Address—IP address of the MySQL host.

·     Application TypeType of the monitored application, which is always MySQL.

·     MySQL Version—Version of the MySQL application.

·     Port—Service port of the MySQL application.

·     Basic Directory—MySQL installation path recorded in the MySQL application.

·     Data Directory—Data file storage directory in the MySQL application.

·     Last Polling Time—Time when APM last polled the MySQL application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the MySQL application and other applications in the dependency topology. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the MySQL host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the MySQL application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the MySQL application in the last polling period.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the MySQL application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the MySQL application in the last 30 days.

·     Available Time—Total amount of time that the MySQL application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the MySQL application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the MySQL application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the MySQL application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Thread Exclusive Memory

The Thread Exclusive Memory area contains the following fields:

·     Total Thread Exclusive Memory—Total memory that is exclusive to threads.

·     Thread Stack Buffer—Size of the buffer that stores identity information of each thread.

·     Sort Buffer—Size of the buffer used for sorting files.

·     Join Buffer—Size of the buffer used for joining two or more tables.

·     Read Buffer—Size of the buffer used for reading data in order.

·     Random Read Buffer—Size of the buffer used for randomly reading data.

·     Temporary Table Buffer—Size of the buffer used for operating temporary tables.

Global Shared Memory

The Global Shared Memory area contains the following fields:

·     Total Global Shared Memory—Total memory that is globally shared.

·     Queue Buffer—Size of the buffer used for request results.

·     Thread Buffer—Size of the buffer that stores idle connection threads.

·     Table Buffer—Size of the buffer that stores information about file handles in the table file.

·     Table Definition Buffer—Size of the buffer that stores table definition information.

·     Binary Log Buffer—Size of the buffer that stores information about binary logs caused by data change.

·     Key Buffer—Size of the buffer used for index blocks.

·     InnoDB Log Buffer—Size of the buffer used for InnoDB transaction logs.

·     InnoDB Data and Index Buffer—Size of the buffer used for InnoDB data and index blocks.

·     InnoDB Dictionary Buffer—Size of the buffer used for InnoDB dictionary information.

Response Time

The Response Time area contains the following fields:

·     Response Time—Response time of the MySQL application in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Connection Timeout—Time before the connection times out. Click the History Record icon icon_history_16x16.png to view the history graph of the connection timeout.

Request Statistics

The Request Statistics area contains the following fields:

·     Requests/s—Number of connection requests that the MySQL application received per second in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the requests received per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the requests received per second.

·     Receive Rate—Bandwidth that the MySQL application consumed to receive data from all clients per second in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the receive rate.

·     Send Rate—Bandwidth that the MySQL application consumed to send data to all clients per second in the last polling interval.

¡     Click the Set Threshold icon  to set alarm thresholds for the send rate.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the send rate.

Connection Statistics

The Connection Statistics area contains the following fields:

·     Connections—Total number of successful connections from the MySQL application start time to the last polling time. Click the History Record icon icon_history_16x16.png to view the history graph of the connections.

·     Aborted Connections—Total number of failed connections from the MySQL application start time to the last polling time. Click the History Record icon icon_history_16x16.png to view the history graph of the aborted connections.

·     Aborted Clients—Total number of connections terminated by the MySQL server from the MySQL application start time to the last polling time. Click the History Record icon icon_history_16x16.png to view the history graph of the aborted clients.

·     Connections Per Second—Number of connection attempts per second.

·     Established Connections Per Second—Number of established connections per second.

·     Connection Cache Hit RatioRatio of the connections read from the cache to the total connections.

·     Max Allowed Connections—Maximum number of allowed connections.

·     Actual Max Connections—Actual maximum number of connections.

Thread Details

The Thread Details area contains the following fields:

·     Running Threads—Number of running threads in the MySQL application in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of running threads.

·     Buffered Threads—Number of buffered threads in the thread cache in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of buffered threads.

·     Thread Buffer SizeNumber of threads that can be buffered in the thread cache.

Key Details

The Key Details area contains the following fields:

·     Key Hit RatioBuffer hit ratio for keys in the last polling interval. A larger value indicates a better result.

¡     Click the Set Threshold icon  to set alarm thresholds for the key hit ratio. An alarm is generated when the index value is less than or equal to the threshold value.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the key hit ratio.

·     Key Writes Hit Ratio—Ratio of key writes to the key write requests.

·     Key Buffer Used—Size of the key buffer used by the MySQL application in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the key buffer used.

·     Key Buffer—Total size of the key buffer for the MySQL application in the last polling interval.

·     Index Reads—Number of key block reads from the hard disk.

·     Index Reads/Min—Number of key block reads from the hard disk per minute.

·     Index Writes—Number of key block writes from the hard disk.

·     Index Writes/Min—Number of key block writes to the hard disk per minute.

Buffer Details

The Buffer Details area contains the following fields:

·     Query Hit Ratio—Ratio of key value reads from the buffer to the number of query attempts.

·     Queue Buffer—Memory allocated for buffering the request result.

·     Queue Buffer Limit—Maximum memory used for storing the buffer result.

·     Cache Queries—Number of query commands in the cache.

Table Lock Statistics

The Table Lock Statistics area contains the following fields:

·     Table Locks Immediately Released/sec—Number of immediately released table locks per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the table locks immediately released per minute.

·     Table Locks Wait/sec—Number of waiting table locks in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the table locks waits per minute.

SQL Operation Statistics/min

The SQL Operation Statistics/min area contains the following fields:

·     Deletes—Number of Delete statements executed by the MySQL application per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the Delete statements executed by the MySQL application per minute.

·     Adds—Number of Insert statements executed by the MySQL application per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the Add statements executed by the MySQL application per minute.

·     Queries—Number of Select statements executed by the MySQL application per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the Query statements executed by the MySQL application per minute.

·     Updates—Number of Update statements executed by the MySQL application per minute in the last polling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the Update statements executed by the MySQL application per minute.

InnoDB Buffer Hit Ratio

The InnoDB Buffer Hit Ratio area contains the following field:

Hit Ratio—Hit ratio of InnoDB buffer.

Transactions Per Second

The Transactions Per Second area contains the following field:

Transactions Per Second—Number of transactions handled per second.

Application Traffic

APM collects MySQL traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the MySQL application over the last 1 hour in the last polling interval.

·     Today's Traffic—Total traffic sent and received by the MySQL application since 00:00 today in the last polling interval.

Database Details

The Database Details area contains the following fields:

·     Database—Name of the running database on the MySQL application.

·     Size—Size of disk space for the database.

·     Tables—Number of tables in the database.

Oracle

Oracle Database is a database management system developed by Oracle Corporation. The performance and stability affects the service applications. APM supports monitoring Oracle applications.

Adding an Oracle application monitor

APM can monitor Oracle through agents or JDBC. When you add application monitors for Oracle, follow these guidelines:

·     To monitor an Oracle application through an agent, you must deploy the agent on the Windows or Linux operating system where the Oracle application is installed.

·     To monitor an Oracle application through JDBC, obtain the username and password of the user who has the Oracle administrator's privileges.

·     You must identify whether the Oracle application has used RAC and identify the Oracle SID to be monitored.

·     Add Oracle hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Oracle application, make sure at least one probe is configured in APM. After an Oracle application monitor is added, APM sends the IP address and service port of the monitored Oracle application to the probes for traffic collection.

To add an Oracle application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Management > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Oracle of the Database Server Monitor class.

The page for adding an Oracle application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Oracle application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Oracle application. The default is 1521. This field is displayed only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for the Oracle application. This field is displayed only when at least one probe is configured for APM. This field is displayed only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is displayed only when you select Disable from the Use Template list.

¡     Monitor Type—Select the Oracle running type. Options are stand-alone and rac. This field is displayed only when you select Disable from the Use Template list.

¡     Database Instance Name—Enter the instance name for the Oracle application. This field is displayed only when you select Disable from the Use Template list.

¡     Username—Enter the username of the Oracle administrator. If the username is sys, enter sys as sysdba in this field. This field is displayed only when you select Disable from the Use Template list.

¡     Password—Enter the password of the Oracle administrator. This field is displayed only when you select Disable from the Use Template list.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is displayed only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Oracle applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Oracle depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Oracle and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Oracle application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connectivity to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an Oracle application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Oracle application monitor. When the IP address of the Oracle host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Oracle application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, click Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Oracle application monitor you want to modify.

The page for modifying the Oracle application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Oracle application monitor."

5.     Click OK.

Viewing the Oracle application monitor report

After an Oracle application monitor is added, APM collects index data of the application, and calculates its availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Oracle application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Oracle application monitor to display the report.

Figure 66 shows part of an Oracle application monitor report. The Oracle application monitor report contains the Summary, Objects, Tablespace, Session, Top10 SQL, and Parameter tabs.

Figure 66 Part of an Oracle application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Oracle application.

·     IP Address—IP address of the Oracle host.

·     Application Type—Type of the monitored application, which is always Oracle.

·     Port—Service port of the Oracle application.

·     Port Status—Status of the Oracle application service port.

·     Version—Version number of Oracle application.

·     Start Time—Date and time when the Oracle application started.

·     Bits—Number of bits for the Oracle application, 32 or 64.

·     Character Set—Character set for the Oracle application.

·     Last Polling Time—Time when APM last polled the Oracle application.

·     Relationship—Click the Relationship icon  to view dependencies between the Oracle application and other applications in the dependency topology. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Oracle host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the Oracle application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Oracle application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Oracle application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Oracle application in the last 30 days.

·     Available Time—Total amount of time that the Oracle application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Oracle application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Oracle application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Oracle application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Oracle Detail

The Oracle Detail area contains the following fields:

·     Creation Time—Time when Oracle application installation was completed.

·     Open Mode—Current open mode for the Oracle application. Open modes include READ ONLY and READ WRITE.

·     Logging Mode—Current logging mode for the Oracle application. The following logging modes are available:

¡     ARCHIVELOGThe old log file is automatically copied to the specified path and cannot be overwritten by the new log file during log file switching.

¡     NOARCHIVELOGThe old log file is overwritten by the new log file during log file switching.

·     Size—Size of disk space used by all the datafiles in the Oracle application.

·     Block Size—Default standard block size for the Oracle application.

·     Average Execution Times—Average number of times that each SQL statement in the Oracle application was executed.

¡     Click the Set Threshold icon  to set alarm thresholds for the average execution times.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the average execution times.

·     Reads—Number of times that the Oracle application read data blocks from the disk. Click the History Record icon icon_history_16x16.png to view the history graph for this field.

·     Writes—Number of times that the Oracle application wrote data blocks to the disk. Click the History Record icon icon_history_16x16.png to view the history graph for this field.

·     Disk/Memory Sort Ratio—Disk/memory sorting ratio. It is obtained by using the formula: Disk sorting attempts/Memory sorting attempts x 100%. Click the History Record icon icon_history_16x16.png to view the history graph of the disk/memory sorting ratio.

·     Row Link/Row Mitigation CountNumber of row links and number of row mitigations.

·     Forcible Log Switch TimeTime when the Oracle application was forced to perform Redo log file switching.

·     Database Name—Name of the Oracle database.

·     Physical Memory—Physical memory size of the Oracle database server.

·     Transactions Per Second—Average number of transactions executed per second.

·     Flashback On—Flashback setting:

¡     YES—Flashback is on.

¡     NO—Flashback is off.

¡     RESTORE POINT ONLY—Flashback is on but one can only flash back to reliable restore points.

·     Locks—Number of locks in the database.

·     Deadlocks—Number of deadlocks in the database.

·     Weekly Growth Rate of Archived LogsWeekly growth rate of achived logs in percentage in the database.

Connection Time

The Connection Time area contains the following field:

·     Connection TimeAmount of time APM took to establish connectivity with the Oracle application.

¡     Click the Set Threshold icon  to set alarm thresholds for the connection time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the connection time.

SGA Details

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The SGA Details area contains the following fields:

·     Buffer—Size of buffer cache in SGA.

·     Fixed Area—Size of the fixed area in SGA. The fixed area, typically in small size, contains control information for other SGA regions.

·     Database Buffer—Size of the library cache in SGA.

·     Dictionary Buffer—Size of the dictionary cache in SGA.

·     Dictionary RatioRatio of the used dictionary buffer to the total dictionary buffer.

·     SQL Area—Size of the SQL area in SGA.

·     Shared SQL Butter RatioRatio of the used shared SQL buffer to the total shared SQL buffer.

·     SGA RatioRatio of the used SGA buffer to the total SGA buffer.

·     SGA Used SizeSGA used space size

SGA State

The System Global Area (SGA) is a shared memory space allocated to the Oracle application.

The SGA State area contains the following fields:

·     Buffer Hit Ratio—Percentage of times that the requested information was found in the buffer cache.

¡     Click the Set Threshold icon  to set alarm thresholds for the buffer hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the buffer hit ratio.

·     Dictionary Hit Ratio—Percentage of times that the requested information was found in the dictionary cache.

¡     Click the Set Threshold icon  to set alarm thresholds for the dictionary hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the dictionary hit ratio.

·     Library Hit Ratio—Percentage of times that the requested information was found in the library cache.

¡     Click the Set Threshold icon  to set alarm thresholds for the library hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the library hit ratio.

·     Free Memory—Free memory in SGA. Click the History Record icon icon_history_16x16.png to view the history graph of the free memory.

Large Pool

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The Large Pool area contains the following fields:

·     Large PoolTotal size of the large pool.

·     Large Pool Free SizeFree space size of the large pool.

·     Large Pool Used SizeUsed space size of the large pool.

·     Large Pool Ratio—Ratio of the used large pool size to the total large pool size.

Java Pool

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The Java Pool area contains the following fields:

·     Java PoolTotal size of the Java pool.

·     Java Pool Free SizeFree space size of the Java pool.

·     Java Pool Used SizeUsed space size of the Java pool.

·     Java Pool Ratio—Ratio of the used Java pool size to the total Java pool size.

Shared Pool

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The Shared Pool area contains the following fields:

·     Shared PoolTotal size of the shared pool.

·     Shared Pool Free SizeFree space size of the shared pool.

·     Shared Pool Used SizeUsed space size of the shared pool.

·     Shared Pool Ratio—Ratio of the used shared pool size to the total shared pool size.

REDO Log Buffer

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The REDO Log Buffer area contains the following fields:

·     REDO Log Buffer—REDO log buffer size.

·     REDO Request Failure Ratio—Ratio of the failed REDO requests to the total REDO requests.

·     REDO Writes/Sec—Number of REDO writes in the most recent polling interval.

·     REDO Block Writes/Sec—Number of REDO blocks written per second in the most recent polling interval.

·     REDO Entries/Sec—Number of REDO entries per second in the most recent polling interval.

Connection Information

The Connection Information area contains the following fields:

·     Current Connections—Number of connections used. Click the History Record icon icon_history_16x16.png to view the history graph of the current connections.

·     Max. Connections—Maximum number of connections allowed by the Oracle application. If the number of connections reaches the maximum number, new connections cannot be established.

PGA Statistics

A Program Global Area (PGA) is a non-shared memory area allocated to each process in the Oracle application when the process starts.

Application Traffic

APM collects Oracle application traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Oracle application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Oracle application since 00:00 today.

Instance Efficiency Percentages

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The Instance Efficiency Percentages area contains the following fields:

·     Buffer Hit Ratio—Buffer hit ratio of the Oracle application.

·     Library Cache Hit Ratio—Library cache hit ratio of the Oracle application.

·     Latch Hit Ratio—Latch hit ratio of the Oracle application.

·     No Wait Ratio for Obtaining Redo Log BufferPercentage of times that the Oracle application obtained Redo log buffer without waiting.

·     No Wait Ratio for Obtaining Data from MemoryPercentage of times that the Oracle application obtained data from memory without waiting.

·     Execute to Parse RatioPercentage of executed SQL statements to parsed SQL statements.

·     Parse Efficiency—Parse efficiency of SQL statements.

·     Running EfficiencyRunning efficiency of SQL statements.

·     Memory Sort RatioPercentage of times for sorting SQL statements in the memory.

·     Disk Sorts /Sec—Number of disk sorts per second in the most recent polling interval.

·     Memory Sorts /Sec—Number of memory sorts per second in the most recent polling interval.

·     Flash Recovery Area Usage Ratio—Usage ratio of the Oracle flash recovery area.

·     CPU Usage Ratio—Ratio of the CPU used to execute and parse SQL statements.

·     PGA Hit Ratio—Hit ratio of the Process Global Area.

·     PGA Ratio—Ratio of the used PGA buffer to the total PGA buffer.

Load Profile

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The Load Profile area contains the following fields:

·     Logical Chunk Reads/SecNumber of data blocks read from the buffer cache per second.

·     Physical Chunk Reads/SecNumber of data blocks read from the disk per second.

·     Physical Chunk Writes/SecNumber of data blocks written to the disk per second.

·     Chunk Changes/SecNumber of data blocks modified per second.

·     Parses/SecNumber of SQL statements parsed per second.

·     Hard Parses/Sec—Number of SQL statements hard parsed per second.

·     Operations/Sec—Number of SQL statements executed per second.

·     Logins/Sec—Number of logins per second.

·     Hard Parse RatioHard parse ratio of SQL statements.

·     Soft Parse RatioSoft parse ratio of SQL statements.

Global Cache Information

The Global Cache Information area contains the following fields:

·     Remote Cache Access RatioRemote cache access ratio when the Oracle application runs in a RAC.

·     Disk Cache Access RatioDisk cache access ratio when the Oracle application runs in a RAC.

·     Node Inline TrafficInline traffic among nodes when the Oracle application runs in a RAC.

·     Local Cache Access RatioLocal cache access ratio when the Oracle application runs in a RAC.

·     Logins/Sec—Number of logins for the Oracle application per second.

DB Time

The DB Time area contains the following field:

·     DB TimeAmount of time used by the Oracle application to handle non-idle waits and database computation. This field is recorded in the Automatic Workload Repository (AWR).

Database Time Zone

The Database Time Zone area contains the following fields:

·     Database Time Zone—Time zone configured for the database.

·     Session Time Zone—Time zone used when the client is connected to the Oracle database.

·     Time—Database time when data was most recently collected.

Transactions in Current Rollback Segment

The Transactions in Current Rollback Segment area contains the following fields:

·     Name—Transaction name.

·     Session ID—ID of the session to which the transaction belongs.

·     SQL—SQL statement executed by the transaction.

Rollback

The Rollback area contains the following fields:

·     Segment—Name of the rollback segment.

·     Tablespace—Name of the tablespace to which the rollback segment belongs.

·     State—Status of the rollback segment. The following options are available:

¡     ONLINE—The segment is in online state.

¡     PENDING OFFLINE—The segment is in offline state, but some transactions are still using the rollback segment.

¡     OFFLINE—State that the pending offline segment goes to when the transactions are over.

·     Current Size—Size of the rollback segment.

·     Current Blocks—Number of current blocks used by the rollback segment.

·     Initial Extent Segment—Size of the first extent segment allocated for the rollback segment.

·     Next Extent Segment—Size of the second extent segment allocated for the rollback segment.

·     Min Extent Segment—Minimum number of extents allocated for the rollback segment.

·     Max Extent Segment—Maximum number of extents allocated for the rollback segment.

·     Gets—Times of getting rollback segment headers.

·     Waits—Waiting times of the rollback segment headers.

·     HWM—High-water mark (HWM) of the rollback segment. HWM indicates the position of the last data block in the current segment.

·     Shrinks—Shrinking times of the rollback segment.

·     Wraps—Wrapping times of the rollback segment.

·     Extends—Extending times of the rollback segment.

·     Hit Ratio—How often the rollback segment headers have been obtained. Hit Ratio = Gets/(Gets + Waits) × 100%.

Cluster Details

The Cluster Details area displays detailed information for each instance in a cluster. For an Oracle application in standalone mode, this area displays detailed information for only the Oracle application.

The Cluster Details area contains the following fields:

·     Instance No.—Number of the instance.

·     Instance Name—Name of the instance.

·     Host Name—Host name of the instance.

·     VersionVersion of the instance.

·     Startup TimeTime when the instance was started.

·     Instance State—State of the instance.

·     Database StateState of the cluster database.

·     Loading Status—Loading status of the instance.

·     REDO Thread Count—Number of Redo threads in the instance.

·     Allowing Login—Whether the instance can be logged in to.

·     Instance Role—Role of the instance.

·     Running Status—Running status of the instance.

Enqueue Request

The Enqueue Request area contains the following fields:

·     Total Wait—Number of requests in the queue of the database.

·     Total Request—Number of requests of the database.

·     Lock Wait RatioRatio of Total Wait to Total Request.

Utilization Statistic

You can click the History Record icon icon_history_16x16.png to view the history graph for each field.

The Utilization Statistic area contains the following fields:

·     Process Util Rate—Utilization rate of process in the database.

·     Session Util Rate—Utilization rate of session in the database.

Traverse Table

The Traverse Table area contains the following field:

Traverse Table Rate—Rate of fully traversed table in the database.

Read By Index

The Read By Index area contains the following field:

Read By INdex Rate—Rate of rows read by index in the database.

Redo Latency

The Redo Latency area contains the following field:

Log Operate Interval—Interval of log writes in the database.

Log Redo

The Log Redo area contains the following field:

QTY Redo Remain—Number of redo logs to be saved in the database.

Jobs

The Jobs area contains the following fields:

·     InteruptionsNumber of interrupted jobs in the database.

·     FailureNumber of failed jobs in the database.

Lock Utilization

The Lock Utilization area contains the following fields:

·     Used Locks—Number of locks being used.

·     Max. Locks—Maximum number of locks that can be used.

·     Lock Utilization Rate—Limited Lock Utilization divided by Limited Lock Utilization.

Transaction Utilization

The Transaction Utilization area contains the following field:

·     TX UTIL Rate—Percentage of transaction utilization.

Parallel Query

The Parallel Query area contains the following field:

·     Busy Rate—Rate of busy servers when the database executes query parallelly.

User Information

The User Information area contains the following fields:

·     ID—ID of the Oracle user.

·     Username—Username of the Oracle user.

·     Account Status—Account status of the Oracle user.

¡     OPEN—The Oracle user is in normal state.

¡     LOCKED—The Oracle user is in locked state.

¡     EXPIRED—The password of the Oracle user has expired.

¡     LOCKED & EXPIRED—The password of the Oracle user has expired and the Oracle user is in locked state.

·     Default Table SpaceName of the default table space.

·     Temporary Table SpaceName of the temporary table space.

·     Profile—Profile used by the Oracle user. The default is the profile that the Oracle application creates by default.

·     Created Time—Time when the Oracle user was created.

·     Lock Date—Date when the Oracle user was locked.

·     Expiry Date—Date when the Oracle user expired.

·     Remaining Lifetime (days)—Number of days before the Oracle user expires. Click the Set Threshold icon icon_threshold_16x16.png to set alarm thresholds for this field.

·     DBA YES/NO—Whether the Oracle user is a DBA user.

Backup Information

The Backup Information area contains the following fields:

·     Start Time—Start time of the first backup.

·     Completion TimeCompletion time of the last backup.

·     Backup Set SizeSize of the backup set.

·     Elapsed TimeTotal elapsed time for all backups.

Lowest SCN of the Redo Record in the Log File

The System Change Numbers (SCNs) identify database changes by using numbers in ascending order. The greatest number indicates the latest database change.

The Lowest SCN of the redo record contained in the logfile area contains the following field:

·     Lowest SCN of the redo record contained in the logfile—Lowest SCN in the Redo log file at the last polling time.

Fast Recovery Area

The Fast Recovery Area area contains the following fields:

·     Fast Recovery Area PathFast recovery area path.

·     Space UsageUsage of the fast recovery area space. Click the History Record icon  to view the history graph of the space usage.

·     Fast Recovery Area UsedFast recovery area space that has been used. Click the History Record icon  to view the history graph of the fast recovery area used.

·     Fast Recovery Area SizeSize of the fast recovery area space.

Long Operation Statistics

The Long Operation Statistics area contains the following fields:

·     Operation NameName of the operation that took a long time.

·     Total WorkloadTotal workload of the operation.

·     UnitUnit for total workload.

·     Start TimeTime when the operation started.

SCN Statistics

The SCN Statistics area contains the following fields:

·     NameName of the object that uses a SCN.

·     SCN IDSCN ID for the object.

·     Health StatusHealth status of the object.

Long Transaction

The Long Transaction area contains the following fields:

·     Start Time—Time when the transaction execution was started.

·     Execution Duration—Duration that the transaction has been executed.

·     SQL—SQL statements executed by the transaction.

Control File

The Control File area contains the following fields:

·     NamePath and name of the control file.

·     Located in Flash Recovery AreaWhether the control file is in the flash recovery area.

·     Control File Chunk SizeSize of a single chunk used by the control file.

·     Control File Chunk CountNumber of chunks used by the control file.

·     Control File SizeSize of the control file, which equals the number of chunks multiplied by the size of a single chunk.

Redo Log File

The Redo Log File area contains the following fields:

·     Group NumberNumber of the Redo log file group.

·     StatusStatus of the Redo log file.

·     TypeType of the Redo log file group. Options are ONLINE and STANDBY.

·     Member NameName of the member log file.

·     Located in Flash Recovery AreaWhether the Redo log file is in the flash recovery area.

·     First TimeFirst Redo log time.

Database Lock

The Database Lock area contains the following fields:

·     Object Name—Name of the locked object.

·     Object Type—Type of the locked object.

·     Session ID—ID of the locked session.

·     Blocked Session—ID of the session that has been blocked due to the lock.

·     Lock Mode—Mode of the lock:

¡     2—Row-shared lock (Row-S, RS)

¡     3—Row-exclusive lock (Row-X: RX)

¡     4—Shared lock (Share, S)

¡     5—Shared row-exclusive lock (S/Row-X, SRX)

¡     6—Exclusive lock (Exclusive: X)

·     Serial ID—Sequence number of the session.

·     Event—Name of the lock event.

·     Process ID—ID of the locked process.

·     Process No.—Number of the locked process.

·     Process Name—Name of the locked process.

·     Oracle User—Locked Oracle user.

Object Statistics

The Object Statistics area contains the following fields:

·     Owner—Owner of the new object.

·     Object Name—Name of the object.

·     Object Type—Type of the object, which can be TABLE or INDEX.

·     Status—Status of the object, which can be VALID, INVALID, or N/A.

·     Creation Time—Time when the object was created.

·     Modification Time—Time when the object was last modified.

Invalid Object

The Invalid Object area contains the following fields:

·     Owner—Owner of the invalid object.

·     Object Name—Name of the object.

·     Object Type—Type of the object, which can be TABLE or INDEX.

·     Status—Status of the object, which can only be INVALID.

·     Creation Time—Time when the object was created.

·     Modification Time—Time when the object was last modified.

Index Unavailable

The Index Unavailable area contains the following fields:

·     Owner—Owner of the unavailable index.

·     Index Name—Name of the index.

·     Index Type—Type of the index, which can be NORMAL, BITMAP, FUNCTION-BASED NORMAL, or FUNCTION-BASED BITMAP.

·     Status—Status of the object, which can only be UNUSABLE.

·     Table Name—Name of the table for the index.

·     Deleted—Whether the index has been deleted and is in the recycle bin.

Log File Group

The Log File Group area contains the following fields:

·     Group ID—ID of the log file group.

·     Group Status—Status of the log file group.

·     Group Size—Size of the log file group.

·     Archived—Whether the log file group is archived.

·     Log File—Path and name of the log file.

Archived Logs

The Archived Logs area contains the following fields:

·     Alert Log PathPath for storing archived logs.

·     Archived Log Space UsageUsed archived log space in percentage in the last polling interval. Click the History Record icon  to view the history graph of the archived log space usage.

·     Archived Log Space UsedUsed archived log spaced in bytes in the last polling interval. Click the History Record icon  to view the history graph of the archived log space used.

·     Archived Log Space SizeSize of the archived log space.

Dispatch Busy

The Dispatch Busy area contains the following fields:

·     Dispatch Name—Name of the dispatcher process.

·     Dispatch Busy Rate—Busy rate of all dispatchers in the database.

Redo Request

The Redo Request area contains the following fields:

·     Wait Class—Class that redo requests belong to.

·     Event—Name of the event.

·     Average Wait—Average time that redo request waits for.

Details

The Details area contains the following fields:

·     Name—Tablespace name.

·     Allocated Bytes—Tablespace size.

·     Allocated Blocks—Number of data blocks in the tablespace.

·     Data Files—Number of data files in the tablespace.

State

The State area contains the following fields:

·     Name—Tablespace name.

·     State—Tablespace state when APM last polled the Oracle application, which can be ONLINE, OFFLINE, or INVALID.

·     Usage Ratio—Usage of the tablespace.

·     Free Bytes—Available space that can be used in the tablespace.

·     Free Blocks—Number of available data blocks in the tablespace.

·     Reads—Times of the tablespace reading data blocks from the disk.

·     Writes—Times of the tablespace writing data blocks to the disk.

·     Read Time—Tablespace reading time from Oracle application startup to the last polling.

·     Write Time—Tablespace writing time from Oracle application startup to the last polling.

·     FSFIFree Space Fragmentation Index value of the tablespace. The smaller the value, the more fragments to be cleared in the tablespace.

Performance Index

The Performance Index area contains the following fields:

·     Data File—Name and path of the Oracle application datafile.

·     Tablespace—Tablespace where the datafile is located. One datafile locates in only one tablespace.

·     State—Datafile state.

·     Size—Size of the datafile.

·     Reads—Times of reading data from the datafile.

·     Writes—Times of writing data to the datafile.

·     Average Read Time—Average time of reading data from the datafile.

·     Average Write Time—Average time of writing data to the datafile.

Auto Ext

The Auto Ext area contains the following fields:

·     Table Name—Name of the database table.

·     Auto Ext—Whether the database table can be automatically extended.

·     Increment Size—Size that the database table can be automatically extended.

High Used Table

The High Used Table area contains the following fields:

·     Space Name—Name of the highly used tablespace.

·     Free Rate—Free rate of the tablespace.

Session Statistics

The Session Statistics area contains the following fields:

·     Session Count—Number of sessions when APM last polled the Oracle application.

·     System SessionsNumber of sessions of the background type.

·     User SessionsNumber of sessions of the user type.

·     ACTIVE SessionsNumber of sessions in ACTIVE state.

·     INACTIVE SessionsNumber of sessions in INACTIVE state.

·     KILLED SessionsNumber of sessions in KILLED state.

·     CACHED SessionsNumber of sessions in CACHED state.

·     SNIPED SessionsNumber of sessions in SNIPED state.

Process Statistics

The Process Statistics area contains the following fields:

·     Process Count—Number of processes when APM last polled the Oracle application.

·     Background ProcessNumber of background processes.

Process

The Process area contains the following fields:

·     Process Name—Name of the background process.

·     Process ID—ID of the background process.

·     SPIDOperating system process identifier.

·     Serial NumberProcess serial number.

·     Used Memory—Size of the PGA used by the background process.

·     Assigned Memory—Size of the PGA assigned to the background process.

·     Freeable Memory—Size of the free PGA for the background process.

·     Maximum MemoryMaximum PGA memory ever allocated by the process.

·     Status—State of the background process.

·     OS UserOperating system process username.

·     TerminalOperating system terminal identifier.

·     ProgramProgram in progress.

·     BackgroundWhether the process is a background process.

Details

The Details area contains the following fields:

·     ID—Session ID.

·     State—Session state.

·     Computer—Name of the computer that established the session with the Oracle application.

·     Username—Username used to establish the session with the Oracle application.

·     Elapsed Time—Session duration.

·     CPU Usage Time—Length of time for which the session has used the CPU.

·     Memory Sorts—Number of times that the user performed memory sorting during the session.

·     Table Scans—Number of times that the user performed table scan operations during the session.

·     Physical Reads—Number of times that the user read from the disk during the session.

·     Logical Reads—Number of times that the user read from the memory during the session.

·     Submit—Number of times that the user executed commit operations during the session.

·     Cursor—Number of cursors that the user used in the session.

·     Buffer Hit Ratio—Percentage of number of logical reading times in the buffer pool to total number of logical reading times.

·     OS UserOperating system client username.

·     TerminalOperating system terminal name.

·     Time Of LogonTime of logon.

·     CommandCommand in progress. Specific command names can be queried by the select from * v$sqlcommand statement.

Waiting Sessions

The Waiting Sessions area contains the following fields:

·     ID—ID of the waiting session.

·     Username—Username used to establish the session with the Oracle application.

·     Events—Event that the session was waiting or the last event the session waited.

·     Events Occurred—Number of times that the session waited for an event.

·     State—State of the waiting session when APM last polled Oracle. The available status includes:

¡     WAITING—The session is waiting.

¡     WAITED UNKNOWN TIME—The time slot for the waiting session is unknown.

·     Type—Session type. BACKGROUND and USER indicate that sessions are generated by the background process and user process, respectively.

·     Wait Seconds—Length of time for which the session had waited.

Top 10 Wait Events

The Top 10 Wait Events area contains the following fields:

·     Event Name—Name of the wait event.

·     Wait Count—Number of times that the wait event occurred.

·     Wait Duration—Amount of the wait time.

·     Average Wait Duration—Amount of the average wait time.

·     Wait Duration Ratio—Percentage of the wait time to the DB time. In the case of multiple CPUs, the value for this field can be greater than 100%.

·     Wait Type—Type of the wait event.

Top10 SQL by Execution Duration

The Top10 SQL by Execution Duration area displays top 10 SQL statements by accumulated execution duration.

The Top10 SQL by Execution Duration area contains the following fields:

·     SQL—SQL statement.

·     Cumulative Execution Duration—Total duration used for parsing and executing the SQL statement.

·     Cumulative CPU Time—Duration that parsing and executing the SQL statement occupies the CPU.

·     Executions—Number of times that the SQL statement is executed.

·     Physical Reads—Number of times for physically reading the SQL statement.

·     Logical Reads—Number of times for logically reading the SQL statement.

Logical Reads Top10 SQL

The Logical Reads Top10 SQL area contains the following fields:

·     SQL—SQL statement.

·     Cumulative Execution Duration—Total duration used for parsing and executing the SQL statement.

·     Cumulative CPU Time—Duration that parsing and executing the SQL statement has occupied the CPU.

·     Executions—Number of times that the SQL statement is executed.

·     Physical Reads—Number of times for physically reading the SQL statement.

·     Logical Reads—Number of times for logically reading the SQL statement.

Physical Reads Top10 SQL

The Physical Reads Top10 SQL area contains the following fields:

·     SQL—SQL statement.

·     Cumulative Execution Duration—Total duration used for parsing and executing the SQL statement.

·     Cumulative CPU Time—Duration that parsing and executing the SQL statement has occupied the CPU.

·     Executions—Number of times that the SQL statement is executed.

·     Physical Reads—Number of times for physically reading the SQL statement.

·     Logical Reads—Number of times for logically reading the SQL statement.

Session Parameter

The Session Parameter area contains the following fields:

·     Name—Name of the parameter.

·     Value—Parameter value.

·     Is DefaultWhether the parameter is set to the default value.

·     Is Session ModifiableWhether the parameter can be changed with ALTER SESSION (TRUE) or not (FALSE).

·     Is System ModifiableWhether the parameter can be changed with ALTER SYSTEM.

¡     IMMEDIATEThe parameter can be changed with ALTER SYSTEM regardless of the type of parameter file used to start the instance. The change takes effect immediately.

¡     DEFERREDThe parameter can be changed with ALTER SYSTEM regardless of the type of parameter file used to start the instance. The change takes effect in subsequent sessions.

¡     FALSEThe parameter cannot be changed with ALTER SYSTEM unless a server parameter file was used to start the instance. The change takes effect in subsequent instances.

·     Is Instance Modifiable—For parameters that can be changed with ALTER SYSTEM, whether the value of the parameter can be different for every instance (TRUE) or whether the parameter must have the same value for all Real Application Clusters instances (FALSE).

·     Is Modified—Whether the parameter has been modified after instance startup.

¡     MODIFIEDThe parameter has been modified with ALTER SESSION.

¡     SYSTEM_MODThe parameter has been modified with ALTER SYSTEM.

¡     FALSEThe parameter has not been modified after instance startup.

·     Description—Description of the parameter.

System Parameter

The System Parameter area contains the following fields:

·     Name—Name of the parameter.

·     Value—Parameter value.

·     Is DefaultWhether the parameter is set to the default value.

·     Is Session ModifiableWhether the parameter can be changed with ALTER SESSION (TRUE) or not (FALSE).

·     Is System Modifiable—Whether the parameter can be changed with ALTER SYSTEM.

¡     IMMEDIATEThe parameter can be changed with ALTER SYSTEM regardless of the type of parameter file used to start the instance. The change takes effect immediately.

¡     DEFERREDThe parameter can be changed with ALTER SYSTEM regardless of the type of parameter file used to start the instance. The change takes effect in subsequent sessions.

¡     FALSEThe parameter cannot be changed with ALTER SYSTEM unless a server parameter file was used to start the instance. The change takes effect in subsequent instances.

·     Is Instance Modifiable—For parameters that can be changed with ALTER SYSTEM, whether the value of the parameter can be different for every instance (TRUE) or whether the parameter must have the same value for all Real Application Clusters instances (FALSE).

·     Is Modified—Whether the parameter has been modified after instance startup.

¡     MODIFIEDThe parameter has been modified with ALTER SESSION.

¡     SYSTEM_MODThe parameter has been modified with ALTER SYSTEM.

¡     FALSEThe parameter has not been modified after instance startup.

·     Description—Description of the parameter.

SPParameter

The SPParameter area contains the following fields:

·     Name—Name of the parameter.

·     Value—Parameter value.

·     Is Specified—Whether the parameter was specified in the server parameter file (TRUE) or not (FALSE).

DB2

DB2 is an IBM-developed DBMS. Database performance and stability affect service operations. APM supports monitoring DB2 applications for quick detection of DB2 problems.

Adding a DB2 application monitor

APM can locally or remotely monitor DB2 applications through JDBC. When you add DB2 application monitors, follow these guidelines:

·     If you use agents to locally monitor DB2 applications, first install agents on hosts where DB2 applications are deployed. For more information about installing agents, see "APM agent management."

·     If you remotely monitor DB2 applications through JDBC, obtain the username and password of the user who has the DB2 administrator's privileges and the database to which the DB2 administrator has access.

·     Add DB2 hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the DB2 application, make sure at least one probe is configured in APM. After a DB2 application monitor is added, APM sends the IP address and service port of the monitored DB2 application to the probes for traffic collection.

To add a DB2 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click DB2 of the Database Server Monitor class.

The page for adding a DB2 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the DB2 application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the DB2 application, 50000 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for DB2. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username of the DB2 administrator. The fields are available only when you select Disable from the Use Template list.

¡     Database Name—Enter the name of the database to which the DB2 administrator has access. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of DB2 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that DB2 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between DB2 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the DB2 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a DB2 application monitor

Authorized users can modify all parameters except the IP address and the APM server for a DB2 application monitor. When the IP address of a monitored DB2 host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a DB2 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the DB2 application monitor you want to modify.

The page for modifying the DB2 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a DB2 application monitor."

5.     Click OK.

Viewing the DB2 application monitor report

After a DB2 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the DB2 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a DB2 application monitor to display the report.

Figure 67 shows part of a DB2 application monitor report. The DB2 application monitor report contains the Summary and Top10 SQL tabs.

Figure 67 Part of a DB2 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the DB2 application.

·     IP Address—IP address of the DB2 host.

·     Application Type—Type of the monitored application, which is always DB2.

·     Instance Version—Version of the DB2 application.

·     Port—Service port of DB2, 50000 by default.

·     Database Status—State of the database.

·     Last Polling Time—Time when APM last polled the DB2 application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the DB2 host. This field is not displayed if no alarm was generated by the DB2 application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the DB2 application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the DB2 application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the DB2 application in the last 30 days.

·     Available Time—Total amount of time that the DB2 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the DB2 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the DB2 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the DB2 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Connection Statistics

The Connection Statistics area contains the following fields:

·     Local Connections—Number of local connections of the DB2 instance. Click the History Record icon icon_history_16x16.png to view the history graph of local connections.

·     Remote Connections—Number of remote connections of the DB2 instance.

·     Total Connections—Total number of local and remote connections of the DB2 instance. Click the History Record icon icon_history_16x16.png to view the history graph of total connections.

Response Time

The Response Time area contains the following field:

·     Response Time—Response time of the DB2 application. Response time indicates the period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Agent Statistics

The Agent Statistics area contains the following fields:

·     Active Agents—Number of active agents. The number of active agents is equal to the number of total agents minus the number of idle agents. Click the History Record icon icon_history_16x16.png to view the history graph of the active agent statistics.

·     Idle Agents—Number of unassigned agents to the applications. Click the History Record icon icon_history_16x16.png to view the history graph of the idle agent statistics.

·     Waiting Agents—Maximum number of agents that have waited for tokens since the time when DB2 application started to the time when APM last polled the DB2 application. Click the History Record icon icon_history_16x16.png to view the history graph of the waiting agent statistics.

·     Total Agents—Total number of registered agents in the DB2 instance manager. Click the History Record icon icon_history_16x16.png to view the history graph of the total agent statistics.

Database Performance

The Database Performance area contains the following fields:

·     Database Heap—Size of the database heap.

·     Sort List Heap—Size of the sort list heap.

·     Statistics Heap—Size of the statistics heap.

·     SQL Statement Heap—Size of the SQL statement heap.

·     Utilities Heap—Size of the utilities heap.

·     Package Cache—Size of the package cache.

·     Application Memory—Size of the application memory.

·     Buffer Pool—Size of the buffer pool.

·     Log Buffer—Size of the log buffer.

·     Catalog Cache—Size of the catalog cache.

Database Configuration

The Database Configuration area contains the following fields:

·     Default Application Heap—Size of the default application heap.

·     Default Tablespace Extentsize—Size of the default tablespace extent.

·     Database Code Set—Character set of the DB2 application.

·     Database Page Size—Size of the database page.

·     Database Memory Threshold—Size of the database memory threshold.

·     Database Code Page—Size of the database code page.

·     Logging modeLogging mode of the database.

·     Database Backups—Number of database backups to retain.

·     Lock Timeout—Time period before the lock times out. The value -1 indicates that the lock never times out.

·     Lock Waits—Number of lock waits.

·     Num of ESCALATION Lock—Number of escalation locks.

·     Sec Log Size—Size of secondary log.

Row Statistics

The Row Statistics area contains the following fields:

·     Database Name—Name of the database.

·     Rows Queried/Sec—Number of rows affected by the select operation per second.

·     Rows Deleted/Sec—Number of rows affected by the delete operation per second.

·     Rows Inserted/Sec—Number of rows affected by the insert operation per second.

·     Rows Updated/Sec—Number of rows affected by the update operation per second.

Cache Performance

The Cache Performance area contains the following fields:

·     Database Name—Name of the database.

·     Package Cache Hit RatioHow often the required request sections have been found in the package cache.

·     Catalog Cache Hit RatioHow often the required table descriptors have been found in the catalog cache.

·     PKG CACHE NUM OVERFLOWS—Number of overflowed package cache.

SQL Query Statistics

The SQL Query Statistics area contains the following fields:

·     Database Name—Name of the database.

·     Query Successes/SecTimes that the database successfully executed the Select statements per second in the last polling interval.

·     Query Failures/SecTimes that the database failed to execute Select statements per second in the last polling interval.

·     Total Work Units/SecTotal number of SQL statements (including Commit, Rollback, dynamic, and static SQL statements) that the database executed per second in the last polling interval.

Sort OverflowStatistics

The Sort OverflowStatistics area contains the following fields:

·     Database name—Name of the database.

·     Catalog Cache Overflow—Size of the DB2 application catalog cache overflows.

·     Sort Overflow—Size of the DB2 application sort overflows.

·     Avg Sort Time—Average time for sorting.

Application Traffic

APM collects DB2 traffic based on the IP address of the host and the traffic collection port used by the application. The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic that is sent and received by the DB2 application over the last 1 hour.

·     Today's Traffic—Total traffic that is sent and received by the DB2 application since 00:00 today.

Database Information

The Database Information area contains the following fields:

·     Database NameName of the database.

·     AliasAlias of the database.

·     PathComplete path for storing the database in the operating system.

·     StatusDatabase status.

·     Connection TimeMost recent time when the database finished processing a connection request.

·     Sort Overflow(%)How often the sort overflow occurred.

·     Deadlocks—Times of deadlocks that occurred.

·     Log Usage—Database log usage ratio.

Tablespace Details

The Tablespace Details area contains the following fields:

·     NameName of the tablespace.

·     Free BytesAvailable space in the tablespace.

·     Allocated BytesSpace that the database manager allocated for the tablespace.

·     Free Bytes (%)Ratio of the available space to the total space in the tablespace.

·     Automatic Expansion—Whether the tablespace is automatically expanded. The values are ON and OFF.

·     Type—Type of the tablespace.

·     State—State of the tablespace.

·     Size—Size of the tablespace.

·     Tablespace Usage—Percentage of tablespace to the total space.

Buffer Statistics

The Buffer Statistics area contains the following fields:

·     Database Name—Name of the database.

·     Direct ReadsNumber of the reading operations that did not use the buffer pool.

·     Direct WritesNumber of the writing operations that did not use the buffer pool.

·     Buffer Pool Hit Ratio—How often the required pages have been found in the buffer pool. Click the Set Threshold icon  to set alarm thresholds for the buffer pool hit ratio.

·     Index Page Hit Ratio—How often the required index pages have been found in the buffer pool. Click the Set Threshold icon  to set alarm thresholds for the index page hit ratio.

·     Data Page Hit Ratio—How often the required data pages have been found in the buffer pool. Click the Set Threshold icon  to set alarm thresholds for the data page hit ratio.

Buffer Activity Statistics

The Buffer Activity Statistics area contains the following fields:

·     Database name—Name of the database.

·     Buffer Pool Name—Name of the buffer pool.

·     Data Logical Reads—Number of data logical reads.

·     Data Physical Reads—Number of data physical reads.

·     Index Logical Reads—Number of index logical reads.

·     Index Physical Reads—Number of index physical reads.

·     Total Buffer Pool Logical Reads—Number of buffer pool logical reads.

·     Buffer Pool Asynchronous Reads—Number of buffer pool asynchronous reads.

·     Buffer Pool Asynchronous Writes—Number of buffer pool asynchronous writes.

·     Buffer Pool Synchronous Reads—Number of buffer pool synchronous reads.

·     Buffer Pool Synchronous Writes—Number of buffer pool synchronous writes.

·     Synchronous/Asynchronous Reads Ratio—Ratio of the synchronous reads to the asynchronous reads.

Lock Information

The Lock Information area contains the following fields:

·     Database Name—Name of the database.

·     Lock Name—Name of the lock.

·     Lock ModeMode of the lock.

¡     IN—Intent None (for dirty read).

¡     IS—Intention Share Lock.

¡     IX—Intention Exclusive Lock.

¡     NON—No Lock.

¡     NS—Share Lock (CS/RS).

¡     NX—Next-key Exclusive Lock.

¡     NW—Next-key Weak Exclusive Lock.

¡     S—Share Lock.

¡     SIX—Share with Intention Exclusive Lock.

¡     U—Update Lock.

¡     X—Exclusive Lock.

¡     Z—Super Exclusive Lock.

¡     W—Weak Exclusive Lock.

·     Status—Status of the lock.

¡     CONV—Converting state.

¡     GRNT—Granted state.

·     Object Type—Lock object type waited on.

¡     AUTORESIZE_LOCK—Autoresize lock type.

¡     AUTOSTORAGE_LOCK—Automatic storage lock type.

¡     BLOCK_LOCK—Block lock type.

¡     EOT_LOCK—End of table lock.

¡     INPLACE_REORG_LOCK—Inplace reorg lock.

¡     INTERNAL_LOCK—Internal lock type.

¡     INTERNALB_LOCK—Internal Online Backup lock.

¡     INTERNALC_LOCK—Internal Catalog Cache lock.

¡     INTERNALJ_LOCK—Buffer pool lock.

¡     INTERNALL_LOCK—Internal Long/Lob lock.

¡     INTERNALO_LOCK—Internal Object Table lock.

¡     INTERNALQ_LOCK—Internal DNS Sequence lock.

¡     INTERNALP_LOCK—Internal Plan lock.

¡     INTERNALS_LOCK—Internal Sequence lock.

¡     INTERNALT_LOCK—Internal Table Alter lock.

¡     INTERNALV_LOCK—Internal Variation lock.

¡     KEYVALUE_LOCK—Key value lock.

¡     ROW_LOCK—Table row lock type.

¡     SYSBOOT_LOCK—Internal lock on the sysboot table.

¡     TABLE_LOCK—Table lock type.

¡     TABLE_PART_LOCK—Table partition lock type.

¡     TABLESPACE_LOCK—Tablespace lock type.

¡     XML_PATH_LOCK—XML Path lock type.

·     Table Space—Table space name.

·     Table—Table name.

·     Data Partition—Data partition identifier.

·     Lock Count—Lock count.

·     Lock Hold Count—Lock hold count.

Session

The Session area contains the following fields:

·     Database Name—Name of the database.

·     Application—Application name.

·     Status—Application status.

·     Number of associated agents—Number of used agents.

·     Status Change Time—Application status change time.

SQL Rollback

The SQL Rollback area contains the following fields:

·     DB Name—Name of database.

·     ROLLBACK SQL STMTS—Count of SQL statements that are rolled back.

·     COMMIT SQL STMTS—Count of SQL statements that are committed.

·     INT DEADLOCK ROLLBACKS—Count of SQL statements that are caused by internal deadlock.

Cache Index Hit

The Cache Index Hit area contains the following fields:

·     DB Name—Name of database.

·     BP Name—Name of buffer pool.

·     Total Hit Percent—Percentage of buffer pool index hit.

I/O Time

The I/O Time area contains the following fields:

·     DB Name—Name of database.

·     BP Name—Name of buffer pool.

·     POOL ASYNC READ TIMETotal time of buffer pool asynchronous reads.

·     DIRECT WRITE TIMETotal time of directly writes to the database.

SQL Statistics

The SQL Statistics area contains the following fields:

·     DB Name—Name of database.

·     DDL SQL STMTS—Count of DDL SQL statements.

·     STATIC SQL STMTS—Count of static SQL statements.

·     DYNAMIC SQL STMTS—Count of dynamic SQL statements.

·     UID SQL STMTS—Count of UID SQL statements.

·     SELECT SQL STMTS—Count of SELECT SQL statements.

·     SELECT RATIO PERENCT—Percentage of select SQL statements.

·     UID RATIO PERENCT—Percentage of UID SQL statements.

Top 10 SQL By Execution Time

The Top 10 SQL By Execution Time area contains the following fields:

·     SQL—SQL statement.

·     Executions—Times for which the SQL statement has been executed.

·     Execution Time—Time taken to parse and execute the SQL statement.

Top 10 SQL By Run Time

The Top 10 SQL By Run Time area contains the following fields:

·     SQL—SQL statement text.

·     Run Time—Elapsed time of the statement.

·     Application—Application name.

·     Application StatusApplication status.

¡     BACKUP—Performing a backup.

¡     COMMIT_ACT—Commit actively.

¡     COMP—Compiling a SQL statement.

¡     CONNECTED—Connection completed.

¡     CONNECTPEND—Connection pending.

¡     CREATE_DB—Creating a database.

¡     DECOUPLED—Application has been decoupled from coordinate.

¡     DISCONNECTPEND—Disconnection pending.

¡     INTR—Request interrupted.

¡     IOERROR_WAIT—Wait to disable tablespace.

¡     LOAD—Performing a fast load.

¡     LOCKWAIT—Lock wait.

¡     QUIESCE_TABLESPACE—Quiescing a tablespace.

¡     RECOMP—Recompiling a plan.

¡     REMOTE_RQST—Pending results from remote request.

¡     RESTART—Restarting a database.

¡     RESTORE—Restoring a database.

¡     ROLLBACK_ACT—Rollback activity.

¡     ROLLBACK_TO_SAVEPOINT—Rollback to savepoint.

¡     TEND—Transaction ended.

¡     THABRT—Heuristically rolled back.

¡     THCOMT—Heuristically committed.

¡     TPREP—Prepared transaction.

¡     UNLOAD—Performing a fast unload.

¡     UOWEXEC—UOW executing.

¡     UOWWAIT—UOW waiting.

¡     WAITFOR_REMOTE—Waiting for remote node.

·     Author—Author that executes the SQL statement.

Top 10 SQL By Execution Frequency

The Top 10 SQL By Execution Frequency area contains the following fields:

·     SQL—SQL statement text.

·     Average Execution Time—Average execution time.

·     ExecutionsTotal times of statement executions.

Top 10 SQL By Sort Frequency

The Top 10 SQL By Sort Frequency area contains the following fields:

·     SQL—SQL statement text.

·     ExecutionsTotal times of statement executions.

·     Sort NumberTotal times of statement sorts.

·     Sort Number Per Execution—Number of sorts per statement execution.

Caché

Caché is a post relational database developed by Intersystems. Database performance and stability affect service operations. APM supports monitoring Caché.

Adding a Caché application monitor

APM can locally or remotely monitor Caché applications through JDBC. When you add Caché application monitors, follow these guidelines:

·     If you use agents to locally monitor Caché applications, first install agents on hosts where Caché applications are deployed. For more information about installing agents, see "APM agent management."

·     If you remotely monitor Caché applications through JDBC, obtain the username and password of the user who has the Caché database administrator's privileges.

·     Add Caché hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Caché application, make sure at least one probe is configured in APM. After a Caché application monitor is added, APM sends the IP address and service port of the monitored Caché application to the probes for traffic collection.

To add a Caché application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Caché of the Database Server Monitor class.

The page for adding a Caché application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Caché application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Caché application, 1972 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for the Caché application. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username of the Caché administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Caché applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Caché depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Caché and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Caché application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Caché application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Caché application monitor. When the IP address of a monitored Caché host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Caché application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Caché application monitor you want to modify.

The page for modifying the Caché application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Caché application monitor."

5.     Click OK.

Viewing the Caché application monitor report

After a Caché application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Caché application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Caché application monitor to display the report.

Figure 68 shows part of a Caché application monitor report.

Figure 68 Part of a Caché application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the Caché application monitor.

·     Health Status—Health status of the Caché application.

·     IP Address—IP address of the host where the Caché application resides.

·     Application Type—Type of the monitored application, which is always Caché.

·     Port—Port used by the Caché application, 1972 by default.

·     Version—Version number of the Caché application.

·     Last Polling Time—Time when APM last polled the Caché application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view dependencies between the Caché application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Caché host. This field is not displayed if no alarm was generated by the Caché application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Caché application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Caché application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Caché application in the last 30 days.

·     Available Time—Total amount of time that the Caché application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Caché application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Caché application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Caché application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Database Information

The Database Information area contains the following fields:

·     Database Name—Name of the database.

·     Modified at—Time when the database was most recently modified.

·     Database File Name—Name and path of the database file.

·     Database SizeSize of the database.

Response Time

The Response Time area contains the following field:

·     Response Time—Period from the time when APM sends a request to the time when it receives a response for the request. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

User Information

The User Information area contains the following fields:

·     User Name— Name of the user.

·     Full Name—Complete name of the user group to which the user belongs.

·     Super User—Whether the user is a super user.

·     Expired— Whether the database user has expired.

·     Expiration Date— Date when the user expired.

Process Information

The Process Information area contains the following fields:

·     Process ID—ID of the process.

·     Process Name—Name of the process.

·     Client Program—Client program that is used to connect to the Caché database.

·     Process Status—Running status of the process.

·     Client IP Address—IP address of the client.

·     Client Name—Name of the client.

·     Global References—Number of global references.

·     Last Global Reference—Object that was globally used for the most recent time.

·     Used Memory—Memory used by the process.

·     Peak Memory—Maximum memory used by the process.

Informix

Informix is an IBM-developed DBMS.

Configuring an Informix server

Before using APM to manage Informix on a Linux server, edit the configuration file on the server:

1.     Open file /home/informix/etc/sqlhosts in a text editor.

2.     Add an asterisk (*) in front of each host alias. For example, cs_dbs onsoctcp *linux sqlexe.

3.     Save and close the file.

Adding an Informix application monitor

APM monitors Informix applications through JDBC. When you add Informix application monitors, follow these guidelines:

·     Obtain the username and password of a user who has the Informix administrator's privileges and the names of the database and database service to which the Informix administrator has access.

·     Add Informix hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Informix application, make sure at least one probe is configured in APM. After an Informix application monitor is added, APM sends the IP address and service port of the monitored Informix application to the probes for traffic collection.

To add an Informix application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Informix of the Database Server Monitor class.

The page for adding an Informix application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the Informix server to be monitored. APM automatically checks the IP address and associates the application monitor with the Informix server if it is already managed in the IMC platform. To monitor an Informix server that is already managed in the IMC platform, you can also click Select, and then select the Informix server in the Select Devices window. For information about selecting an Informix server, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the listening port for the Informix application. The default setting is TCP 9088. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the port used by the Informix application to provide services. The default setting is TCP 9088. The parameter is displayed only after a traffic probe is configured in APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username of the Informix administrator. The fields are available only when you select Disable from the Use Template list.

¡     Database Name—Enter a database name for connecting to the Informix application. This field is available only when you select Disable from the Use Template list.

¡     Database Service Name—Enter a database service name for connecting to the Informix application. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Informix applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Informix depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Informix and operating system applications by IP address and displays their dependencies in the dependency topology.

¡     Application GroupSpecify an application group for the Informix application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Informix application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Informix server. When the IP address of a monitored Informix server changes, authorized users must add a new application monitor for the Informix server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Informix application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Informix application monitor you want to modify.

The page for modifying the Informix application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Informix application monitor."

5.     Click OK.

Viewing the Informix application monitor report

After an Informix application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Informix application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Informix application monitor to display the report.

Figure 69 shows part of an Informix application monitor report.

Figure 69 Part of an Informix application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Informix application.

·     IP Address—IP address of the Informix host.

·     Application Type—Type of the monitored application, which is always Informix.

·     Running Duration—Informix application running duration from the time when the application started to the time when APM last polled the application.

·     Port—Service port of Informix, 9088 by default.

·     Last Polling Time—Time when APM last polled the Informix application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Informix host. This field is not displayed if no alarm was generated by the Informix application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Informix application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Informix application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Informix application in the last 30 days.

·     Available Time—Total amount of time that the Informix application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Informix application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Informix application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Informix application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Sort Statistics

The Sort Statistics area contains the following fields:

·     Total SortsTotal number of sorts that the Informix application performed. Click the History Record icon icon_history_16x16.png to view the history graph of total sorts.

·     Memory sortsNumber of sorts that the Informix application performed in memory. Click the History Record icon icon_history_16x16.png to view the history graph of memory sorts.

·     Disk ConnectionsNumber of sorts that the Informix application performed in disks. Click the History Record icon icon_history_16x16.png to view the history graph of disk sorts.

·     Max. Sort SpaceMaximum space that the Informix application used to perform sorts. Click the History Record icon icon_history_16x16.png to view the history graph of the maximum sort space.

Lock Statistics

The field in the Lock Statistics area is as follows:

·     Lock RequestsNumber of lock requests for the Informix application. Click the History Record icon icon_history_16x16.png to view the history graph of lock requests.

·     Lock WaitsNumber of lock waits for the Informix application. Click the History Record icon icon_history_16x16.png to view the history graph of lock waits.

·     DeadlocksNumber of deadlocks for the Informix application. Click the History Record icon icon_history_16x16.png to view the history graph of deadlocks.

·     Deadlock Timeout CountNumber of deadlock timeouts for the Informix application. Click the History Record icon icon_history_16x16.png to view the history graph of the deadlock timeout count.

Buffer Statistics

The Agent Statistics area contains the following fields:

·     Buffer Read Hit Ratio—Buffer read hit ratio of the Informix application.

¡     Click the Set Threshold icon  to set alarm thresholds for the buffer read hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the buffer read hit ratio.

·     Buffer Write Hit Ratio—Buffer write hit ratio of the Informix application.

¡     Click the Set Threshold icon  to set alarm thresholds for the buffer write hit ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the buffer write hit ratio.

Disk I/O Statistics

The Disk I/O Statistics area contains the following fields:

·     Pages Read from DiskMemory pages that the Informix application read from the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the pages read from the disk.

·     Pages Written to DiskMemory pages that the Informix application wrote to the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the pages written to the disk.

System Information

The System Information area contains the following fields:

·     Start TimeTime when the Informix application started.

·     Running DurationInformix application running duration from the time when the application started to the time when APM last polled the application.

·     Max. ChunksMaximum number of chunks that the Informix application supports.

·     Max. DbspacesMaximum number of dbspaces that the Informix application supports.

·     Max. User ThreadsMaximum number of user threads that the Informix application supports.

·     Max. TransactionsMaximum number of transactions that the Informix application supports.

·     Max. LocksMaximum number of locks that the Informix application supports.

·     LRU Queue Length Maximum number of objects that the LRU queue in the Informix application can contain.

·     Long Transaction FlagNumber of long transactions in the Informix application.

Session Connection Information

The Session Connection Information area contains the following fields:

·     Host Name—Name of the host that connects to the Informix application.

·     User Process IDID of the process to which the session corresponds.

·     User NameUsername that is used to connect to the Informix database.

·     Database NameName of the database to which the user connects.

·     Last Running TimeLast operation time of the session.

·     Idle TimeIdle time of the session.

·     Connection TimeTime when the session was established.

Session Wait Information

The Session Wait Information area contains the following fields:

·     Lock WaitsWhether the session waited for lock release. The value can be 0 or 1. The value of 0 indicates that the application did not wait for lock release. The value of 1 indicates that the application waited for lock release.

·     Cache WaitsWhether the session waited for cache release. The value can be 0 or 1. The value of 0 indicates that the application did not wait for cache release. The value of 0 indicates that the application waited for cache release.

·     Check Point WaitsWhether the session waited for check point processing to be completed. The value can be 0 or 1. The value of 0 indicates that the application did not wait for check point processing to be completed. The value of 1 indicates that the application waited for check point processing to be completed.

·     Latch WaitsWhether the session waited for latch release. The value can be 0 or 1. The value of 0 indicates that the application did not wait for latch release. The value of 1 indicates that the application waited for latch release.

·     Transaction Critical SectionWhether the session waited for the transaction critical section. The value can be 0 or 1. The value of 0 indicates that the application did not wait for the transaction critical section. The value of 1 indicates that the application waited for the transaction critical section.

Chunk Information

Chunks are physical storage entities. Each dbspace contains one or more chunks. The Informix application accesses data through dbspaces. The Chunk Information area contains the following fields:

·     NameName of the storage space.

·     StatusStatus of the storage space.

·     TypeType of the storage space.

·     Space SizeSize of the storage space.

·     Free Space SizeFree size of the storage space.

·     In Use (%)Usage of storage space.

MemCached

MemCached is a distributed memory object caching system. It is widely used for speeding up Web access. APM supports MemCached monitoring.

Adding a MemCached application monitor

APM monitors MemCached applications through sockets or agents.

To monitor MemCached applications through agents, first install agents on hosts where MemCached applications are deployed. For more information about installing agents, see "APM agent management."

To add a MemCached application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click MemCached of the Database Server Monitor class.

The page for adding a MemCached application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the MemCached application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if the host is already managed in the IMC platform. If the host is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Selecting devices."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the MemCached application. The default setting is 11211. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of MemCached applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that MemCached depends on, and then click OK.

Operating system applications cannot be selected. APM automatically adds the dependencies between MemCached and operating system applications by IP address and displays their dependencies in the application topology.

Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the MemCached application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify the connectivity to the application by using the previous parameter settings. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a MemCached application monitor

Authorized users can modify all parameters except the IP address and the APM server for a MemCached application monitor. When the IP address of a monitored MemCached host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a MemCached application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the MemCached application monitor you want to modify.

The page for modifying the MemCached application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a MemCached application monitor."

5.     Click OK.

Viewing the MemCached application monitor report

After a MemCached application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the MemCached application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a MemCached application monitor to display the report.

Figure 70 shows part of a MemCached application monitor report.

Figure 70 Part of a MemCached application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the application.

·     IP AddressHost IP address of the MemCached application.

·     PortListening port of the MemCached application.

·     Application DescriptionDescription of the MemCached application.

·     Application Type—Type of the monitored application, which is MemCached.

·     Last Polling TimeTime when APM last polled the MemCached application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between MemCached and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the MemCached application. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the MemCached application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the MemCached application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the MemCached application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the MemCached application in the last 30 days.

·     Available Time—Total amount of time that the MemCached application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the MemCached application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the MemCached application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the MemCached application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Utilization

The CPU Utilization area contains the following fields:

·     User CPUTotal amount of user CPU time for a process.

·     System CPUTotal amount of system CPU time for a process.

Memory Utilization

The Memory Utilization area contains the following fields:

·     Used MemoryUsed memory of MemCached.

·     Free MemoryFree memory of MemCached.

·     Total MemoryTotal memory of MemCached.

·     Memory Used RatioUsed memory ratio of MemCached.

·     Memory Free RatioFree memory ratio of MemCached.

·     Memory Hit RatioMemory hit ratio of MemCached.

Cached Hits and Misses

The Cached Hits and Misses area contains the following fields:

·     Hits/minNumber of cache hits that occur in a minute.

·     Misses/minNumber of cache misses that occur in a minute.

Cached Items

The Cached Items area contains the following fields:

·     Items cachedNumber of cached items.

·     EvictionsNumber of items removed from cache.

GET and SET Requests

The GET and SET Requests area contains the following fields:

·     Gets/minNumber of retrieval requests per minute.

·     Sets/minNumber of storage requests per minute.

Network Traffic

The Network Traffic area contains the following fields:

·     Bytes ReceivedNumber of bytes that MemCached received from the network in a minute.

·     Bytes SentNumber of bytes that MemCached sent to the network in a minute.

Connections

The Connections area contains the following fields:

·     ConnectionsNumber of current MemCached connections.

·     ThreadsNumber of current MemCached threads.

·     Response TimeTime taken by APM to execute the STATS command on the MemCached server.

Transaction

The Transaction area contains the following fields:

·     SET-TimeTime used to set data to MemCached.

·     GET-TimeTime used to obtain data from MemCached.

·     DELETE-TimeTime used to delete data from MemCached.

·     Total Transaction TimeTotal time used by all operations performed on MemCached.

MongoDB

MongoDB is an open source DBMS based on the distributed file storage system. Database performance and stability affect service operations. APM supports monitoring MongoDB applications.

Adding a MongoDB application monitor

APM monitors MongoDB applications through agents or JDBC. When you add MongoDB application monitors, follow these guidelines:

·     To monitor a MongoDB application through an agent, first install agents on hosts where MongoDB applications are deployed. For more information about installing agents, see "APM agent management."

·     MongoDB supports both password and passwordless authentication. To monitor a MongoDB application through JDBC, obtain the username and password if a username and password is configured for the MongoDB database.

·     Add MongoDB hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the MongoDB application, make sure at least one probe is configured in APM. After a MongoDB application monitor is added, APM sends the IP address and service port of the monitored MongoDB application to the probes for traffic collection.

To add a MongoDB application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click MongoDB of the Database Server Monitor class.

The page for adding a MongoDB application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the MongoDB application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the MongoDB application. The default setting is 27017. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for MongoDB. This field is displayed only after you configure at least one probe for APM and select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the MongoDB administrator. The fields are available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the MongoDB administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of MongoDB applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that MongoDB depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between MongoDB and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the MongoDB application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a MongoDB application monitor

Authorized users can modify all parameters except the IP address and the APM server for a MongoDB application monitor. When the IP address of a monitored MongoDB host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a MongoDB application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the MongoDB application monitor you want to modify.

The page for modifying the MongoDB application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a MongoDB application monitor."

5.     Click OK.

Viewing the MongoDB application monitor report

After a MongoDB application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the MongoDB application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a MongoDB application monitor to display the report.

Figure 71 shows part of a MongoDB application monitor report.

Figure 71 Part of a MongoDB application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the application monitor.

·     Health Status—Health status of the MongoDB application.

·     IP Address—IP address of the MongoDB host.

·     Application Type—Type of the monitored application, which is always MongoDB.

·     Port—Service port of the MongoDB application.

·     Host—Name of the host where the MongoDB application is deployed.

·     Database Version—Database version number of the MongoDB application.

·     Last Polling Time—Time when APM last polled the MongoDB application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the MongoDB host. This field is not displayed if no alarm was generated by the MongoDB application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the MongoDB application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the MongoDB application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the MongoDB application in the last 30 days.

·     Available Time—Total amount of time that the MongoDB application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the MongoDB application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the MongoDB application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the MongoDB application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Connections

The Connections area contains the following fields:

·     CurrentNumber of connections to the database.

¡     Click the Set Threshold icon  to set alarm thresholds for the current connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the current connections.

·     AvailableNumber of available connections of the database.

·     Total CreatedNumber of created connections, including connections that have been closed.

Network

The Network area contains the following fields:

·     Read InAmount of network traffic received by the database.

·     Read In Per SecondAmount of network traffic received by the database per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the traffic received per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the traffic received per second.

·     Write OutAmount of network traffic sent by the database.

·     Write Out Per SecondAmount of network traffic sent by the database per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the traffic sent per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the traffic sent per second.

·     RequestsTotal number of requests received by the database.

·     Requests Per SecondNumber of requests received by the database per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the requests received per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the requests received per second.

Memory

The Memory area contains the following fields:

·     BitsNumber of bits of the memory.

·     ResidentAmount of memory that is currently used by the database process. Click the History Record icon icon_history_16x16.png to view the history graph of the resident memory.

·     VirtualAmount of virtual memory that is currently used by the database process. Click the History Record icon icon_history_16x16.png to view the history graph of the virtual memory.

·     MappedAmount of mapped memory by the database. Click the History Record icon icon_history_16x16.png to view the history graph of the mapped memory.

·     RAM SizeSize of the physical memory of the database.

Build Information

The Build Information area contains the following fields:

·     Build VersionVersion of the MongoDB database.

·     Git VersionGit version of the MongoDB database.

·     Target OSMinimum target operating system version supported by the MongoDB database. This field is applicable only in the Windows environment.

·     OpenSSL VersionOpenSSL version that the MongoDB database is built with.

·     JavaScript EngineJavaScript engine used by the MongoDB database.

·     Build BitsNumber of build bits of the MongoDB database.

·     Max Object SizeMaximum size of the BSON document object.

Server Information

The Server Information area contains the following fields:

·     HostName of the host where the MongoDB database system is deployed.

·     Database VersionVersion of the MongoDB database.

·     Process NameProcess name of the MongoDB database service.

·     Process IDProcess ID of the MongoDB database service.

·     UptimeRunning time of the MongoDB database service.

·     Local TimeCurrent time of the host where the MongoDB database is deployed.

·     Storage EngineStorage engine used by the MongoDB database. This field is applicable in MongoDB versions later than MongoDB 3.0.

Asserts

The Asserts area contains the following fields:

·     RegularNumber of regular assertions that occurred since the MongoDB database service process was started.

·     WarningNumber of warning assertions that occurred since the MongoDB database service process was started.

·     MessageNumber of message assertions that occurred since the MongoDB database service process was started.

·     UserNumber of user assertions that occurred since the MongoDB database service process was started.

·     RolloversNumber of times the assertion counter rolls over. The assertion counter is reset to 0 when the number of assertions reaches 230.

Operation Counter

The Operation Counter area contains the following fields:

·     InsertTotal number of insert operations since the MongoDB database service was started.

·     QueryTotal number of query operations since the MongoDB database service was started.

·     UpdateTotal number of update operations since the MongoDB database service was started.

·     DeleteTotal number of delete operations since the MongoDB database service was started.

·     GetmoreTotal number of Getmore operations since the MongoDB database service was started.

·     CommandTotal number of command operations since the MongoDB database service was started.

Back Flushing

This area displays data only when the MongoDB database uses the MMAPv1 storage engine.

The Back Flushing area contains the following fields:

·     FlushesNumber of times the MongoDB database flushes data and writes the flushes to the disk since the MongoDB database service was started.

·     Total Time CostTotal amount of time used by the flush operations.

·     Average Time CostAverage amount of time used by the flush operations. Click the History Record icon icon_history_16x16.png to view the history graph of the average time cost.

·     Last Time CostAmount of time used by the last flush operation. Click the History Record icon icon_history_16x16.png to view the history graph of the last time cost.

·     Last Finished AtTime when the last flush operation finished.

Database

The Database area contains the following fields:

·     NameName of the MongoDB database.

·     SizeSize of the MongoDB database.

·     Is EmptyWhether the MongoDB database is empty.

Current Queue

The Current Queue area contains the following fields:

·     TotalTotal number of operations waiting for the lock in the current queue.

·     ReadersTotal number of operations waiting for the read lock in the current queue. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of read operations.

·     WritersTotal number of operations waiting for the write lock in the current queue. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of write operations.

Active Client

The Active Client area contains the following fields:

·     TotalTotal number of active clients connected to the MongoDB database.

·     ReadersTotal number of active clients that connect to the MongoDB database and perform read operations. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of read operations.

·     WritersTotal number of active clients that connect to the MongoDB database and perform read operations. Click the History Record icon icon_history_16x16.png to view the history graph of the total number of write operations.

Database Details

The Database Details area contains the following fields:

·     DatabaseName of the MongoDB database.

·     CollectionsTotal number of collections in the MongoDB database.

·     ObjectsTotal number of document objects in the MongoDB database.

·     Average Object SizeAverage size of document objects in the MongoDB database.

·     Data SizeTotal size of the data in the MongoDB database, including the padding data.

·     Storage SizeSize of the storage space allocated for storing document objects in the MongoDB database.

·     Indexes—Total number of indexes in the MongoDB database.

·     Index SizeTotal size of indexes in the MongoDB database

·     File SizeTotal size of the data files in the MongoDB database, including the pre-allocated space and padding data. This field is applicable only when the MMAPv1 storage engine is used.

·     Namespace SizeTotal size of the namespace files in the MongoDB database. This field is applicable only when the MongoDB database uses the MMAPv1 storage engine.

DM

DM is a high performance DBMS developed by Dameng. Database performance and stability affect service operations. APM supports monitoring DM V7.0.

Adding a DM application monitor

APM can monitor DM applications through agents or JDBC. When you add DM application monitors, follow these guidelines:

·     If you use agents to locally monitor DM applications, first install agents on hosts where DM applications are deployed. For more information about installing agents, see "APM agent management."

·     If you remotely monitor DM applications through JDBC, obtain the username and password of the user who has the DM database administrator's privileges.

·     Add DM hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the DM application, make sure at least one probe is configured in APM. After a DM application monitor is added, APM sends the IP address and service port of the monitored DM application to the probes for traffic collection.

To add a DM application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click DM of the Database Server Monitor class.

The page for adding a DM application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the DM application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the DM application, TCP-1433 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for DM. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username of the DM administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of DM applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that DM depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between DM and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the DM application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a DM application monitor

Authorized users can modify all parameters except the IP address and the APM server for a DM application monitor. When the IP address of a monitored DM host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a DM application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the DM application monitor you want to modify.

The page for modifying the DM application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a DM application monitor."

5.     Click OK.

Viewing the DM application monitor report

After a DM application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the DM application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a DM application monitor to display the report.

Figure 72 shows part of a DM application monitor report.

Figure 72 Part of a DM application monitor report

 

The DM application monitor report contains the Summary, Tablespace, and Top10 SQL tabs. Click each tab to view corresponding information about the DM application.

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the DM application monitor.

·     Health Status—Health status of the DM application.

·     IP Address—IP address of the DM host.

·     Application Type—Type of the monitored application, which is always DM.

·     Port—Monitor port used by the DM application.

·     Last Polling Time—Time when APM last polled the DM application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the DM host. This field is not displayed if no alarm was generated by the DM application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the DM application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the DM application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the DM application in the last 30 days.

·     Available Time—Total amount of time that the DM application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the DM application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the DM application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the DM application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Database Information

The Database Information area contains the following fields:

·     Database Name—Name of the database.

·     Created at—Time when the database was created.

·     Archiving Mode—Whether the database is archived. By default, the database is not archived.

·     Database Status—Current status of the database. The database can be in any of the following states:

¡     Starting—The database is being started.

¡     Started, Redo done—The database is started and the redo is complete.

¡     Mount—The database is being mounted.

¡     Opened—The database is open.

¡     Suspended—The database is suspended.

¡     Closed—The database is closed.

·     Role—Role of the database. Options are:

¡     Common—The database does not operate in cluster mode.

¡     Host—The database acts as an active database in the RAC cluster system.

¡     Standby—The database acts as a standby database in the RAC cluster system.

·     Database Size—Total size of the database.

·     RAC Nodes—Total number of instances in the RAC cluster system.

·     Character Set—Character set of the database. The default is GB18030.

Instance Information

The Instance Information area contains the following fields:

·     Instance Name—Name of the database instance.

·     Host Name—Name of the host on which the database is installed.

·     Database Server Version—Version of the database server.

·     Database Version—Version of the database software.

·     Start TimeTime when the database instance was started.

·     Instance Status—Current status of the instance. Options are Mount, Open, and Suspend.

·     Instance Mode—Mode of the instance. Options are Normal, Primary, and Standby.

·     Cluster No.—Sequence number of the RAC cluster system.

·     Cluster Role—Role of the RAC cluster system. Options are Master and Slave.

Response Time

The Response Time area contains the following field:

·     Response Time—Period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Thread Statistics

The Thread Statistics area contains the following field:

·     Current Threads—Total number of current active threads for the DM application. Click the History Record icon icon_history_16x16.png to view the history graph of the current threads.

Connection Statistics

The Connection Statistics area contains the following fields:

·     Current Connections—Number of current connections for the DM application.

¡     Click the Set Threshold icon  to set alarm thresholds for the current connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the current connections.

·     Max. Connections—Maximum number of connections for the DM application.

Dictionary Cache

The Dictionary Cache area contains the following fields:

·     Total Size—Total size of the dictionary cache.

·     Used Space—Size of the space used by the dictionary. Click the History Record icon icon_history_16x16.png to view the history graph of the used space.

·     Total Dictionary Objects—Total number of dictionary objects.

·     Dictionary Cache Usage—Percentage of the used dictionary space.

¡     Click the Set Threshold icon  to set alarm thresholds for the usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the usage.

Log Buffer

The Log Buffer area contains the following fields:

·     Total Pages—Total number of pages for the log buffer.

·     Used Pages—Number of pages used by the log. Click the History Record icon icon_history_16x16.png to view the history graph of the used pages.

·     Log Buffer Usage—Percentage of log pages used.

¡     Click the Set Threshold icon  to set alarm thresholds for the usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the usage.

Log Information

The Log Information area contains the following fields:

·     Total Size—Total size of the log.

·     Free Space—Size of the available space for the log. Click the History Record icon icon_history_16x16.png to view the history graph of the free space.

·     Used Space—Size of the used space for the log. Click the History Record icon icon_history_16x16.png to view the history graph of the used space.

·     Log Usage—Percentage of the used space to the total log size. Click the History Record icon icon_history_16x16.png to view the history graph of the usage.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the DM application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the DM application since 00:00 today.

Buffer Pool Information

The Buffer Pool Information area contains the following fields:

·     Buffer Pool Name—Name of the buffer pool. Options are Normal, Keep, Recycle, and Fast.

·     Page Size—Size of each page in the buffer pool, excluding pages in the extension pool.

·     Pages—Number of pages in the buffer pool. Click the History Record icon icon_history_16x16.png to view the history graph of the pages.

·     Pages in Use—Number of data page references. Click the History Record icon icon_history_16x16.png to view the history graph of the pages being used.

·     Idle Pages—Number of idle pages in the buffer pool. Click the History Record icon icon_history_16x16.png to view the history graph of the idle pages.

·     Dirty Pages—Number of dirty pages in the buffer pool. Click the History Record icon icon_history_16x16.png to view the history graph of the dirty pages.

·     Non-Idle Pages—Number of non-idle pages in the buffer pool. Click the History Record icon icon_history_16x16.png to view the history graph of the non-idle pages.

·     Discarded Pages—Number of discarded pages in the buffer pool. Click the History Record icon icon_history_16x16.png to view the history graph of the discarded pages.

·     Max. Pages—Maximum number of pages in the buffer pool. Click the History Record icon icon_history_16x16.png to view the history graph of the maximum pages.

·     Read Hits—Number of read hits. Click the History Record icon icon_history_16x16.png to view the history graph of the read hits.

·     Read Misses—Number of read misses. Click the History Record icon icon_history_16x16.png to view the history graph of the read misses.

·     Batch Reads—Number of batch read misses. Click the History Record icon icon_history_16x16.png to view the history graph of the batch reads.

·     Buffer Pool Hit Ratio—Read hit ratio. Click the History Record icon icon_history_16x16.png to view the history graph of the hit ratio.

User Information

The User Information area contains the following fields:

·     ID—ID of the DM user.

·     Username—Username of the DM user.

·     Account Status—Status of the DM user account.

·     Default Tablespace—Default tablespace for the DM user.

·     Temp Tablespace—Temporary tablespace for the DM user.

·     Profile—Profile for the DM user.

·     Created at—Time when the DM user was created.

·     Expired at—Time when the DM user expired.

·     Expiration Duration (Days)—Remaining days before the DM user expires.

·     DBA User—Whether the DM user is a DBA user.

Database Link Information

The Database Link Information area contains the following fields:

·     ID—ID of the database link.

·     Name—Name of the database link.

·     Public—Whether the database link is public.

·     Login Name—Login name of the database link.

·     Host Name—Host name of the database link.

·     Port Number—Port number of the database link.

·     Linked—Whether the database link is up.

·     Sync Link—Type of the database link. The option Yes indicates a synchronous database link and the option No indicates an asynchronous database link.

·     Protocol—Protocol used by the database link.

·     In Use—Whether the database link handle is being used.

·     Mode ID—Mode ID of the database link.

·     User ID—User ID of the database link.

Dead Lock Information

The Dead Lock Information area contains the following fields:

·     No.—Sequence number of the dead lock.

·     Transaction ID—ID of the transaction that generates the dead lock.

·     Session ID—ID of the session that generates the dead lock.

·     SQL Statement—SQL statement that generates the dead lock.

·     Time—Time when the dead lock was generated.

Database Event Information

The Database Event Information area contains the following fields:

·     Occurred at—Time when the event or action occurred.

·     SQL Statement—SQL statement executed by the event or action.

·     Executed by—User who executes the event or action.

Tablespace Information

The Tablespace Information area contains the following fields:

·     Tablespace ID—ID of the tablespace for the DM application.

·     Tablespace Name—Name of the tablespace for the DM application.

·     Tablespace Type—Type of the tablespace for the DM application. Options are DB and Temporary.

·     Tablespace Status—Status of the tablespace for the DM application. Options are Online and Offline.

·     File Quantity—Number of files in the tablespace for the DM application.

·     Total Size—Total size of the tablespace (in pages) for the DM application.

·     Free Space—Size of the available space in the tablespace for the DM application.

·     Used Space—Size of the space that is occupied by files in the tablespace for the DM application.

·     Tablespace Usage—Percentage of the used tablespace space.

Tablespace File Information

The Tablespace File Information area contains the following fields:

·     File Path—Path of the DM data file.

·     Tablespace Name—Name of the tablespace for the DM application.

·     Total Size—Total size of the DM data file.

·     Free Space—Available space of the DM data file.

·     Used Space—Used space of the DM data file.

·     File Usage—File usage of the DM data file.

·     Read Pages—Number of pages read from the DM data file.

·     Write Pages—Number of pages written into the DM data file.

·     Read Requests—Number of requests for reading pages from the DM data file.

·     Write Requests—Number of requests for writing pages into the DM data file.

·     Status—Status of the DM data file.

·     Read/Write Status—The DM data file is in read or write state.

·     Modified Transactions—Number of modified transactions in the DM data file.

Top 10 SQL Statements by Time

The Top 10 SQL Statements by Time area contains the following fields:

·     SQL StatementTop 10 SQL statements by cumulative execution duration.

·     Execution DurationDuration for parse and execution of the SQL statement.

·     Logical Reads—Number of logical reads for the SQL statement.

·     Physical Reads—Number of physical reads for the SQL statement.

Top 10 SQL Statements by Logical Read

The Top 10 SQL Statements by Logical Read area contains the following fields:

·     SQL StatementTop 10 SQL statements by logic read.

·     Execution DurationDuration for parse and execution of the SQL statement.

·     Logical Reads—Number of logical reads for the SQL statement.

·     Physical Reads—Number of physical reads for the SQL statement.

Top 10 SQL Statements by Physical Read

The Top 10 SQL Statements by Physical Read area contains the following fields:

·     SQL StatementTop 10 SQL statements by physical read.

·     Execution DurationDuration for parse and execution of the SQL statement.

·     Logical Reads—Number of logical reads for the SQL statement.

·     Physical Reads—Number of physical reads for the SQL statement.

Oracle ASM

Automatic Storage Management (ASM) simplifies storage and management of Oracle database files, such as striping and mirroring disks, and automatically adjusting I/O balancing.

Adding an Oracle ASM application monitor

When you add Oracle ASM application monitors, follow these guidelines:

·     The operator needs to provide the username and password of the Oracle ASM administrator.

·     Add Oracle ASM hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add an Oracle ASM application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Oracle ASM of the Database Server Monitor class.

The page for adding an Oracle ASM application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Oracle ASM application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port of Oracle ASM. The default setting is TCP 1521. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username of the Oracle ASM administrator. The fields are available only when you select Disable from the Use Template list.

¡     Instance Name—Enter the instance name for the Oracle ASM application. The default is +ASM.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Oracle ASM applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Oracle ASM depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Oracle ASM and operating system applications by IP address and displays their dependencies in the dependency topology.

¡     Application GroupSpecify an application group for the Oracle ASM application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Oracle ASM application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Oracle ASM application monitor. When the IP address of a monitored Oracle ASM host changes, authorized users must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Oracle ASM application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Oracle ASM application monitor you want to modify.

The page for modifying the Oracle ASM application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Oracle ASM application monitor."

5.     Click OK.

Viewing the Oracle ASM application monitor report

After an Oracle ASM application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Oracle ASM application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Oracle ASM application monitor to display the report.

Figure 73 shows part of an Oracle ASM application monitor report.

Figure 73 Part of an Oracle ASM application monitor report

oracle asm-en.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Oracle ASM application.

·     IP Address—IP address of the Oracle ASM host.

·     Application Type—Type of the monitored application, which is always Oracle ASM.

·     PortService port of the Oracle ASM application.

·     Last Polling Time—Time when APM last polled the Oracle ASM application.

·     RelationshipClick the Relationship icon  to view dependencies between the Oracle ASM application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Oracle ASM application. This field is not displayed if no alarm was generated by the Oracle ASM application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Oracle ASM application.

¡     Click the Weekly History icon  to view the availability of the Oracle ASM application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Oracle ASM application in the last 30 days.

·     Available Time—Total amount of time that the Oracle ASM application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Oracle ASM application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Oracle ASM application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Oracle ASM application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Disk Group

The Disk Group area contains the following fields:

·     NumberNumber of the disk group.

·     Name—Name of the disk group.

·     Status—Status of the disk group in the last polling interval.

·     Total—Total disk space of the disk group.

·     Free—Free disk space of the disk group in the last polling interval.

·     Usage—Disk space usage of the disk group in the last polling interval.

·     Offline Disks—Numbers of offline disks in the disk group in the last polling interval.

Disk

The Disk area contains the following fields:

·     Disk Group NumberNumber of the disk group to which the disk belongs.

·     Disk NumberNumber of the disk.

·     Name—Disk name.

·     Status—Status of the disk in the last polling interval.

·     Total—Total disk space of the disk.

·     Free—Free disk space of the disk in the last polling interval.

·     Usage—Disk space usage of the disk in the last polling interval.

·     Read Rate—Read rate of the disk in the last polling interval.

·     Write Rate—Write rate of the disk in the last polling interval.

·     Mode Status—Mode status of the disk in the last polling interval.

·     Mount Status—Mount status of the disk in the last polling interval.

·     Header Status—Header status of the disk in the last polling interval.

·     Path—Path of the disk.

PostgreSQL

PostgreSQL is an open source DBMS.

Adding a PostgreSQL application monitor

APM can locally or remotely monitor PostgreSQL applications through JDBC. When you add PostgreSQL application monitors, follow these guidelines:

·     To locally monitor a PostgreSQL application, install agents on the Windows or Linux hosts on which the PostgreSQL applications are deployed. For more information about agents, see "APM agent management."

·     To remotely monitor a PostgreSQL application, obtain the username and password of a user who has the PostgreSQL administrator's privileges.

·     Add PostgreSQL hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the PostgreSQL application, make sure at least one probe is configured in APM. After a PostgreSQL application monitor is added, APM sends the IP address and service port of the monitored PostgreSQL application to the probes for traffic collection.

To add a PostgreSQL application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click PostgreSQL of the Database Server Monitor class.

The page for adding a PostgreSQL application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the PostgreSQL application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port of PostgreSQL. The default setting is TCP 5432. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username of the PostgreSQL administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of PostgreSQL applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that PostgreSQL depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between PostgreSQL and operating system applications by IP address and displays their dependencies in the dependency topology.

¡     Application GroupSpecify an application group for the PostgreSQL application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a PostgreSQL application monitor

Authorized users can modify all parameters except the IP address and the APM server for a PostgreSQL application monitor. When the IP address of a monitored PostgreSQL host changes, authorized users must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a PostgreSQL application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the PostgreSQL application monitor you want to modify.

The page for modifying the PostgreSQL application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a PostgreSQL application monitor."

5.     Click OK.

Viewing the PostgreSQL application monitor report

After a PostgreSQL application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the PostgreSQL application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a PostgreSQL application monitor to display the report.

Figure 74 shows part of a PostgreSQL application monitor report.

Figure 74 Part of a PostgreSQL application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the PostgreSQL application.

·     IP Address—PostgreSQL host IP address.

·     Application Type—Type of the monitored application, which is always PostgreSQL.

·     Version—Version of the PostgreSQL application.

·     Last Polling Time—Time when APM last polled the PostgreSQL application.

·     RelationshipClick the Relationship icon  to view dependencies between the PostgreSQL application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the PostgreSQL application. This field is not displayed if no alarm was generated by the PostgreSQL application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the PostgreSQL application.

¡     Click the Weekly History icon  to view the availability of the PostgreSQL application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the PostgreSQL application in the last 30 days.

·     Available Time—Total amount of time that the PostgreSQL application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the PostgreSQL application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the PostgreSQL application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the PostgreSQL application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Database Connection Statistics

The Database Connection Statistics area contains the following fields:

·     Database Name—Name of the database.

·     Transaction Start Time—Start time of the last transaction.

·     Query Start Time—Start time of the last query.

·     Client Connection Time—Time when the client was connected to the database.

Database Status

The Database Status area contains the following fields:

·     Database Name—Name of the database.

·     Active Server Process CountNumber of active processes on the database.

·     Total Submitted Transaction CountTotal number of transactions committed to the database.

·     Total Rollback Transaction CountTotal number of transactions that the database rolled back.

·     Total Disk Read CountTotal number of times that the database read blocks from the disk.

·     Total Buffer Hit CountTotal number of times that the database found blocks in the buffer.

Lock Status

The Lock Status area contains the following fields:

·     Database Name—Name of the database.

·     Lock ModeMode of the lock. A lock is held or waited on by a transaction.

·     GrantWhether the lock was held or waited on by a transaction. When the lock was held by a transaction, this field displays t. When the lock was waited on by a transaction, this field displays f.

Automatic Cleaning-Freezing

The Automatic Cleaning-Freezing area displays information about the automatic cleaning system AutoVacuum.

The Automatic Cleaning-Freezing area contains the following fields:

·     Database Name—Name of the database.

·     Frozen ThresholdFrozen threshold for automatic cleaning.

·     Frozen Transaction IDMaximum frozen transaction ID in the database.

·     ProgressAutomatic cleaning progress. The progress is calculated by using the formula: Progress = Maximum frozen transaction ID/Frozen threshold x 100%.

Sequence Status

The Sequence Status area contains the following fields:

·     NamespaceNamespace of the sequence.

·     Sequence NameName of the sequence.

·     Complete Sequence NameComplete name of the sequence.

·     TypeType of the sequence.

Pg_xlog Log

The write ahead logging (WAL) files for PostgreSQL are stored in the pg_xlog directory. Contact the database administrator to archive and clear logs when the log files are excessive.

The Pg_xlog Log area contains the following field:

·     Log File CountNumber of pg_xlog files. Click the History Record icon icon_history_16x16.png to view the history graph of the pg_xlog file count.

Table Statistics

The Table Statistics area contains the following fields:

·     Table NameName of the database table.

·     SizeSize of the database table.

·     Total SizeTotal size of the database table and its indexes.

·     Sequence Scan CountNumber of sequence scans on the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the sequence scan count.

·     Sequence Scan Read CountNumber of rows fetched from the database table by using sequence scans. Click the History Record icon icon_history_16x16.png to view the history graph of the sequence scan read count.

·     Index ScanNumber of index scans on the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the index scan count.

·     Fetched Index Scan CountNumber of rows fetched from the database table by using index scans. Click the History Record icon icon_history_16x16.png to view the history graph of the fetched index scan count.

·     Inserted Row CountNumber of rows inserted in the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the inserted row count.

·     Updated Row CountNumber of rows updated in the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the updated row count.

·     Deleted Row CountNumber of rows deleted from the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the deleted row count.

·     Hot Update CountNumber of hot updates in the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the hot update count.

·     Estimated Live Row CountNumber of estimated live rows in the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the estimated live row count.

·     Estimated Dead Row CountNumber of estimated dead rows in the database table. Click the History Record icon icon_history_16x16.png to view the history graph of the estimated dead row count.

Database Statistics

The Database Statistics area contains the following fields:

·     Database NameName of the database.

·     Database OIDOID of the database.

·     Database User NameUsername of the database user.

·     SizeSize of the database.

·     Max Connection CountMaximum number of database connections.

·     Current Connection CountNumber of current database connections. Click the History Record icon icon_history_16x16.png to view the history graph of the current database connection count.

·     Total Committed Transaction CountTotal transactions committed to the database after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the total committed transaction count.

·     Total Rollback Transaction CountTotal transactions that the database rolled back after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the total rollback transaction count.

·     Total Disk Read CountTotal number of times that PostgreSQL read data from the disk after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the total disk read count.

·     Buffer Hit CountTotal number of buffer hits after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the buffer hit count.

·     Returned Row CountTotal number of returned rows after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the returned row count.

·     Fetched Row CountTotal number of fetched rows after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the fetched row count.

·     Inserted Row CountTotal number of inserted rows after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the inserted row count.

·     Updated Row CountTotal number of updated rows after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the updated row count.

·     Deleted Row CountTotal number of deleted rows after the database was reset most recently. Click the History Record icon icon_history_16x16.png to view the history graph of the deleted row count.

Table Size Statistics

The Table Size Statistics area contains the following fields:

·     Table NameName of the database table.

·     Table SizeSize of the database table.

·     Namespace NameName of the database table namespace.

DBQuery

DBQuery is a common monitor that uses SQL statement to query databases. You can judge the database performance through the query time. Database server error, inappropriate database table design, and excessive large database tables cause long time to get the query result.

APM supports DBQuery for the following types of databases:

·     MySQL

·     Oracle

·     DB2

·     Sybase

·     SQL Server

Adding a DBQuery application monitor

APM monitors the DBQuery application through JDBC. When you add DBQuery application monitors for databases, follow these guidelines:

·     Understand the database structure and design SQL statements for key database tables.

·     Obtain the username and password of the user who has the database administrator's privileges, and execute the SQL statements.

·     Have knowledge about the database name for MySQL, DB2, Sybase, and SQL Server databases. Obtain the instance name for Oracle databases, and obtain the non-default instance name for SQL Server that uses non-default instance name.

·     Add target hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a DBQuery application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click DBQuery of the Database Server Monitor class.

The page for adding a DBQuery application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the target application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Database Type—Select the database type. Options are MySQL, Oracle, DB2, Sybase, and SQL Server. This field is available only when you select Disable from the Use Template list.

¡     Application Monitor Port—Enter the service port of DBQuery. This field is available only when you select Disable from the Use Template list.

¡     Database Name/Instance Name—Enter the database name or instance name. This field is available only when you select Disable from the Use Template list.

-     Enter the database name for MySQL, DB2, Sybase, and SQL Server that uses the default instance.

-     Enter the Oracle instance name for Oracle database.

-     Enter the database name and instance name separated by semicolon for SQL Server that uses the non-default instance.

¡     Username—Enter the username of the DBQuery administrator. This field is available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the DBQuery administrator. This field is available only when you select Disable from the Use Template list.

¡     SQL Query StatementEnter the SQL query statement.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of DBQuery applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that DBQuery depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between DBQuery and operating system applications by IP address and displays their dependencies in the dependency topology.

¡     Application GroupSpecify an application group for the DBQuery application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a DBQuery application monitor

Authorized users can modify all parameters except the IP address and the APM server for a DBQuery application monitor. When the IP address of a monitored host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a DBQuery application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify iconicon_modify_16x16.png for the DBQuery application monitor you want to modify.

The page for modifying the DBQuery application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a DBQuery application monitor."

5.     Click OK.

Viewing the DBQuery application monitor report

After the DBQuery application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the DBQuery application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a DBQuery application monitor to display the report.

Figure 75 shows part of a DBQuery application monitor report.

Figure 75 Part of a DBQuery application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the DBQuery application.

·     IP Address—IP address of the host on which the target application is installed.

·     Application Type—Type of the monitored application, which is always Database Query.

·     Port—Port number for the application monitor. The port number varies by database type.

·     Database Name/Instance Name—Database name or instance name.

·     Last Polling Time—Time when APM last polled DBQuery.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the DBQuery application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the target host. This field is not displayed if no alarm was generated by the DBQuery application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the DBQuery application.

¡     Click the Weekly History icon  to view the availability of the DBQuery application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the DBQuery application in the last 30 days.

·     Available Time—Total amount of time that the DBQuery application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the DBQuery application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the DBQuery application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the DBQuery application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Response time of the DBQuery application. Response time indicates the period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Query Result

The Query Result area displays 10 entries. Click More to bring up the query result window. A maximum of 200 entries can be displayed.

Sybase

Sybase is an IBM-developed DBMS. Database performance and stability impact service operations. APM supports monitoring Sybase applications for quick detection of Sybase problems.

Adding a Sybase application monitor

APM can monitor the Sybase applications through agents or JDBC. When you add application monitors for Sybase, follow these guidelines:

·     To monitor a Sybase application through an agent, deploy the agent on the Windows or Linux host on which the Sybase application is installed. For more information about agents, see "APM agent management."

·     To monitor a Sybase application through JDBC, obtain the username and password of a user who has the Sybase administrator's privileges.

·     Add Sybase hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Sybase application, make sure at least one probe is configured in APM. After a Sybase application monitor is added, APM sends the IP address and service port of the monitored Sybase application to the probes for traffic collection.

To add a Sybase application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Sybase of the Database Server Monitor class.

The page for adding a Sybase application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Sybase application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when Enable is selected from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port of Sybase. The default setting is TCP 5000. This field is available only when Disable is selected from the Use Template list.

¡     Traffic Collection Port—Enter one or more service port numbers for Sybase. To set multiple ports, separate the port numbers by commas. This field is displayed only when at least one probe is configured for APM and Disable is selected from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when Disable is selected from the Use Template list.

¡     Username—Enter the username of the Sybase administrator. This field is available only when Disable is selected from the Use Template list.

¡     Password—Enter the password of the Sybase administrator. This field is available only when Disable is selected from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when Disable is selected from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Sybase applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Sybase depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Sybase and operating system applications by IP address and displays their dependencies in the dependency topology.

¡     Application GroupSpecify an application group for the Sybase application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Sybase application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Sybase application monitor. When the IP address of a monitored Sybase host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Sybase application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Sybase application monitor you want to modify.

The page for modifying the Sybase application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Sybase application monitor."

5.     Click OK.

Viewing the Sybase application monitor report

After the Sybase application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Sybase application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Sybase application monitor to display the report.

Figure 76 shows part of a Sybase application monitor report.

Figure 76 Part of a Sybase application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Sybase application.

·     IP Address—IP address of the Sybase host.

·     Application Type—Type of the monitored application, which is always Sybase.

·     Version—Version number of the Sybase application.

·     Port—Port number for the Sybase application.

·     Last Polling Time—Time when APM last polled Sybase.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Sybase application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management.

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Sybase host. This field is not displayed if no alarm was generated by the Sybase application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Sybase application.

¡     Click the Weekly History icon  to view the availability of the Sybase application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Sybase application in the last 30 days.

·     Available Time—Total amount of time that the Sybase application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Sybase application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Sybase application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Sybase application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Memory Details

The Memory Details area contains the following fields:

·     Memory Usage—Memory usage of Sybase. The memory usage is calculated by using the formula: Memory usage = Memory in use/Maximum memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the memory usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     In Use—Size of memory being used. Click the History Record icon icon_history_16x16.png to view the history graph of used memory.

·     Free Memory—Size of free memory.

·     Max Memory—Maximum memory.

Response Time

The Response Time area contains the following field:

·     Response Time—Response time of the Sybase application. Response time indicates the period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Connection Statistics

The Connection Statistics area contains the following fields:

·     Max Connections—Maximum number of concurrent connections allowed by Sybase. Click the History Record icon icon_history_16x16.png to view the history graph of the concurrent connection limit.

·     Max Remote Connections—Maximum number of concurrent remote connections allowed by Sybase. Click the History Record icon icon_history_16x16.png to view the history graph of the concurrent remote connection limit.

·     Connections—Concurrent connections when APM last polled Sybase. Click the History Record icon icon_history_16x16.png to view the history graph of the concurrent connection count.

·     Remote Connections—Concurrent remote connections when APM last polled Sybase. Click the History Record icon icon_history_16x16.png to view the history graph of the concurrent remote connection count.

Application Traffic

APM collects Sybase traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by Sybase over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Sybase since 00:00 today.

Database Details

The Database Details area contains the following fields:

·     Name—Name of the database the Sybase accessed when APM last polled Sybase.

·     Total Size—Total size of the disk space assigned to the database.

·     In Use—Used disk space.

·     In Use (%)—Ratio of used disk space to total disk space.

·     Creator—User account that created the database.

Process Details

The Process Details area contains the following fields:

·     Process NameName of the process.

·     HostName of the host where the process was running.

·     IP addressIP address of the host.

·     StatusStatus of the process.

·     CommandType of the command that was being executed.

·     Login NameName of the account that logged in to Sybase.

·     Physical IOPhysical IO for the process.

·     Time BlockedDuration for how long the process is blocked.

·     MoreClick More to display all processes that accessed the Sybase.

Transaction Details

The Transaction Details area contains the following fields:

·     Process NameName of the processes that were using transactions to access the database.

·     Database NameName of the database the process accessed.

·     TypeType of the running transaction.

·     CoordinatorCoordinator used by the running transaction.

·     ConnectionsConnections for the running transaction.

·     Status—Status of the running transaction.

·     Start TimeStart time of the running transaction.

·     Transaction NameName of the running transaction.

 

Xugu

Xugu is a relational DBMS made in China. It supports distributed storage and distributed computing. Database performance and stability affect service operations. APM supports monitoring Xugu applications.

Adding a Xugu application monitor

APM can monitor Xugu applications through agents or JDBC. When you add application monitors for Xugu, follow these guidelines:

·     To monitor a Xugu application through an agent, deploy the agent on the Windows or Linux host where the Xugu application is installed. For more information about agents, see "APM agent management."

·     To monitor a Xugu application through JDBC, obtain the username and password of a user who has the Xugu administrator's privileges.

·     Add Xugu hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Xugu application, make sure at least one probe is configured in APM. After a Xugu application monitor is added, APM sends the IP address and service port of the monitored Xugu application to the probes for traffic collection.

To add a Xugu application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Xugu of the Database Server Monitor class.

The page for adding a Xugu application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Xugu application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when Enable is selected from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port of Xugu. The default setting is TCP 5138. This field is available only when Disable is selected from the Use Template list.

¡     Traffic Collection Port—Enter one or more service port numbers for Xugu. This field is displayed only when at least one probe is configured for APM and Disable is selected from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when Disable is selected from the Use Template list.

¡     Username—Enter the username of the Xugu administrator. This field is available only when Disable is selected from the Use Template list.

¡     Password—Enter the password of the Xugu administrator. This field is available only when Disable is selected from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when Disable is selected from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Xugu applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Xugu depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Xugu and operating system applications by IP address and displays their dependencies in the dependency topology.

¡     Application GroupSpecify an application group for the Xugu application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Xugu application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Xugu application monitor. When the IP address of a monitored Xugu host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Xugu application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Xugu application monitor you want to modify.

The page for modifying the Xugu application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Xugu application monitor."

5.     Click OK.

Viewing the Xugu application monitor report

After the Xugu application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Xugu application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Xugu application monitor to display the report.

Figure 77 shows part of a Xugu application monitor report.

Figure 77 Part of a Xugu application monitor report

 

The Xugu application monitor report has the Summary and Tablespace tabs. Click each tab to view the corresponding information.

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Xugu application.

·     IP Address—IP address of the Xugu host.

·     Application Description—Description of the Xugu application.

·     Application Type—Type of the monitored application, which is always Xugu.

·     Port—Service port of the Xugu application.

·     Last Polling Time—Time when APM last polled Xugu.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Xugu application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management.

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Xugu host. This field is not displayed if no alarm was generated by the Xugu application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Xugu application.

¡     Click the Weekly History icon  to view the availability of the Xugu application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Xugu application in the last 30 days.

·     Available Time—Total amount of time that the Xugu application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Xugu application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Xugu application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Xugu application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Storage Information

The Storage Information area contains the following fields:

·     TablesTotal number of tables and table partitions in the Xugu database.

·     IndexesTotal number of indexes and index partitions in the Xugu database.

·     Large ObjectsTotal number of larger objects in the Xugu database.

Server Information

The Server Information area contains the following field:

·     Node IDID of a node in the Xugu database.

·     Node IPIP address of a node in the Xugu database. If the Xugu database is operating in standalone mode, 0.0.0.0 is displayed. If the Xugu database is operating in cluster mode, the node IP address is the IP address of the server where the node is located.

·     Server IPIP address of the server where the node is located.

·     Listening PortListening port number of the Xugu database.

·     Server NameName of the server where the node is located.

·     Operating SystemOperating system type of the server where the node is located.

·     Instruction Set—Instruction set of the server where the node is located.

·     Database Version—Version of the database to which the node belongs.

Memory Information

The Memory Information area contains the following fields:

·     Node IDID of a node in the Xugu database.

·     Node IPIP address of a node in the Xugu database. If the Xugu database is operating in standalone mode, 0.0.0.0 is displayed. If the Xugu database is operating in cluster mode, the node IP address is the IP address of the server where the node is located.

·     Cache Block SizeCache block size of the node.

·     Total Cache BlocksTotal number of cache blocks of the node.

·     Free Cache BlocksNumber of available cache blocks of the node.

·     Dirty Cache BlocksNumber of dirty cache blocks of the node.

·     LRU Cache BlocksNumber of the least recently used (LRU) cache blocks.

·     SGA Block SizeSystem global area (SGA) block size of the node.

·     Total SGA BlocksTotal number of SGA blocks.

·     Available SGA BlocksNumber of available SGA blocks.

·     Peak SGA BlocksNumber of peak SGA blocks.

Run Status

The Running Status area contains the following fields:

·     Node IDID of a node in the Xugu database.

·     Current TimeCurrent time of the server where the node is located.

·     RequestsTotal number of requests received by the node since the Xugu database was started.

·     Requests/SecNumber of requests received by the node per second in the last polling interval.

·     Cache ReadsTotal number of times the Xugu database reads data from the cache on the node since the Xugu database was started.

·     Cache Reads/SecNumber of times the Xugu database reads data per second from the cache on the node in the most recent polling interval.

·     Disk ReadsTotal number of times the Xugu database reads data from disks on the node since the Xugu database was started.

·     Disk Reads/SecNumber of times the Xugu database reads data per second from disks on the node in the most recent polling interval.

·     Disk Read SizeTotal size of the data that the Xugu database reads from disks on the node since the Xugu database was started.

·     Disk Read Size/SecSize of the data that the Xugu database reads per second from disks on the node in the most recent interval.

·     Disk WritesTotal number of times the Xugu database writes data to disks on the node since the Xugu database was started.

·     Disk Writes/SecNumber of times the Xugu database writes data per second to disks on the node in the most recent polling interval.

·     Disk Write SizeTotal size of the data that the Xugu database writes to disks on the node since the Xugu database was started.

·     Disk Write Size/SecSize of the data that the Xugu database writes per second to disks on the node in the most recent interval.

·     Net Read SizeTotal size of the data that the Xugu database reads from the network on the node since the Xugu database was started.

·     Net Read Size/SecSize of the data that the Xugu database reads per second from the network on the node in the most recent interval.

·     Net Write SizeTotal size of the data that the Xugu database writes to the network on the node since the Xugu database was started.

·     Net Write Size/SecSize of the data that the Xugu database writes per second to the network on the node in the most recent interval.

·     Lock RequestsTotal number of lock requests on the node since the Xugu database was started.

·     Dead LocksTotal number of dead locks on the node since the Xugu database was started.

·     Message SendsTotal number of times the node sends messages since the Xugu database was started.

·     Message ReceivesTotal number of times the node receives messages since the Xugu database was started.

Cluster Information

The Cluster Information area contains the following fields:

·     Node IDID of a node in the Xugu database.

·     Communication Port—IP address and communication port of the node.

·     Node Type—Type of the node. Options are:

¡     Active Master

¡     Standby Master

¡     Storage

¡     Working

·     Node State—Status of the node. Options are:

¡     Offline

¡     Joined

¡     Running

¡     Dead

·     Processing Weight—Processing weight of the node. You can specify a value based on the server processing capacity, including the CPU and memory. The database system allocates data to the node for processing according to the specified value.

·     Store Weight—Storage weight of the node. You can specify a value based on the server storage capacity. This value affects the data storage ratio of the node.

·     Storage Blocks—Total number of storage blocks on the node, including the primary storage blocks on the current node and the secondary storage blocks on other nodes.

·     Primary Storage Blocks—Storage blocks on the node that provide read and write services.

Database Information

The Database Information area contains the following fields:

·     Database IDID of the database.

·     Database NameName of the database.

·     Created ByUser who created the database.

·     Character SetCharacter set used by the database.

·     Time ZoneTime zone used by the database.

·     RemarksRemarks of the database.

·     Created AtTime when the database was created.

·     Modified AtTime when the database was most recently modified.

Session Information

The Session Information area contains the following fields:

·     Node IDID of a node in the Xugu database.

·     Session IDID of a session on the node.

·     Client IPIP address of the client.

·     User NameUsername used for the session connection.

·     DatabaseDatabase to which the session is connected.

·     Start TimeTime when the session was started.

·     Access TimeTime when the session was most recently accessed.

·     Session Status—Current status of the session. Options are:

¡     Establishing

¡     Connection idle

¡     Connection active,transaction processing

¡     Connection active,data input complete

User Information

The Database Information area contains the following fields:

·     User IDID of the database user.

·     User NameName of the database user.

·     User RoleRole of the database user.

·     DatabaseDatabase to which the user belongs.

·     LockedWhether the database user is locked.

·     Created AtTime when the database user was created.

·     Modified AtTime when the database user was most recently modified.

Application Traffic

APM collects traffic statistics for the Xugu application as per IP address and port number.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Xugu application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Xugu application since 00:00 today.

Tablespace Information

The Tablespace Information area contains the following fields:

·     Node IDID of a node in the Xugu database.

·     Node IPIP address of a node in the Xugu database. If the Xugu database is operating in standalone mode, 0.0.0.0 is displayed. If the Xugu database is operating in cluster mode, the node IP address is the IP address of the server where the node is located.

·     Tablespace ID—ID of the tablespace on the node.

·     Tablespace Name—Name of the tablespace on the node.

·     Tablespace Type—Type of the tablespace on the node.

·     File Quantity—Number of data files in the tablespace.

·     Media ErrorWhether storage media errors exist in the tablespace.

Tablespace File Information

The Tablespace File Information area contains the following fields:

·     Node IDID of a node in the Xugu database.

·     Node IPIP address of a node in the Xugu database. If the Xugu database is operating in standalone mode, 0.0.0.0 is displayed. If the Xugu database is operating in cluster mode, the node IP address is the IP address of the server where the node is located.

·     Tablespace ID—ID of the tablespace on the node.

·     File SNSequence number of a data file in the tablespace.

·     File Path—Path of the data file in the tablespace.

·     Max. SizeMaximum size of the data file in the tablespace. A hyphen (-) is displayed if the data file size is not limited.

·     Extended Step LengthExtended step length of the data file in the tablespace.


Application server monitor

This chapter describes how to add and modify monitors for application servers, and helps you view the monitor reports.

.NET server

Microsoft .NET server is an XML Web Service platform for the Web applications developed by the .NET technology. APM provides the ability to monitor the .NET server application.

Adding a .NET server application monitor

APM can locally or remotely monitor .NET server applications through WMI. When you add application monitors for .NET servers, follow these guidelines:

·     APM obtains monitor index data of .NET server applications through the WMI interface of Windows operating systems. Enable WMI on the Windows operating systems where .NET server applications are deployed. For more information about enabling WMI for the Windows operating systems, see the Microsoft Windows operating system configuration guide.

·     To locally monitor .NET server applications, install agents on the Windows operating systems where .NET server applications are deployed. For more information about installing agents, see "APM agent management."

·     To remotely monitor .NET server applications, obtain the correct username and password of the user who has the Windows administrator's privileges.

·     Add .NET server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the .NET application, make sure at least one probe is configured in APM. After a .NET application monitor is added, APM sends the IP address and service port of the monitored .NET application to the probes for traffic collection.

To add a .NET server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click .NET Server of the Application Server Monitor class.

The page for adding a .NET server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the .NET application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the .NET application, TCP 1433 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for .NET. This field is available only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the .NET administrator. The fields are available only when you select Disable from the Use Template list.

-     If the administrator is a domain user, user the domain name \ username format.

-     If the administrator is a local user, user the host name \username, IP address \username, or username format.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of .NET applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that .NET depends on, and then click OK.

-     Enter the complete or part of the application monitor name in the Search field at the top of the page, and then click Search.

-     Select the application that the .NET application depends on.

-     Click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between .NET and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the .NET server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a .NET server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a .NET application monitor. When the IP address of a monitored .NET host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a .NET application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify iconicon_modify_16x16.png for the .NET application monitor you want to modify.

The page for modifying the .NET application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a .NET server application monitor."

5.     Click OK.

Viewing the .NET server application monitor report

After a .NET application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the .NET application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a .NET application monitor to display the report.

Figure 78 shows part of a .NET application monitor report.

Figure 78 Part of a .NET server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health state of the .NET server application.

·     IP Address—IP address of the .NET server host.

·     Application Type—Type of the monitored application, which is always .NET Server.

·     Last Polling Time—Time when APM last polled the .NET server application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the .NET server. This field is not displayed if no alarm is generated by the .NET server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the .NET server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the .NET server in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the .NET server in the last 30 days.

·     Available Time—Total amount of time that the .NET server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the .NET server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the .NET server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the .NET server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

.NET Memory

The .NET server periodically reclaims the heap memory released by Web applications using the Garbage Collector (GC). Abnormal operation of the GC is one of the major causes for .NET server performance issues.

The .NET Memory area contains the following fields:

·     CPU Usage in GCCPU usage of GC. Click the History Record icon icon_history_16x16.png to for a monitor index to view the history graph of CPU usage in GC trend.

·     Heap MemorySize of the heap memory. Click the Set Threshold icon  to set alarm thresholds for the heap memory size.

.NET Thread

The .NET server manages all the physical and logical threads created by itself. Physical threads correspond to actual threads in the operating system. The .NET Thread area contains the following fields:

·     Physical Threads—Number of native OS threads created and managed by the .NET server to act as underlying threads for .NET thread objects.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of physical threads.

¡     Click the History Record icon icon_history_16x16.png for a monitor index to view the history graph of the physical threads.

·     Logical Threads—Number of current .NET thread objects created and managed by the .NET server. Click the History Record icon icon_history_16x16.png for a monitor index to view the history graph of logical threads.

·     Total Connections—Total number of times the threads in the runtime have failed to acquire a managed lock. Click the History Record icon icon_history_16x16.png for a monitor index to view the history graph of the total connections.

·     Thread Queue Length—Total number of threads in all the .NET applications waiting to acquire a managed lock. Click the History Record icon icon_history_16x16.png for a monitor index to view the history graph of the thread queue length.

.NET Abnormality

The .NET Abnormality area contains the following field:

·     Thrown Abnormalities—Total number of abnormalities thrown by the .NET server since the .NET server started. Click the History Record icon icon_history_16x16.png to view trend statistics of the number of thrown abnormalities of the .NET server in a line graph.

JIT

Just-in-time (JIT) is the .NET framework compiler that converts the Microsoft Intermediate Language (MSIL) to native code on an as-needed basis. CPU usage is a major indicator of JIT.

The JIT area contains the following field:

·     CPU Usage in JIT—CPU usage of JIT. Click the History Record icon icon_history_16x16.png to view trend statistics of history CPU usage of JIT in a line graph.

Security

The Security area contains the following field:

·     Total Checks During Runtime—Total number of runtime Code Access Security (CAS) checks performed by the .NET server since the server started. Click the History Record icon icon_history_16x16.png to view history graph of the total runtime check trend.

.NET Application

The .NET Application area contains the following fields:

·     Name—Name of the Web application. The __Total__ entry displays the summary information of all Web applications.

·     Waiting Transactions—Number of COM + transactions in waiting or suspended states.

·     Errors—Number of errors occurred during processing HTTP requests, including parser errors, compile errors, and runtime errors. Typically, errors do not occur during normal operation.

·     Requests—Number of requests received by the Web applications since the .NET server started.

·     Request Timeouts—Number of timed out requests in the Web applications.

·     Application Queue Requests—Number of requests added to the queue since the .NET server started.

·     Sent Request Bytes—Number of bytes sent by the Web applications.

·     Received Request Bytes—Number of bytes received by the Web applications.

·     Active Sessions—Number of active sessions in the Web applications.

·     Transactions—Number of COM + transactions that have started in the Web applications.

·     Aborted Transactions—Number of COM + transactions aborted in the Web applications.

JBoss server

The JBoss server is an open source Web server for developing and deploying Web applications complied in Java.

Configuring the JBoss server and the APM server

APM obtains monitor index data of JBoss server applications through JMX.

To monitor a JBoss server remotely:

1.     Edit the startup parameters for the JBoss server.

By default, a JBoss server of version 4.2 or later versions only listens on the port with the IP address of 127.0.0.1 (local host). To enable APM to obtain index data from the JBoss server, add the parameter –b 0.0.0.0 to the startup script of the server to enable it to monitor all the local IP addresses.

¡     For Windows operating systems, the startup script is run.bat –b 0.0.0.0.

¡     For Linux operating systems, the startup script is run.sh –b 0.0.0.0.

2.     Edit the hosts file on the APM server.

Add the IP address-host name mapping of the JBoss server to the hosts file of the APM server for it to identify the IP address of the JBoss server while processing the JBoss response packets.

¡     For Windows operating systems, the hosts file directory is C:\WINDOWS\system32\drivers\etc\hosts file.

¡     For Linux operating systems, the hosts file directory is /etc/hosts file.

Adding a JBoss server application monitor

APM can locally or remotely monitor JBoss server applications. When you add JBoss server application monitors, follow these guidelines:

·     To locally monitor JBoss server applications, install agents on the Windows operating systems where JBoss server applications are deployed. For more information about installing agents, see "APM agent management."

·     To remotely monitor JBoss server applications, configure the JBoss server and the APM server. For more information, see "Configuring the JBoss server and the APM server."

·     Add JBoss server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the JBoss server application, make sure at least one probe is configured in APM. After a JBoss server application monitor is added, APM sends the IP address and service port of the monitored JBoss server application to the probes for traffic collection.

To add a JBoss server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click JBoss Server of the Application Server Monitor class.

The page for adding a JBoss server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the JBoss server application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the JBoss server application, TCP 1099 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for JBoss. This field is available only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of JBoss applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that JBoss depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between JBoss and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the JBoss application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a JBoss server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a JBoss server application monitor. When the IP address of a monitored JBoss host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a JBoss server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify iconicon_modify_16x16.png for the JBoss server application monitor you want to modify.

The page for modifying the JBoss server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a JBoss server application monitor."

5.     Click OK.

Viewing the JBoss server application monitor report

After a JBoss server application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the JBoss server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a JBoss server application monitor to display the report.

Figure 79 shows part of a JBoss server application monitor report.

Figure 79 Part of a JBoss server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health state of the JBoss server application.

·     IP Address—IP address of the JBoss server host.

·     Application Type—Type of the monitored application, which is always JBoss Server.

·     JBoss Version—Version of the JBoss server.

·     Last Polling Time—Time when APM last polled the JBoss server application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the JBoss server. This field is not displayed if no alarm is generated by the JBoss server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the JBoss server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the JBoss server in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the JBoss server in the last 30 days.

·     Available Time—Total amount of time that the JBoss server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the JBoss server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the JBoss server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the JBoss server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Memory Usage

The Memory Usage area contains the following field:

·     Free Memory (%)Percentage of free memory to total memory allocated to the JBoss server by the operating system.

¡     Click the Set Threshold icon  to set alarm thresholds for the free memory percentage.

¡     Click the History Record icon icon_history_16x16.png to view changes of the free memory percentage over a specific time period in a line graph.

Stack

The Stack area contains the following fields:

·     Total Stacks—Total size of the stack the operating system allocated to the JBoss server.

·     Current StacksSize of the stack that is currently being used in the JBoss server. Click the History Record icon icon_history_16x16.png to view history graph of the current stack size trend.

·     Free StacksSize of the free stack in the JBoss server.

Connection Pool

The Connection Pool area contains the following fields:

·     Pool Name—Name of the connection pool.

·     Pool Size—Size of the connection pool.

·     Connections in Use—Total number of connections being used.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of connections being used.

¡     Click the History Record icon icon_history_16x16.png for a monitor index to view the history trend statistics of connections being used in a line graph.

·     Created ConnectionsTotal number of connections created. Click the History Record icon icon_history_16x16.png for a monitor index to view the history trend statistics of created connections in a line graph.

·     Terminated Connections—Number of connections that have been terminated. Click the History Record icon icon_history_16x16.png for a monitor index to view the history trend statistics of terminated connections in a line graph.

·     Idle Timeout—Maximum time an idle connection can remain in the pool. Click the History Record icon icon_history_16x16.png for a monitor index to view the history trend statistics of idle timeout in a line graph.

Web Application

The Web Application area contains the following fields:

·     Web Application—Name of the Web application deployed on the JBoss server.

·     Servlet—Servlet used by the Web application. One Web application can use multiple servlets, each responsible for responding to and handling HTTP requests of one or multiple Web pages.

·     Average Time—Average time taken by the servlet to respond to and process requests.

·     Total Time—Total time taken by the servlet to load web pages and process requests.

·     Max Execution Time—Maximum execution time for the servlet.

·     Min Execution Time—Minimum execution time for the servlet.

·     More—Click More to view all the Web applications deployed on the JBoss server in a separate window.

Application Traffic

APM collects the traffic statistics of the JBoss server based on the IP address and port number of JBoss server host. The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the JBoss server over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the JBoss server since 00:00 today.

Tomcat server

Tomcat is an open source Web server developed by the Apache Software Foundation (ASF) for developing and deploying Web applications complied in Java.

Configuring the Tomcat server to support JMX monitoring

APM obtains monitor index data of Tomcat server applications through JMX. To monitor a Tomcat server, configure the environment variables and startup script for the monitored server.

To configure the green version Tomcat server:

1.     Configure the environment variables for the operating system. Add the following parameters:

%JAVA_HOME%\lib\tools.jar

%JAVA_HOME%\lib\dt.jar

%CATALINA_HOME%\common\lib\jsp-api.jar

%CATALINA_HOME%\common\lib\servlet-api.jar

Parameter description:

¡     For Windows operating systems, modify the Path environment variable. Use semicolons (;) as the parameter delimiter.

¡     For Linux operating systems, modify the PATH environment variable. Use colons (:) as the parameter delimiter.

2.     Add the following java options to the Tomcat startup script:

set JAVA_OPTS=%JAVA_OPTS% -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=172.8.21.1.

¡     For Windows operating systems, the startup script path is <Tomcat deployment directory>\bin\catalina.bat.

¡     For Linux operating systems, the startup script path is <Tomcat deployment directory>/bin/catalina.sh.

Java option description:

¡     Dcom.sun.management.jmxremote—Enable remote access to JMX. APM can remotely access the JMX of the Tomcat server through RMI.

¡     Dcom.sun.management.jmxremote.port=1099—Specify the JMX port as 1099. You can use another port, but the port cannot conflict with other services.

¡     Dcom.sun.management.jmxremote.ssl=false—false indicates that no SSL connection is needed for remote RMI access.

¡     Dcom.sun.management.jmxremote.authenticate=false—false indicates that no authentication is needed for remote RMI access. For information about enabling authentication, see the Java document.

¡     Djava.rmi.server.hostname=172.8.21.1—Specify the local IP address that JMX listens on. The specified IP address must be able to communicate with APM.

The text should be placed in front of rem Execute Java with the applicable properties without any carriage return.

3.     Restart Tomcat.

To configure the installation version Tomcat server:

4.     Click Start > All programs > Apache Tomcat 5.5 > Configure Tomcat to open the Tomcat configuration console.

5.     Select the Java tab.

6.     At the bottom of the Java Options text box, add:

-Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=172.8.21.1

7.     Click OK, and then restart the Tomcat server.

Adding a Tomcat server application monitor

APM can locally or remotely monitor Tomcat applications. When you add Tomcat server application monitors, follow these guidelines:

·     To locally monitor Tomcat server applications, install agents on the Windows operating systems where Tomcat server applications are deployed. For more information about installing agents, see "APM agent management."

·     To remotely monitor Tomcat server applications, configure the Tomcat server. For more information, see "Configuring the Tomcat server to support JMX monitoring."

·     Obtain the username and password required for remote JMX access if authentication is enabled. Authentication is enabled only when the value of the java option Dcom.sun.management.jmxremote.authenticate is set to true.

·     Add Tomcat server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Tomcat application, make sure at least one probe is configured in APM. After a Tomcat application monitor is added, APM sends the IP address and service port of the monitored Tomcat application to the probes for traffic collection.

To add a Tomcat server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Tomcat Server of the Application Server Monitor class.

The page for adding a Tomcat server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Tomcat application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Tomcat application. Make sure the port number is the same as that specified by Dcom.sun.management.jmxremote.port in the startup script. The default value is TCP 1099. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for Tomcat. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password used for remote JMX access if authentication is enabled.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Tomcat server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Tomcat depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Tomcat and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Tomcat server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Tomcat server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Tomcat server application monitor. When the IP address of a monitored Tomcat host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Tomcat server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify iconicon_modify_16x16.png for the Tomcat server application monitor you want to modify.

The page for modifying the Tomcat server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Tomcat server application monitor."

5.     Click OK.

Viewing the Tomcat server application monitor report

After a Tomcat server application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Tomcat server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Tomcat server application monitor to display the report.

Figure 80 shows part of a Tomcat server application monitor report.

Figure 80 Part of a Tomcat server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Tomcat server application.

·     IP Address—IP address of the Tomcat server host.

·     Application Type—Type of the monitored application, which is always Tomcat Server.

·     Tomcat Version—Version of the Tomcat server.

·     Last Polling Time—Time when APM last polled the Tomcat server application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Tomcat server. This field is not displayed if no alarm is generated by the Tomcat server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Tomcat server.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Tomcat server in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Tomcat server in the last 30 days.

·     Available Time—Total amount of time that the Tomcat server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Tomcat server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Tomcat server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Tomcat server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Performance

The Performance area contains the following fields:

·     Response Time—Round-trip response time of the Tomcat server. Click the History Record icon icon_history_16x16.png for a monitor index to view the history graph of the response time.

·     Traffic—Total number of bytes received and sent by the Tomcat server since the Tomcat server started. Click the History Record icon icon_history_16x16.png for a monitor index to view the history graph of the traffic trend.

Memory Usage

The Memory Usage area contains the following fields:

·     Total Memory—Total memory allocated to the Tomcat server by the operating system.

·     In UseUsed memory of the Tomcat server. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage trend of the Tomcat server.

·     Free Space—Free memory of the Tomcat server.

Application Traffic

APM collects the traffic statistics of the Tomcat server based on the IP address and port number of Tomcat server host. The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Tomcat server over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Tomcat server since 00:00 today.

Thread

The Thread area contains the following fields:

·     Total Requests—Total number of requests the Tomcat server had received since the server started. Click the History Record icon icon_history_16x16.png for a monitor index to view history trend statistics of the total requests.

·     Successes—Total number of requests the Tomcat server had received and responded to since the server started.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of successful requests.

¡     Click the History Record icon icon_history_16x16.png for a monitor index to view history trend statistics of the successful requests.

·     Errors—Total number of requests the Tomcat server had failed to respond to since the server started. Click the History Record icon icon_history_16x16.png for a monitor index to view history trend statistics of the request errors.

Web Application

The Web Application area contains the following fields:

·     Application Name—Name of the Web application deployed on the Tomcat server. Click the name of a Web application (/docs in this example) to view its details.

¡     URL—Web page and servlet of the Web application.

¡     NameName of the Web application to which the URL belongs.

¡     JSP Requests—Number of JSP requests received by the URL since the Tomcat server started.

¡     Error Requests—Number of requests the URL received but failed to respond to.

¡     Response Time—Total time taken by the URL to receive, execute, and respond to the request.

·     Active Sessions—Number of active sessions in the Web application. Click the History Record icon icon_history_16x16.png for a Web application to view the history graph of the active session count trend of the application.

Lync Server 2010

Lync 2010 is a C/S model communication application offered by Microsoft. Lync 2010 contains the client Lync 2010 and the server Lync Server 2010. APM supports monitoring Lync Server 2010 through WMI.

Adding a Lync Server 2010 application monitor

APM can locally or remotely monitor Lync Server 2010 applications through WMI. When you add a Lync Server 2010 application monitor, follow these restrictions and guidelines:

·     Configure and enable WMI on the hosts where Lync Server 2010 is deployed. For more information about enabling WMI on Windows, see Windows Server online help.

·     To locally monitor Lync Server 2010 applications, install agents on the hosts where Lync Server 2010 applications are deployed. For more information about installing agents, see "APM agent management."

·     To remotely monitor Lync Server 2010 applications, obtain the username and password of the authorized Windows host administrator. The username and password are required for adding the application monitor.

·     Add Lync Server 2010 hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Lync Server 2010 application, make sure at least one probe is configured in APM. After a Lync Server 2010 application monitor is added, APM sends the IP address and service port of the monitored Lync Server 2010 to the probes for traffic collection.

To add a Lync Server 2010 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Lync Server 2010 of the Application Server class.

The page for adding a Lync Server 2010 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Lync Server 2010 application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection PortEnter the traffic collection port number for Lync Server 2010. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Windows system administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Select the following Lync Server 2010 services to be monitored:

-     Lync Server Audio/Video Conferencing

-     Lync Server Audio/Video Edge

-     Lync Server Conferencing Announcement

-     Lync Server Call Detail Recording

-     Lync Server Call Park

-     Lync Server File Transfer Agent

-     Lync Server Master Replicator Agent

-     Lync Server Conferencing Attendant

-     Lync Server Data Conferencing

-     Lync Server IM Conferencing

-     Lync Server Mediation

-     Lync Server Bandwidth Policy Service

-     Lync Online Provisioning Service

-     Lync Server QoE Monitoring Service

-     Lync Server Replica Replicator Agent

-     Lync Server Response Group

-     Lync Server Web Conferencing Edge

-     World Wide Web Publishing Service

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Lync Server 2010 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Lync Server 2010 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Lync Server 2010 and operating system applications by IP address.

¡     Application GroupSpecify an application group for the Lync Server 2010 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Lync Server 2010 application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Lync Server 2010 application monitor. When the IP address of a monitored Lync Server 2010 application changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Lync Server 2010 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Lync Server 2010 application monitor you want to modify.

The page for modifying the Lync Server 2010 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Lync Server 2010 application monitor."

5.     Click OK.

Viewing the Lync Server 2010 application monitor report

After a Lync Server 2010 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Lync Server 2010 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Lync Server 2010 application monitor to display the report.

Figure 81 shows part of a Lync Server 2010 monitor report.

Figure 81 Part of a Lync Server 2010 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health state of the Lync Server 2010 application.

·     IP Address—IP address of the Lync Server 2010 host.

·     Application Type—Type of the monitored application, which is always Lync 2010 Server.

·     Last Polling Time—Time when APM last polled the Lync Server 2010 application.

·     RelationshipClick the Relationship icon  to view dependencies between the Lync Server 2010 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Lync Server 2010 application. This field is not displayed if no alarm was generated by the Lync Server 2010 application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Lync Server 2010 application.

¡     Click the Weekly History icon  to view the availability of the Lync Server 2010 application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Lync Server 2010 application in the last 30 days.

·     Available Time—Total amount of time that the Lync Server 2010 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Lync Server 2010 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Lync Server 2010 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Lync Server 2010 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the OS on the Lync Server 2010 host.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the OS, which corresponds to the physical memory bar.

·     Swap—Swap memory of the OS, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the Lync Server 2010 host by sending up to three ICMP packets. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the Lync Server 2010 application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

Mediation Server Health Indices

The Mediation Server Health Indices area contains the following field:

·     Audio Buffer Hits Per SecondTimes that the audio buffer is used per second. Click the Set Threshold icon  to set alarm thresholds for the audio buffer hits per second.

Mediation Server Relay

The Mediation Server Relay area contains the following field:

·     Number of Rx Audio Channels StartedTotal number of Rx audio channels started by all components of the Lync Server 2010 application. Click the Set Threshold icon  to set alarm thresholds for the number of Rx audio channels started per second.

USrv Server Aggregation

The USrv Server Aggregation area contains the following field:

·     Number of Aggregation Requests Per SecondNumber of aggregation requests received by the Lync Server 2010 application per second.

A/V MCU

The A/V MCU area contains the following fields:

·     Number of ConferencesNumber of conferences on the A/V conference server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of conferences.

·     Number of UsersTotal number of users on the A/V conference server.

·     Number of TrustedUsersTotal number of trusted users on the A/V conference server. Click the Set Threshold icon  to set alarm thresholds for the number of trusted users.

USrv Service

The USrv Service area contains the following field:

·     MWI NOTIFYs Received Per SecondTotal number of MWI notifications received by all users per second.

IM MCU Health and Performance

The IM MCU Health and Performance area contains the following field:

·     MCU Health StatusHealth state of the IM MCU.

Service

The Service area contains the following fields:

·     Service NameOriginal name of the Lync Server 2010 system service.

·     Display NameAlias name of the service, which is displayed on the Windows service console. Typically, the display name of a service is different from its service name. You can recognize the service function by its service name.

·     StateState of the system service.

Process

By default, APM does not monitor any processes, and the process list is empty. Click the Config icon  to select the processes to be monitored. APM collects CPU and memory usages for the selected processes.

The Process area contains the following fields:

·     Process NameName of the process.

·     CLI—Command lines used to start the process.

·     CPU Usage—CPU usage of the process.

¡     Click the Set Threshold icon  to set CPU usage alarm thresholds.

¡     Click the History Record icon icon_history_16x16.png to view the CPU usage history graph.

·     Memory Usage—Memory usage of the process. Click the History Record icon icon_history_16x16.png for the process to view the memory usage history graph.

A/V Auth Requests

The A/V Auth Requests area contains the following fields:

·     Credentials Issued Per SecondNumber of credentials issued by the A/V identity authentication service per second.

·     Bad Requests Received Per SecondNumber of incorrect requests received by the A/V identity authentication service per second.

·     Current Requests ServicedNumber of requests that are being processed by the A/V identity authentication service.

SIP Networking

The SIP Networking area contains the following field:

·     Connections Refused for Server OverloadNumber of user connections refused by the Lync Server 2010 application due to overload.

PDP TURN

The PDP TURN area contains the following fields:

·     Active Client ConnectionsNumber of active client connections.

·     Client Authentication Time Out Failures Per SecondNumber of clients that failed to be authenticated due to timeout per second.

·     First Packet Time Outs Per SecondNumber of sessions with the first packet timed out per second.

·     Active Edge ConnectionsNumber of active edge connections.

·     Server Authentication Time Out Failures Per SecondNumber of client connections that failed to be authenticated due to server timeout per second.

IM MCU Conferences

The IM MCU Conferences area contains the following fields:

·     Active ConferencesNumber of active conferences.

·     Connected UsersNumber of users connected to the IM MCU.

·     Throttled Sip ConnectionsNumber of SIP connections disconnected from the IM MCU. Click the Set Threshold icon  to set alarm thresholds for disconnected SIP connections.

MCU Data Conferences

The MCU Data Conferences area contains the following fields:

·     Blocked FilesNumber of files blocked by the file transfer filter.

·     Active ConferencesNumber of active conferences.

·     Number of Unhandled Application ExceptionNumber of application exceptions that have not been handled.

·     Conference Workitems LoadDuration for processing tasks in the conference queue.

·     Session Queues StateState of the session queue.

·     Avg Time Queued in Data MCU for LDMAverage time that LDM messages wait in the data MCU queue.

·     Total Data Archiving Events RecordedTotal number of data archiving event records.

QMS Agent QoE Monitor Server

The QMS Agent QoE Monitor Server area contains the following fields:

·     Number of Metrics Reports Received Per SecondNumber of QoE metrics reports sent by the QoE monitor agent per second.

·     Number of Metrics Reports Accepted Per SecondNumber of QoE metrics reports received by the QoE monitor agent per second.

·     Number of Metrics Reports Rejected Per SecondNumber of QoE metrics reports rejected by the QoE monitor agent per second.

·     Number of Msg Queue Messages Sent Per SecondNumber of MSMQ messages sent from the QoE monitor agent to the Lync monitor server per second.

·     Number of Msg Queue Messages Unable to Be SentNumber of MSMQ messages discarded by the QoE monitor agent per second because they failed to be sent to the Lync monitor server.

PDP Diagnostics

The PDP Diagnostics area contains the following fields:

·     Messages Dropped Per SecondNumber of messages discarded due to invalidity or resolution failure per second.

·     Average Task Processing Time MillisecondsAverage processing time for valid tasks.

Endpoint Cache

The Endpoint Cache area contains the following field:

·     Active Registered EndpointsNumber of active Lync clients connected to the Lync server.

SIP Peers

The SIP Peers area contains the following fields:

·     Connections ActiveNumber of active connections on the current server. Click the Set Threshold icon  to set alarm thresholds for active connections.

·     Sends Out StandingTotal number of messages waiting to be sent in the sending queue on the current server.

SIP Protocol

The SIP Protocol area contains the following field:

·     Messages in ServerNumber of messages that are being processed by the Lync Server 2010 application.

A/V MCU Information

The A/V MCU Information area contains the following fields:

·     Total MRAS RequestTotal number of MRAS requests received by the Lync Server 2010 application.

·     Total MRAS Request ErrorTotal number of error MRAS requests received by the Lync Server 2010 application.

·     Total MRAS Request RejectedTotal number of MRAS requests rejected by the Lync Server 2010 application.

·     Total MRAS Time Out ExceptionsTotal number of MRAS exceptions due to timeout.

·     Total MRAS Failure Response ExceptionsTotal number of MRAS exceptions due to response failure.

·     Total MRAS Real Time ExceptionsTotal number of realtime MRAS exceptions.

·     Total MRAS Generic ExceptionsTotal number of general MRAS exceptions.

MEDIA Planning

The MEDIA Planning area contains the following field:

·     Occasions Conference Processing DelayedNumber of conference processes that need to be delayed.

SipEps Connections

The SipEps Connections area contains the following field:

·     Number of DNS Resolution FailuresNumber of domain name resolution failures.

Update Endpoint SPROC

The Update Endpoint SPROC area contains the following field:

·     SPROC Calls Per SecondTimes that the RtcUpdateEndpoint storage process is called per second.

Get Presence SPROC

The Get Presence SPROC area contains the following field:

·     SPROC Calls Per SecondTimes that the RtcGetPresence storage process is called per second.

Pool Conference Statistics

The Pool Conference Statistics area contains the following fields:

·     Conference CountNumber of conferences in the conference pool.

·     Active Conference CountNumber of active conferences in the conference pool.

·     Active Participant CountNumber of valid participants for all conferences in the conference pool.

·     Active Focus Endpoint CountNumber of valid terminals for all conferences in the conference pool.

·     Active MCU Session CountNumber of valid MCU sessions.

WEB Address Book Web Query

The WEB Address Book Web Query area contains the following fields:

·     Successful Query Requests Per SecondNumber of successful query requests per second when the Lync user queries the address book through Web.

·     Failed Query Requests Per SecondNumber of query request failures per second when the Lync user queries the address book through Web.

WEB Distribution List Expansion

The WEB Distribution List Expansion area contains the following fields:

·     Valid User Requests Per SecondNumber of successful query requests per second when the Lync user queries the address book through Web.

·     Timed Out Active Directory Requests Per SecondNumber of query request failures per second when the Lync user queries the address book through Web.

·     Timed Out Requests Fetching Member Properties Per SecondNumber of expired requests for obtaining member attribute per second.

·     Soap Exceptions Per SecondNumber of SOAP exceptions generated per second.

Archiving Agent MSMQ

The Archiving Agent MSMQ area contains the following fields:

·     Archiving Messages Per SecondNumber of messages obtained by the archiving queue per second.

·     Archiving Message Bytes Per SecondBytes of messages obtained by the archiving queue per second.

·     Call Details Recording Messages Per SecondNumber of call messages recorded by the CDR queue per second.

·     Call Details Recording Message Bytes Per SecondBytes of call messages recorded by the CDR queue per second.

Join Launcher Service

The Join Launcher Service area contains the following fields:

·     Incoming Join RequestsNumber of requests for joining conference.

·     Join FailuresNumber of failed connections for joining conference.

·     Join SuccessesNumber of successful connections for joining conference.

·     Join Failures Due To Base URL Lookup Failure in SQUIDNumber of connection failures resulted from the failure to search the URL library in SQUID.

·     Join Failures Due To Look Up User FailureNumber of connection failures resulted from the failure to search users.

MCU Factory

The MCU Factory area contains the following fields:

·     Total Get MCU Requests ReceivedNumber of GetMCU requests received by the Lync Server 2010 application.

·     Total Get MCU Requests FailedNumber of invalid GetMCU requests received by the Lync Server 2010 application.

·     Total Empty Get MCU ResponsesNumber of empty GetMCU requests received by the Lync Server 2010 application.

·     Get MCU Requests Received Per SecondNumber of GetMCU requests received by the Lync Server 2010 application per second.

·     Total Health Notifications ReceivedTotal number of health status notifications received by the Lync Server 2010 application.

·     Total Health Notifications FailedTotal number of invalid health status notifications received by the Lync Server 2010 application.

·     Health Notifications Received Per SecondNumber of health status notifications received by the Lync Server 2010 application per second.

·     Total Drain Requests ReceivedTotal number of drain requests received by the Lync Server 2010 application.

Rich Presence Subscribe SQL Calls

The Rich Presence Subscribe SQL Calls area contains the following fields:

·     Rtc BatchSubscribeCategoryList SPROC Calls Per SecondTimes that the RtcBatchSubscribeCategoryList storage process is called per second.

·     Rtc Subscribe Self SPROC Calls Per SecondTimes that the RtcSubscribeSelf storage process is called per second.

·     Rtc Batch Query Categories SPROC Calls Per SecondTimes that the RtcBatchQueryCategories storage process is called per second.

Rich Presence Service SQL Calls

The Rich Presence Service SQL Calls area contains the following field:

·     Rtc Publish Multi-Category SPROC Calls Per SecondTimes that the RtcPublishMutipleCategories storage process is called per second.

Response Group Service Hosting

The Response Group Service Hosting area contains the following field:

·     Total Incoming Calls Declined for Match Marking FailureNumber of incoming calls declined due to the service matching failure of the requests.

CAA Planning

The CAA Planning area contains the following fields:

·     Total Incomplete CallsTotal number of incomplete calls that are sent to the conference assistant.

·     Current CallsNumber of calls that are sent to the conference assistant. Click the History Record icon icon_history_16x16.png to view the history graph of current calls.

·     Total Calls Failed To Transfer To The ConferenceTotal number of calls that failed to be transferred to the conference by the conference assistant.

·     Total Band Width FailuresTotal number of failed calls due to the bandwidth problem.

·     Total Calls With Three Conference ID Input ErrorsNumber of calls for which the conference assistant receives three incorrect conference IDs.

·     Total Application Endpoint Creation FailuresTotal number of application endpoints that failed to be created.

·     Total Application Endpoint Termination FailuresTotal number of application endpoints that failed to be terminated.

·     Number of Times Retry Logic Was TriggeredTimes that the conference assistant triggers the retry logic called by the UCMA.

·     Number of Times Retry Logic Was SuccessfulTimes that the conference assistant triggers and successfully executes the retry logic called by the UCMA.

AS MCU Health And Performance

The AS MCU Health And Performance area contains the following field:

·     Health StatusHealth state of the AS MCU.

AS MCU Conferences

The AS MCU Conferences area contains the following fields:

·     Active ConferencesNumber of active conferences.

·     Active TranscodersNumber of active transcoders.

·     Active Data ChannelsNumber of active media connections.

·     Connected UsersNumber of AS MCU users.

¡     Click the Set Threshold icon  to set alarm thresholds for connected users.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of connected users.

·     Active Ajax ViewersNumber of active Ajax viewers.

·     Media Time Out FailuresNumber of media timeouts in the AS MCU.

·     Packet Loss FailureNumber of packet losses in the AS MCU.

·     Sip Dialog FailuresNumber of SIP session errors in the AS MCU.

·     Rdp Connection Time Out FailuresNumber of RDP connection timeouts in the AS MCU.

Response Call Control

The Response Call Control area contains the following fields:

·     Total Incoming Calls Declined for Memory PressureNumber of incoming calls declined due to insufficient system memory from the startup of the Lync Server 2010 application to the most recent polling operation. Click the Set Threshold icon  to set alarm thresholds for incoming calls declined due to insufficient system memory.

·     Total Incoming Calls Declined for High Number of Active CallsNumber of incoming calls declined due excessive active calls from the startup of the Lync Server 2010 application to the most recent polling operation.

Response Match Making

The Response Match Making area contains the following field:

·     Current Number of CallsNumber of calls that are being processed by the response group service.

Response Work Flow

The Response Work Flow area contains the following field:

·     Calls That Failed Due To Critical Server ErrorsNumber of call failures caused by server error.

CAA Operations

The CAA Operations area contains the following field:

·     In Complete Calls Per SecondNumber of incomplete calls that are sent to the conference assistant per second.

SIP Responses

The SIP Responses area contains the following fields:

·     Local 500 Responses Per SecondNumber of 500 responses received by the Lync Server 2010 application per second.

·     Local 503 Responses Per SecondNumber of 503 responses received by the Lync Server 2010 application per second.

SIP Load Management

The SIP Load Management area contains the following fields:

·     Incoming Messages Timed OutNumber of incoming messages whose maximum tracing time is exceeded on the Lync Server 2010 application.

·     Address Space UsagePercentage of available address space that is being used by the Lync Server 2010 application.

SIP Access Edge Server Connections

The SIP Access Edge Server Connections area contains the following field:

·     Rejected External Edge Client Connections Per SecondNumber of client connections rejected due to remote access denial on the external edge per second. Click the Set Threshold icon  to set alarm thresholds for client connections rejected due to remote access denial on the external edge per second.

SIP Access Edge Server Message

The SIP Access Edge Server Message area contains the following fields:

·     Messages Per Second Dropped Due To Unknown DomainNumber of messages that failed to be routed because the message domain is not configured and the messages are not the alliance partners.

·     External Messages Per Second Dropped for Unresolved DomainNumber of messages discarded on the external edge due to domain resolution failure.

Lync Server 2013

Lync 2013 is a C/S model communication application offered by Microsoft. Lync 2013 contains the client Lync 2013 and the server Lync Server 2013. APM supports monitoring Lync Server 2013 through WMI.

Adding a Lync Server 2013 application monitor

APM can locally or remotely monitor Lync Server 2013 applications through WMI. When you add a Lync Server 2013 application monitor, follow these restrictions and guidelines:

·     Configure and enable WMI on the hosts where Lync Server 2013 is deployed. For more information about enabling WMI on Windows, see Windows Server online help.

·     To locally monitor Lync Server 2013 applications, install agents on the hosts where Lync Server 2013 applications are deployed. For more information about installing agents, see "APM agent management."

·     To remotely monitor Lync Server 2013 applications, obtain the username and password of the authorized Windows host administrator. The username and password are required for adding the application monitor.

·     Add Lync Server 2013 hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Lync Server 2013 application, make sure at least one probe is configured in APM. After a Lync Server 2013 application monitor is added, APM sends the IP address and service port of the monitored Lync Server 2013 to the probes for traffic collection.

To add a Lync Server 2013 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Lync Server 2013 of the Application Server class.

The page for adding a Lync Server 2013 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Lync Server 2013 application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection PortEnter the traffic collection port number for Lync Server 2013. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Windows system administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Select the following Lync Server 2013 services to be monitored:

-     Lync Server Front-End

-     Lync Server Application Sharing

-     Lync Server Archiving

-     Lync Online Telephony Conferencing

-     Lync Server Audio/Video Authentication

-     Lync Server Audio/Video Conferencing

-     Lync Server Audio/Video Edge

-     Lync Server Conferencing Announcement

-     Lync Server Call Detail Recording

-     Lync Server Call Park

-     Lync Server File Transfer Agent

-     Lync Server Master Replicator Agent

-     Lync Server Conferencing Attendant

-     Lync Server Data Conferencing

-     Lync Server IM Conferencing

-     Lync Server Mediation

-     Lync Server Bandwidth Policy Service

-     Lync Online Provisioning Service

-     Lync Server QoE Monitoring Service

-     Lync Server Replica Replicator Agent

-     Lync Server Response Group

-     Lync Server Web Conferencing Edge

-     World Wide Web Publishing Service

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Lync Server 2013 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Lync Server 2013 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Lync Server 2013 and operating system applications by IP address.

¡     Application GroupSpecify an application group for the Lync Server 2013 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Lync Server 2013 application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Lync Server 2013 application monitor. When the IP address of a monitored Lync Server 2013 application changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Lync Server 2013 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Lync Server 2013 application monitor you want to modify.

The page for modifying the Lync Server 2013 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Lync Server 2013 application monitor."

5.     Click OK.

Viewing the Lync Server 2013 application monitor report

After a Lync Server 2013 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Lync Server 2013 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Lync Server 2013 application monitor to display the report.

Figure 82 shows part of a Lync Server 2013 monitor report.

Figure 82 Part of a Lync Server 2013 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health state of the Lync Server 2013 application.

·     IP Address—IP address of the Lync Server 2013 host.

·     Application Type—Type of the monitored application, which is always Lync 2013 Server.

·     Last Polling Time—Time when APM last polled the Lync Server 2013 application.

·     RelationshipClick the Relationship icon  to view dependencies between the Lync Server 2013 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Lync Server 2013 application. This field is not displayed if no alarm was generated by the Lync Server 2013 application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Lync Server 2013 application.

¡     Click the Weekly History icon  to view the availability of the Lync Server 2013 application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Lync Server 2013 application in the last 30 days.

·     Available Time—Total amount of time that the Lync Server 2013 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Lync Server 2013 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Lync Server 2013 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Lync Server 2013 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the OS on the Lync Server 2013 host.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the OS, which corresponds to the physical memory bar.

·     Swap—Swap memory of the OS, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory x 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

When the polling interval expires, APM pings the Lync Server 2013 host by sending up to three ICMP packets. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Round trip response time of the Lync Server 2013 application in the last ping operation. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets that are sent in the last ping operation. The maximum value is 3. Click the History Record icon icon_history_16x16.png to view the history graph of the sent packets.

·     Packets Received—Number of ICMP response packets that are received in the last ping operation. The value is 0 or 1. Click the History Record icon icon_history_16x16.png to view the history graph of the received packets.

Mediation Server Health Indices

The Mediation Server Health Indices area contains the following field:

·     Audio Buffer Hits Per SecondTimes that the audio buffer is used per second. Click the Set Threshold icon  to set alarm thresholds for the audio buffer hits per second.

Mediation Server Relay

The Mediation Server Relay area contains the following field:

·     Number of Rx Audio Channels StartedTotal number of Rx audio channels started by all components of the Lync Server 2013 application. Click the Set Threshold icon  to set alarm thresholds for the number of Rx audio channels started per second.

USrv Server Aggregation

The USrv Server Aggregation area contains the following field:

·     Number of Aggregation Requests Per SecondNumber of aggregation requests received by the Lync Server 2013 application per second.

A/V MCU

The A/V MCU area contains the following fields:

·     Number of ConferencesNumber of conferences on the A/V conference server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of conferences.

·     Number of UsersTotal number of users on the A/V conference server.

·     Number of TrustedUsersTotal number of trusted users on the A/V conference server. Click the Set Threshold icon  to set alarm thresholds for the number of trusted users.

USrv Service

The USrv Service area contains the following field:

·     MWI NOTIFYs Received Per SecondTotal number of MWI notifications received by all users per second.

IM MCU Health and Performance

The IM MCU Health and Performance area contains the following field:

·     MCU Health StatusHealth state of the IM MCU.

Service

The Service area contains the following fields:

·     Service NameOriginal name of the Lync Server 2013 system service.

·     Display NameAlias name of the service, which is displayed on the Windows service console. Typically, the display name of a service is different from its service name. You can recognize the service function by its service name.

·     StateState of the system service.

Process

By default, APM does not monitor any processes, and the process list is empty. Click the Config icon  to select the processes to be monitored. APM collects CPU and memory usages for the selected processes.

The Process area contains the following fields:

·     Process NameName of the process.

·     CLI—Command line used to start the process.

·     CPU Usage—CPU usage of the process.

¡     Click the Set Threshold icon  to set CPU usage alarm thresholds.

¡     Click the History Record icon icon_history_16x16.png to view the CPU usage history graph.

·     Memory Usage—Memory usage of the process. Click the History Record icon icon_history_16x16.png for the process to view the memory usage history graph.

A/V Auth Requests

The A/V Auth Requests area contains the following fields:

·     Credentials Issued Per SecondNumber of credentials issued by the A/V identity authentication service per second.

·     Bad Requests Received Per SecondNumber of incorrect requests received by the A/V identity authentication service per second.

·     Current Requests ServicedNumber of requests that are being processed by the A/V identity authentication service.

SIP Networking

The SIP Networking area contains the following field:

·     Connections Refused for Server OverloadNumber of user connections refused by the Lync Server 2013 application due to overload.

PDP TURN

The PDP TURN area contains the following fields:

·     Active Client ConnectionsNumber of active client connections.

·     Client Authentication Time Out Failures Per SecondNumber of clients that failed to be authenticated due to timeout per second.

·     First Packet Time Outs Per SecondNumber of sessions with the first packet timed out per second.

·     Active Edge ConnectionsNumber of active edge connections.

·     Server Authentication Time Out Failures Per SecondNumber of client connections that failed to be authenticated due to server timeout per second.

IM MCU Conferences

The IM MCU Conferences area contains the following fields:

·     Active ConferencesNumber of active conferences.

·     Connected UsersNumber of users connected to the IM MCU.

·     Throttled Sip ConnectionsNumber of SIP connections disconnected from the IM MCU. Click the Set Threshold icon  to set alarm thresholds for disconnected SIP connections.

MCU Data Conferences

The MCU Data Conferences area contains the following fields:

·     Blocked FilesNumber of files blocked by the file transfer filter.

·     Active ConferencesNumber of active conferences.

·     Number of Unhandled Application ExceptionNumber of application exceptions that have not been handled.

·     Conference Workitems LoadDuration for processing tasks in the conference queue.

·     Session Queues StateState of the session queue.

·     Avg Time Queued in Data MCU for LDMAverage time that LDM messages wait in the data MCU queue.

·     Total Data Archiving Events RecordedTotal number of data archiving event records.

QMS Agent QoE Monitor Server

The QMS Agent QoE Monitor Server area contains the following fields:

·     Number of Metrics Reports Received Per SecondNumber of QoE metrics reports sent by the QoE monitor agent per second.

·     Number of Metrics Reports Accepted Per SecondNumber of QoE metrics reports received by the QoE monitor agent per second.

·     Number of Metrics Reports Rejected Per SecondNumber of QoE metrics reports rejected by the QoE monitor agent per second.

·     Number of Msg Queue Messages Sent Per SecondNumber of MSMQ messages sent from the QoE monitor agent to the Lync monitor server per second.

·     Number of Msg Queue Messages Unable to Be SentNumber of MSMQ messages discarded by the QoE monitor agent per second because they failed to be sent to the Lync monitor server.

PDP Diagnostics

The PDP Diagnostics area contains the following fields:

·     Messages Dropped Per SecondNumber of messages discarded due to invalidity or resolution failure per second.

·     Average Task Processing Time MillisecondsAverage processing time for valid tasks.

Endpoint Cache

The Endpoint Cache area contains the following field:

·     Active Registered EndpointsNumber of active Lync clients connected to the Lync server.

SIP Peers

The SIP Peers area contains the following fields:

·     Connections ActiveNumber of active connections on the current server. Click the Set Threshold icon  to set alarm thresholds for active connections.

·     Sends Out StandingTotal number of messages waiting to be sent in the sending queue on the current server.

SIP Protocol

The SIP Protocol area contains the following field:

·     Messages in ServerNumber of messages that are being processed by the Lync Server 2013 application.

A/V MCU Information

The A/V MCU Information area contains the following fields:

·     Total MRAS RequestTotal number of MRAS requests received by the Lync Server 2013 application.

·     Total MRAS Request ErrorTotal number of error MRAS requests received by the Lync Server 2013 application.

·     Total MRAS Request RejectedTotal number of MRAS requests rejected by the Lync Server 2013 application.

·     Total MRAS Time Out ExceptionsTotal number of MRAS exceptions due to timeout.

·     Total MRAS Failure Response ExceptionsTotal number of MRAS exceptions due to response failure.

·     Total MRAS Real Time ExceptionsTotal number of realtime MRAS exceptions.

·     Total MRAS Generic ExceptionsTotal number of general MRAS exceptions.

MEDIA Planning

The MEDIA Planning area contains the following field:

·     Occasions Conference Processing DelayedNumber of conference processes that need to be delayed.

SipEps Connections

The SipEps Connections area contains the following field:

·     Number of DNS Resolution FailuresNumber of domain name resolution failures.

Update Endpoint SPROC

The Update Endpoint SPROC area contains the following field:

·     SPROC Calls Per SecondTimes that the RtcUpdateEndpoint storage process is called per second.

Get Presence SPROC

The Get Presence SPROC area contains the following field:

·     SPROC Calls Per SecondTimes that the RtcGetPresence storage process is called per second.

Pool Conference Statistics

The Pool Conference Statistics area contains the following fields:

·     Conference CountNumber of conferences in the conference pool.

·     Active Conference CountNumber of active conferences in the conference pool.

·     Active Participant CountNumber of valid participants for all conferences in the conference pool.

·     Active Focus Endpoint CountNumber of valid terminals for all conferences in the conference pool.

·     Active MCU Session CountNumber of valid MCU sessions.

WEB Address Book Web Query

The WEB Address Book Web Query area contains the following fields:

·     Successful Query Requests Per SecondNumber of successful query requests per second when the Lync user queries the address book through Web.

·     Failed Query Requests Per SecondNumber of query request failures per second when the Lync user queries the address book through Web.

WEB Distribution List Expansion

The WEB Distribution List Expansion area contains the following fields:

·     Valid User Requests Per SecondNumber of successful query requests per second when the Lync user queries the address book through Web.

·     Timed Out Active Directory Requests Per SecondNumber of expired active directory requests per second when the Lync user queries the address book through Web.

·     Timed Out Requests Fetching Member Properties Per SecondNumber of query request failures per second when the Lync user queries the address book through Web.

·     Soap Exceptions Per SecondNumber of SOAP exceptions generated per second.

Archiving Agent MSMQ

The Archiving Agent MSMQ area contains the following fields:

·     Archiving Messages Per SecondNumber of messages obtained by the archiving queue per second.

·     Archiving Message Bytes Per SecondBytes of messages obtained by the archiving queue per second.

·     Call Details Recording Messages Per SecondNumber of call messages recorded by the CDR queue per second.

·     Call Details Recording Message Bytes Per SecondBytes of call messages recorded by the CDR queue per second.

Join Launcher Service

The Join Launcher Service area contains the following fields:

·     Incoming Join RequestsNumber of requests for joining conference.

·     Join FailuresNumber of failed connections for joining conference.

·     Join SuccessesNumber of successful connections for joining conference.

·     Join Failures Due To Base URL Lookup Failure in SQUIDNumber of connection failures resulted from the failure to search the URL library in SQUID.

·     Join Failures Due To Look Up User FailureNumber of connection failures resulted from the failure to search users.

MCU Factory

The MCU Factory area contains the following fields:

·     Total Get MCU Requests ReceivedNumber of GetMCU requests received by the Lync Server 2013 application.

·     Total Get MCU Requests FailedNumber of invalid GetMCU requests received by the Lync Server 2013 application.

·     Total Empty Get MCU ResponsesNumber of empty GetMCU requests received by the Lync Server 2013 application.

·     Get MCU Requests Received Per SecondNumber of GetMCU requests received by the Lync Server 2013 application per second.

·     Total Health Notifications ReceivedTotal number of health status notifications received by the Lync Server 2013 application.

·     Total Health Notifications FailedTotal number of invalid health status notifications received by the Lync Server 2013 application.

·     Health Notifications Received Per SecondNumber of health status notifications received by the Lync Server 2013 application per second.

·     Total Drain Requests ReceivedTotal number of drain requests received by the Lync Server 2013 application.

Rich Presence Subscribe SQL Calls

The Rich Presence Subscribe SQL Calls area contains the following fields:

·     Rtc BatchSubscribeCategoryList SPROC Calls Per SecondTimes that the RtcBatchSubscribeCategoryList storage process is called per second.

·     Rtc Subscribe Self SPROC Calls Per SecondTimes that the RtcSubscribeSelf storage process is used per second.

·     Rtc Batch Query Categories SPROC Calls Per SecondTimes that the RtcBatchQueryCategories storage process is called per second.

Rich Presence Service SQL Calls

The Rich Presence Service SQL Calls area contains the following field:

·     Rtc Publish Multi-Category SPROC Calls Per SecondTimes that the RtcPublishMutipleCategories storage process is called per second.

Response Group Service Hosting

The Response Group Service Hosting area contains the following field:

·     Total Incoming Calls Declined for Match Marking FailureNumber of incoming calls declined due to the service matching failure of the requests.

CAA Planning

The CAA Planning area contains the following fields:

·     Total Incomplete CallsTotal number of incomplete calls that are sent to the conference assistant.

·     Current CallsNumber of calls that are sent to the conference assistant. Click the History Record icon icon_history_16x16.png to view the history graph of current calls.

·     Total Calls Failed To Transfer To The ConferenceTotal number of calls that failed to be transferred to the conference by the conference assistant.

·     Total Band Width FailuresTotal number of failed calls due to the bandwidth problem.

·     Total Calls With Three Conference ID Input ErrorsNumber of calls for which the conference assistant receives three incorrect conference IDs.

·     Total Application Endpoint Creation FailuresTotal number of application endpoints that failed to be created.

·     Total Application Endpoint Termination FailuresTotal number of application endpoints that failed to be terminated.

·     Number of Times Retry Logic Was TriggeredTimes that the conference assistant triggers the retry logic called by the UCMA.

·     Number of Times Retry Logic Was SuccessfulTimes that the conference assistant triggers and successfully executes the retry logic called by the UCMA.

AS MCU Health And Performance

The AS MCU Health And Performance area contains the following field:

·     Health StatusHealth state of the AS MCU.

AS MCU Conferences

The AS MCU Conferences area contains the following fields:

·     Active ConferencesNumber of active conferences.

·     Active TranscodersNumber of active transcoders.

·     Active Data ChannelsNumber of active media connections.

·     Connected UsersNumber of AS MCU users.

¡     Click the Set Threshold icon  to set alarm thresholds for connected users.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of connected users.

·     Active Ajax ViewersNumber of active Ajax viewers.

·     Media Time Out FailuresNumber of media timeouts generated in the AS MCU.

·     Packet Loss FailureNumber of packet losses generated in the AS MCU.

·     Sip Dialog FailuresNumber of SIP session errors generated in the AS MCU.

·     Rdp Connection Time Out FailuresNumber of RDP connection timeouts generated in the AS MCU.

Response Call Control

The Response Call Control area contains the following fields:

·     Total Incoming Calls Declined for Memory PressureNumber of incoming calls declined due to insufficient system memory from the startup of the Lync Server 2013 application to the most recent polling operation. Click the Set Threshold icon  to set alarm thresholds for incoming calls declined due to insufficient system memory.

·     Total Incoming Calls Declined for High Number of Active CallsNumber of incoming calls declined due to excessive active calls from the startup of the Lync Server 2013 application to the most recent polling operation.

Response Match Making

The Response Match Making area contains the following field:

·     Current Number of CallsNumber of calls that are being processed by the response group service.

Response Work Flow

The Response Work Flow area contains the following field:

·     Calls That Failed Due To Critical Server ErrorsNumber of call failures caused by server error.

CAA Operations

The CAA Operations area contains the following field:

·     In Complete Calls Per SecondNumber of incomplete calls that are sent to the conference assistant per second.

SIP Responses

The SIP Responses area contains the following fields:

·     Local 500 Responses Per SecondNumber of 500 responses received by the Lync Server 2013 application per second.

·     Local 503 Responses Per SecondNumber of 503 responses received by the Lync Server 2013 application per second.

SIP Load Management

The SIP Load Management area contains the following fields:

·     Incoming Messages Timed OutNumber of incoming messages whose maximum tracing time is exceeded on the Lync Server 2013 application.

·     Address Space UsagePercentage of available address space that is being used by the Lync Server 2013 application.

SIP Access Edge Server Connections

The SIP Access Edge Server Connections area contains the following field:

·     Rejected External Edge Client Connections Per SecondNumber of client connections rejected due to remote access denial on the external edge per second. Click the Set Threshold icon  to set alarm thresholds for client connections rejected due to remote access denial on the external edge per second.

SIP Access Edge Server Message

The SIP Access Edge Server Message area contains the following fields:

·     Messages Per Second Dropped Due To Unknown DomainNumber of messages that failed to be routed because the message domain is not configured and the messages are not the alliance partners.

·     External Messages Per Second Dropped for Unresolved Domain—Number of messages discarded on the external edge due to domain resolution failure.

Oracle Application Server

The Oracle Application Server (Oracle OS for short) forms part of Oracle Corporation's Fusion Middleware portfolio and supports various programming languages, APIs, and frameworks.

Configuring the Oracle AS

APM monitors the Oracle AS through the Dynamic Monitoring Service (DMS) provided by the Oracle AS. For this reason, the DMS must be made accessible to the APM server. To enable the access, complete the following tasks:

1.     Modify the DMS configuration file by changing the entries with the value <IMC IP> in the following text to IP address of the APM server:

# proxy to DMS AggreSpy

Redirect /dms0/AggreSpy http:// <IMC IP>:7200/dmsoc4j/AggreSpy

# DMS VirtualHost for access and logging control

Listen <IMC IP>:7200

OpmnHostPort http://<IMC IP>:7200

<VirtualHost <IMC IP>:7200>>

ServerName <IMC IP>

TransferLog "\\.\NUL"

The configuration file is located at %ORACLE_HOME%\Apache\Apache\conf\dms.conf on Windows operating systems, or $ORACLE_HOME/Apache/Apache/conf/dms.conf on Linux operating systems.

2.     Save the modified configuration file and then restart the Oracle AS.

 

 

NOTE:

You can check whether the Oracle Application Server is correctly configured to support APM access by connecting to the URL http://<Oracle AS IP>:<Port>/dmsoc4j/AggreSpy from the browser of the APM server.

 

Adding an Oracle AS application monitor

APM can only remotely monitor Oracle AS applications. When you add Oracle AS application monitors, follow these guidelines:

·     Configure the Oracle AS. For more information, see "Configuring the Oracle AS."

·     Add Oracle AS server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Oracle AS application, make sure at least one probe is configured in APM. After an Oracle AS application monitor is added, APM sends the IP address and service port of the monitored Oracle AS application to the probes for traffic collection.

To add an Oracle AS application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Oracle AS of the Application Server Monitor class.

The page for adding an Oracle AS application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Oracle AS application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Oracle AS application, TCP 8888 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for Oracle AS. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Oracle AS applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Oracle AS depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Oracle AS and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Oracle AS application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an Oracle AS application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Oracle AS application monitor. When the IP address of a monitored Oracle AS host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Oracle AS application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify iconicon_modify_16x16.png for the Oracle AS server application monitor you want to modify.

The page for modifying the Oracle AS server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Oracle AS application monitor."

5.     Click OK.

Viewing the Oracle AS application monitor report

After an Oracle AS application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Oracle AS server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Oracle AS application monitor to display the report.

Figure 83 shows part of an Oracle AS server application monitor report.

Figure 83 Part of an Oracle AS application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Oracle AS application.

·     IP Address—IP address of the Oracle AS application host.

·     Application Type—Type of the monitored application, which is always Oracle AS.

·     Last Polling Time—Time when APM last polled the Oracle AS application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Oracle AS application. This field is not displayed if no alarm is generated by the Oracle AS application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Oracle AS application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Oracle AS application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Oracle AS application in the last 30 days.

·     Available Time—Total amount of time that the Oracle AS application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Oracle AS application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Oracle AS application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Oracle AS application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round-trip response time of the Oracle AS application.

¡     Click the Set Threshold icon  to set alarm thresholds for the server response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time trend of the Oracle AS application.

OPMN Memory Details

The Oracle Process Manager and Notification Server (OPMN) is responsible for starting, stopping, and managing all the processes running on the Oracle Application Server.

The OPMN Memory Details area contains the following fields:

·     Memory Used Percent—Percentage of the used memory. The OPMN memory usage is equal to the used memory divided by the total physical memory and multiplied by 100%. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     Memory Used—Size of the memory used by the OPMN l. Click the History Record icon icon_history_16x16.png to view the history graph of the used memory.

·     Total Physical Memory—Total physical memory of the host where the Oracle AS application resides. Click the History Record icon icon_history_16x16.png to view the history graph of the total physical memory.

Application Traffic

APM collects the traffic statistics of the Oracle AS application based on the IP address and port number of Oracle AS application host. The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Oracle AS application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Oracle AS application since 00:00 today.

JVM Details

APM monitors the performance of the Java virtual machine (JVM) in which the Oracle AS application is running.

The JVM Details area contains the following fields:

·     Name—Name of the JVM.

·     Active Threads—Number of active threads of JVM. Click the History Record icon icon_history_16x16.png to view the changes of the number of active threads of JVM in a line graph.

·     CPU Usage—CPU usage of the JVM. Click the Set Threshold icon  to set alarm thresholds for the CPU usage of JVM.

·     Heap Usage—Heap memory usage of JVM.

·     JDBC Connections—Total number of open JDBC connections.

·     Memory Usage—Physical memory used by the JVM.

·     Active Sessions—Number of active sessions.

·     Active Transactions—Number of active transactions.

·     Start Time—Time when JVM last rebooted.

Web Application Details

The Web Application Details area contains the following fields:

·     Module Name—Module name of the Web application.

·     Application Name—Name of the Web application.

·     OC4J Instance Name—Name of the OC4J instance to which the Web application is deployed.

·     Requests Per Second—Number of requests per second received by the Web application.

·     Requests Completed—Total number of requests processed by the Web application since the Oracle AS application started to the last polling interval.

·     Active Requests—Number of active requests for the Web application.

·     Processing Time—Average time taken by the Web application to process the requests since the Oracle AS application started to the last polling interval.

·     Active Sessions—Number of active sessions in the Web application.

·     More—Click More to view all the Web applications deployed on the Oracle AS application in a separate window.

EJB Details

APM monitors all the EJBs (Enterprise JavaBeans) running on the Oracle AS application, including stateful beans, stateless beans, and message-driven beans. The EJB Details area contains the following fields:

·     EJB Name—Name of the EJB.

·     EAR Name—Name of the EAR file that the EJB is packaged in.

·     Process—Source process of the EJB.

·     Type—Type of the EJB, which can be Stateful, Stateless, or Message.

·     Pooled Instances—Total number of instances in Pooled state.

·     Ready Instances—Total number of instances in Ready state.

·     Passive Instances—Total number of instances in Passive state.

WebLogic server

The WebLogic server is a J2EE complaint application server used to develop, integrate, deploy, and manage large scale, distributed Web applications, network applications, and database applications.

Copying Weblogic API files to the APM server

APM obtains monitor index data of Weblogic server applications through Weblogic APIs. To monitor Weblogic server applications, contact the Weblogic administrator to copy Weblogic API files to the APM server.

Copying Weblogic API files to the APM server (for Weblogic server 8.1)

APM can only remotely monitor Weblogic server 8.1.

To copy Weblogic API files to the APM server:

1.     Log in to the Weblogic server operating system.

2.     Locate the weblogic.jar and webservices.jar Weblogic API files.

Typically, the Weblogic API files are located in the \server\lib\ directory of the Weblogic installation path.

3.     Copy the Weblogic API files to the \apmserver\bin\ directory of the IMC installation path.

4.     Restart IMC.

Copying Weblogic API files to the APM server (for Weblogic server 9.x/10.x/11.x/12.x)

APM can locally or remotely monitor Weblogic 9.x/10.x/11.x/12.x.

To copy Weblogic API files to the APM server:

1.     Log in to the Weblogic server operating system.

2.     Open a Windows command window.

3.     Enter the \server\lib\ directory of the Weblogic installation path.

4.     Generate the wlfullclient.jar file by executing the following command:

java -jar ../../../modules/com.bea.core.jarbuilder_x.jar

5.     Locate the weblogic.jar and wlfullclient.jar Weblogic API files.

Typically, the Weblogic API files are located in the \server\lib\ directory of the Weblogic installation path.

6.     Perform one of the following tasks:

¡     To remotely monitor Weblogic applications, copy the Weblogic API files to the \apmserver\bin\weblogicOther\ directory of the IMC installation path.

¡     To locally monitor Weblogic applications, copy the Weblogic API files to the \apm_agent_main_win\bin\ directory of the agent installation path and restart the agent.

7.     Restart IMC.

Adding a WebLogic server application monitor

When you add WebLogic server application monitors, follow these guidelines:

·     To locally monitor Weblogic servers of the 8.1 version, copy the Weblogic API files to the APM server. For more information, see "Copying Weblogic API files to the APM server (for Weblogic server 8.1)."

·     To locally or remotely monitor Weblogic servers of the 9.x, 10.x, 11.x, and 12.x versions, copy the Weblogic API files to the APM server. For more information, see "Copying Weblogic API files to the APM server (for Weblogic server 9.x/10.x/11.x/12.x)."

·     To locally monitor Weblogic server applications, install agents on the Windows or Linux operating systems where Weblogic server applications are deployed. For more information about installing agents, see "APM agent management."

·     Obtain the username and password of the user who has the Weblogic administrator's privileges so that APM can obtain monitor index data through Weblogic APIs from the WebLogic server.

·     Add the WebLogic server hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the WebLogic server application, make sure at least one probe is configured in APM. After a WebLogic server application monitor is added, APM sends the IP address and service port of the monitored WebLogic server application to the probes for traffic collection.

To add a WebLogic server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click WebLogic server of the Application Server Monitor class.

The page for adding a WebLogic server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Weblogic server application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Weblogic server application, TCP 7011 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for Weblogic server. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Weblogic administrator. The fields are available only when you select Disable from the Use Template list.

¡     Weblogic VersionSelect a Weblogic server version. Options are 8.1 and 9.x/10.x/11.x/12.x.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of WebLogic server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Weblogic server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Weblogic server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the WebLogic server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a WebLogic server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Weblogic server application monitor. When the IP address of a monitored Weblogic host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Weblogic server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify iconicon_modify_16x16.png for the Weblogic server application monitor you want to modify.

The page for modifying the Weblogic server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a WebLogic server application monitor."

5.     Click OK.

Viewing the WebLogic server application monitor report

After a Weblogic server application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Weblogic server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Weblogic server application monitor to display the report.

Figure 84 shows part of a Weblogic server application monitor report.

Figure 84 Part of a WebLogic server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the WebLogic server application.

·     IP Address—IP address of the Weblogic server application host.

·     Application Type—Type of the monitored application, which is always WebLogic Server.

·     Version—Version of the WebLogic server.

·     Last Polling Time—Time when APM last polled the WebLogic server application.

·     Relationship—Click the Relationship icon  to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management"

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Weblogic server application. This field is not displayed if no alarm is generated by the Weblogic server application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Weblogic server application.

¡     Click the Weekly History icon  to view the availability of the Weblogic server application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Weblogic server application in the last 30 days.

·     Available Time—Total amount of time that the Weblogic server application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Weblogic server application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Weblogic server application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Weblogic server application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

JVM Heap Memory Details

The correct operation of the Weblogic server application relies on the performance of the Java virtual machine (JVM) in which the server is running. The JVM Heap Memory Details area contains the following fields:

·     Total Memory—Total heap memory size that JVM requested from the operating system. Click the Set Threshold icon  to set alarm thresholds for the total memory.

·     Free MemorySize of free memory in the JVM heap. Click the Set Threshold icon  to set alarm thresholds for the free memory.

·     Used MemorySize of used memory in the JVM heap.

·     Max Memory—Maximum memory that JVM can request from the operating system.

·     PercentMemory usage of the JVM heap.

·     Java VersionJava version of JVM.

Thread

The Thread area contains the following fields:

·     Idle Count—Number of idle threads in the thread pool.

·     Used Count—Number of threads being used in the thread pool.

·     Total Count—Total number of threads in the thread pool.

·     Request Threads—Total number of request threads in the thread queue. Click the Set Threshold icon  to set alarm thresholds for the total number of request threads in the thread queue.

·     Active Execute ThreadsNumber of execute threads that are in active state.

·     Hogging ThreadsNumber of threads that are being hogged in the thread pool.

Response Time

The Response Time area contains the following field:

·     Response Time—Round-trip response time of the Weblogic server application.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Application Traffic

APM collects the traffic statistics of the Weblogic server application based on the IP address and port number of Weblogic server application host. The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic that is sent and received by the Weblogic server application over the last 1 hour.

·     Today's Traffic—Total traffic that is sent and received by the Weblogic server application since 00:00 today.

Web Application Details

The Web Application Details area contains the following fields:

·     Name—Name of the Web application.

·     Current Session—Number of sessions that were accessing the Web application.

·     Max. Session—Maximum number of sessions that can access the Web application.

·     Session Pool—Maximum number of sessions that are allowed in the session pool.

·     Session Timeout—Maximum time that a session can remain idle before the session is terminated.

Servlet Details

The Servlet Details area contains the following fields:

·     Name—Name of the servlet.

·     Invoke Count—Number of times that the servlet had been invoked since the Weblogic server application started.

·     Average Duration—Average time that is taken by the servlet to respond to requests.

·     Path—Path of the servlet.

·     Servlet Capacity—Maximum capacity of the servlet in the single-thread mode.

JMS Details

The Java Message Service (JMS) enables asynchronous communication between two applications or within distributed systems. The JMS Details area contains the following fields:

·     Current Connections of JMS Server—Current number of connections to the JMS server.

·     Max. Connections of JMS Server—Maximum number of connections to the JMS server since the most recent reset.

·     Total Connections of JMS Server—Total number of connections to the JMS server since the most recent reset.

·     Current Connections of JMS Service—Current number of connections to the JMS service.

·     Max. Connections of JMS Service—Maximum number of connections to the JMS service since the most recent reset.

·     Total Connections of JMS Service—Total number of connections to the JMS service since the most recent reset.

JDBC Details

The JDBC Details area contains the following fields:

·     Name—Name of the Weblogic server application that uses JDBC.

·     JDBCJDBC data source that is used by the Weblogic server application.

·     StateRunning status of JDBC.

·     Current Active ConnectionsNumber of JDBC connections that are used by the application.

·     Leaked ConnectionNumber of JDBC connections that are used by the application but not returned to the JDBC data source after use.

·     Failures To ReconnectFailure attempts that the JDBC data source refreshes database connections.

·     Prep Stmt Cache AccessAccumulated number of times that the cached Prepare Statements are accessed.

·     Connections TotalTotal number of database connections that are created by the JDBC data source since the JDBC data source is deployed.

·     Current CapacityNumber of JDBC connections in the data source connection cache pool.

·     Connection DelayAverage duration (in milliseconds) that the JDBC takes to create a physical connection.

·     Highest Num AvailableHighest number of database connections that were idle and available to be used by an application in this instance of the data source.

Cluster Details

The Cluster Details area contains the following fields:

·     NameName of the Weblogic server in the cluster.

·     StateStatus of the Weblogic server in the cluster.

·     Listen AddressIP address or DNS name on which the Weblogic server in the cluster is listening.

·     Listen PortPort on which the Weblogic server in the cluster is listening.

·     Fragments DroppedNumber of multicast fragments that the Weblogic server in the cluster receives from an external cluster using the same multicast address.

·     Received CountNumber of multicast fragments that the Weblogic server receives from the cluster.

·     Sent CountNumber of multicast fragments that the Weblogic server sends to the cluster in the last polling interval.

·     Multicast Messages LostNumber of multicast messages that are sent to the Weblogic server in the cluster but are lost due to the server error.

·     Resend RequestsNumber of delta state messages that must be resent because the receiving Weblogic server in the cluster missed a message.

Cluster JVM

The Cluster JVM area contains the following fields:

·     NameName of the Weblogic server in the cluster.

·     Current HeapSize of the JVM heap memory on the Weblogic server in the cluster.

·     Current FreeSize of the free JVM heap memory on the Weblogic server in the cluster.

·     MaxMaximum available size of the JVM heap memory on the Weblogic server in the cluster.

·     PercentUsage of the JVM heap memory on the Weblogic server.

·     Java VersionJava version of JVM on the Weblogic server in the cluster.

Cluster Thread

The Cluster Thread area contains the following fields:

·     NameName of the Weblogic server in the cluster.

·     Completed RequestNumber of threads that the Weblogic server has requested in the cluster.

·     IdleNumber of threads that are in idle status on the Weblogic server in the cluster.

·     TotalTotal number of threads that are executed on the WebLogic server in the cluster.

·     Active Execute Threads—Number of execute threads that are in active state on the Weblogic server in the cluster.

·     Queue LengthQueue length of the Weblogic server in the cluster.

·     Hogging Threads—Number of threads that are being hogged in the thread pool of the Weblogic server in the cluster.

Cluster Thread Detail

The Cluster Thread Detail area contains the following fields:

·     ClusterName of the Weblogic server in the cluster.

·     Thread NameName of the execute thread in the cluster.

·     UserUser on behalf of which the execute thread is currently working.

·     Total RequestsNumber of requests that have been processed by this queue.

·     HoggerWhether the thread is in hogger state. This field is not supported in WebLogic version 8.1.

¡     TrueThe execute thread is being hogged by a request for much more than the normal execution time, as automatically observed by the scheduler.

¡     FalseThe execute thread is being hogged by a request within the normal execution time, as automatically observed by the scheduler.

·     IdleWhether the thread is in idle state.

¡     True—The execute thread does not have any work assigned to it.

¡     False—The execute thread already has a work assigned to it.

·     StandbyWhether the thread is in standby state. This field is not supported in WebLogic version 8.1.

¡     True—The execute thread is not a part of the active thread pool.

¡     False—The execute thread is a part of the active thread pool.

·     StuckWhether the thread is in stuck state. This field is not supported in WebLogic version 8.1.

¡     True—The execute thread is stuck working on a request for more than the configured stuck thread maximum time.

¡     False—The execute thread is stuck working on a request within the configured stuck thread maximum time.

GlassFish server

The GlassFish server is an open source JaveEE5 compliant application server used to develop and deploy Java applications. APM supports monitoring GlassFish server applications through JMX.

Adding a GlassFish server application monitor

APM can locally or remotely monitor GlassFish servers through JMX. When you add a GlassFish server application monitor, follow these guidelines:

·     To locally monitor GlassFish server applications, install agents on the hosts where GlassFish server applications are deployed. For more information about installing agents, see "APM agent management."

·     APM obtains monitor index data of GlassFish server applications through the JMX interface. If the JMX interface of GlassFish applications requires authentication, obtain the authorized JMX username and password.

·     Add GlassFish server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the GlassFish server application, make sure at least one probe is configured in APM. After a GlassFish server application monitor is added, APM sends the IP address and service port of the monitored GlassFish server application to the probes for traffic collection.

To add a GlassFish server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click GlassFish Server of the Application Server Monitor class.

The page for adding a GlassFish server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the GlassFish server application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number of the GlassFish server application. The default value is TCP-8686. This field is displayed only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number of the GlassFish server application. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password used for remote JMX access. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of GlassFish server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that GlassFish server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the GlassFish server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the GlassFish server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying application connectivity.

5.     Click OK.

Modifying a GlassFish server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a GlassFish server application monitor. When the IP address of the monitored GlassFish server host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a GlassFish server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Add Application.

The application monitor list displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the selected GlassFish server application monitor.

The page for modifying the GlassFish server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a GlassFish server application monitor."

5.     Click OK.

Viewing the GlassFish server application monitor report

After a GlassFish server application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the GlassFish server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a GlassFish server application monitor to display the report.

Figure 85 shows part of a GlassFish server application monitor report.

Figure 85 Part of a GlassFish server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the GlassFish server application.

·     IP Address—IP address of the GlassFish server host.

·     Application Type—Type of the monitored application, which is always GlassFish Server.

·     Last Polling Time—Time when APM last polled the GlassFish server application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the GlassFish server. This field is not displayed if no alarm is generated by the GlassFish server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the GlassFish server application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the GlassFish server application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the GlassFish server application in the last 30 days.

·     Available Time—Total amount of time that the GlassFish server application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the GlassFish server application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the GlassFish server application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the GlassFish server application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round-trip time duration since APM sending a request packet to APM receiving the response from the GlassFish server application.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Memory Details

The correct operation of the GlassFish server relies on the performance of the Java virtual machine (JVM) in which the server is running. APM monitors the JVM memory usage for the GlassFish server.

The Memory Details area contains the following fields:

·     Total MemoryTotal JVM heap size.

·     Used MemorySize of the used JVM heap. Click the History Record icon icon_history_16x16.png to view the history graph of the used JVM heap.

·     Free MemorySize of free JVM heap.

·     Memory Usage—Percentage of used memory to total memory.

¡     Click the Set Threshold icon  to set alarm thresholds for the memory usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

Thread Details

The Thread Details area contains the following fields:

·     Thread Count—Total number of threads used for processing HTTP requests.

·     Daemon Thread Count—Total number of daemon threads.

·     Peak Thread Count—Maximum number of threads of the GlassFish server since the server started.

·     Total Started Thread Count—Total number of threads that are created and started by the GlassFish server since the server started.

Web Application

This area displays data when APM monitors the GlassFish server of version 3.x. No data is displayed in this area when APM monitors the GlassFish server of version 2.x.

The Web Application area contains the following fields:

·     Web Application Name—Name of the Web application.

·     Web Application DirectoryLocal directory in which the project file of the Web application is located on the GlassFish server.

Application Traffic

APM collects the traffic statistics of the GlassFish server application based on the IP address and the service port.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the GlassFish server application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the GlassFish server application since 00:00 today.

WebSphere server

IBM WebSphere Application Server (WebSphere Server for short) is the basis of the IBM basic infrastructure for running Web applications. APM supports monitoring WebSphere servers.

Adding a WebSphere server application monitor

APM can only remotely monitor WebSphere server applications. When you add a WebSphere server application monitor, follow these guidelines:

·     APM obtains monitor index data of WebSphere server applications through the SOAP interface. If the SOAP interface of WebSphere server applications requires authentication, obtain the authorized SOAP username and password.

·     Add WebSphere hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the WebSphere server application, make sure at least one probe is configured in APM. After a WebSphere server application monitor is added, APM sends the IP address and service port of the monitored WebSphere server application to the probes for traffic collection.

To add a WebSphere server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click WebSphere Server of the Application Server Monitor class.

The page for adding a WebSphere server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the WebSphere server to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the SOAP service port of the WebSphere server application. The default value is TCP-8880. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number of WebSphere server. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password used to access the SOAP service if the service requires authentication. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. The fields are available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of WebSphere server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that WebSphere server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the WebSphere server and operating system applications by IP address.

¡     Application GroupSpecify an application group for the WebSphere server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a WebSphere server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a WebSphere server application monitor. When the IP address of the monitored WebSphere server host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a WebSphere server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the selected WebSphere server application monitor.

The page for modifying the WebSphere server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a WebSphere server application monitor."

5.     Click OK.

Viewing the WebSphere server application monitor report

After a WebSphere server application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the WebSphere server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a WebSphere server application monitor to display the report.

Figure 86 shows part of a WebSphere server application monitor report.

Figure 86 Part of a WebSphere server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the WebSphere server application.

·     IP Address—IP address of the WebSphere server host.

·     Application Type—Type of the monitored application, which is always WebSphere Server.

·     Version—Version of the WebSphere server.

·     Last Polling Time—Time when APM last polled the WebSphere server application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the WebSphere server. This field is not displayed if no alarm is generated by the WebSphere server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the WebSphere server application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the WebSphere server application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the WebSphere server application in the last 30 days.

·     Available Time—Total amount of time that the WebSphere server application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the WebSphere server application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the WebSphere server application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the WebSphere server application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round-trip time duration since APM sending a request packet to APM receiving the response from the WebSphere server application.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time trend.

Thread Pool

The Thread Pool area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Active Threads—Number of active threads in the thread pool.

·     Average Threads—Average number of threads in the thread pool.

Thread Pool Detail

The Thread Pool Detail area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Thread Pool—Name of thread pool.

·     Active ThreadsNumber of concurrently active threads.

·     Average ThreadsAverage number of threads in a pool.

·     Created ThreadsTotal number of created threads.

·     The Average Time ActiveAverage time in milliseconds that the threads are in active state.

·     Num Thread Stops That ClearedNumber of cleared thread stops.

·     Num Concurrently Stopped ThreadsNumber of concurrently stopped threads.

·     Num Threads Declared StoppedNumber of threads that are declared stopped.

·     Num Threads Destroyed—Total number of destroyed threads.

·     Avg Percent Of The Time In UseAverage percent of the time that all threads are in use.

·     Ratio Used—Average percent of the pool that is in use. The value is based on the total number of configured threads in the thread pool, not the current pool size.

Memory

The correct operation of the WebSphere server application relies on the performance of the Java virtual machine (JVM) in which the server is running. APM monitors the JVM memory usage for the WebSphere server application.

The Memory area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Free MemoryFree memory in the JVM heap. Click the Set Threshold icon  to set alarm thresholds for the free memory.

·     In Use—Used memory in the JVM heap. Click the Set Threshold icon  to set alarm thresholds for the used memory.

·     Total Memory—Total JVM heap size. The total memory is equal to the free memory plus the used memory.

·     JVM Up Time—Total run time of JVM since the WebSphere server started.

Web Application

The Web Application area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Requests Processed by Servlet—Total number of requests processed by the Servlet since the WebSphere server application started to the last polling.

·     Service Time—Average time taken by the Servlet to process and respond to the requests since the WebSphere server started.

·     Concurrently Processed RequestsNumber of requests that are concurrently processed.

·     Errors—Total number of times an error has been received from the servlet or JSP.

·     Error Rate—Errors proportion to the number of processed requests.

Web Application Detail

The Web Application Detail area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Application—Web application name.

·     Requests Processed by Servlet—Total number of requests that have been processed by Servlet on the WebSphere.

·     Loaded ServletsNumber of loaded servlets.

·     Reloaded ServletsNumber of reloaded servlets.

·     Service Time—Average response time to process Servlet requests.

·     Concurrently Processed RequestsNumber of requests that are concurrently processed.

·     Errors—Total number of times an error has been received from the servlet or JSP.

·     Error Rate—Errors proportion to the number of processed requests.

Transactions

The Transactions area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Global Transactions—Total number of global transactions started by the WebSphere server since the WebSphere server started.

·     Local TransactionsTotal number of local transactions started by the WebSphere server since the WebSphere server started.

·     Active Global Transactions—Total number of concurrently active transactions.

·     Average Global Transaction Up Time—Average global transaction up time since the WebSphere server started.

·     Average Local Transaction Up Time—Average local transaction up time since the WebSphere server started.

·     Committed Global Transactions—Total number of transactions committed since the WebSphere server started.

·     Rolled Back Global Transactions—Total number of transactions that had been rolled back since the WebSphere server started.

·     Global Transaction TimedoutsNumber of global transactions that timed out.

·     Local Transactions TimedoutsNumber of local transactions that timed out.

·     Global Transaction Rollback RatePercentage of rolled back global transactions to global transactions.

·     Global Transaction Timedout RatePercentage of timeout global transactions to global transactions.

·     Local Transaction Timedout RatePercentage of timeout local transactions to local transactions.

JDBC Connection Pool

The JDBC Connection Pool area contains the following fields:

·     NodeName of the WebSphere server node.

·     ProcessProcess running on the WebSphere server node.

·     Created Connections—Total number of connections created in the connection pool since the WebSphere server started.

·     Closed Connections—Total number of connections closed in the connection pool since the WebSphere server started.

·     Pool Size—Size of the JDBC connection pool.

·     Idle Connections—Total number of idle connections.

·     Waiting Connections—Total number of connections in waiting state.

·     Allocated Connections—Total number of allocated connections.

·     Timeouts ConnectionsNumber of connection timeouts in the pool.

·     Used TimeAverage time in milliseconds that a connection is used. The difference between the time at which the connection is allocated and returned. This value includes the JBDC operation time.

·     The Average Waiting TimeAverage waiting time in milliseconds until a connection is granted.

·     Percent Used—Average percent of the pool that is in use. The value is based on the total number of configured connections in the connection pool, not the current number of connections.

Session

The Session area contains the following fields:

·     Name—Session object name.

·     Sessions CreatedNumber of created sessions.

·     Sessions InvalidatedNumber of invalidated sessions.

·     Sessions SurvivalTotal number of sessions that are currently live.

·     Session Object SizeAverage size of the session objects at session level, including only serializable attributes in the cache.

·     LifetimeAverage session lifetime in milliseconds. It is the difference between the time when the session became invalid and the time when the session was created.

Application Traffic

APM performs traffic statistics based on the IP address and the service port of the WebSphere server application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the WebSphere server application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the WebSphere server application since 00:00 today.

Cluster

The Cluster area contains the following fields:

·     Cluster NameWebSphere cluster name.

·     StateWebSphere cluster state.

·     Member NameName of a member in the WebSphere cluster.

·     Node NameName of a WebSphere node in the cluster.

·     WeightWeight of the WebSphere node in the cluster.

Jetty

Jetty is an open source Servlet container and provides the running environment for Java-based Web contents.

Adding a Jetty application monitor

APM can locally or remotely monitor Jetty applications through JMX. When you add a Jetty application monitor, follow these restrictions and guidelines:

·     APM obtains Jetty application index data through the JMX interface. Operators need to contact the Jetty administrator to enable JMX.

·     If JMX requires authentication, obtain the username and password of the Jetty administrator. The username and password are required for adding the application monitor.

·     To locally monitor Jetty applications, install agents on the hosts where Jetty applications are deployed. For more information about installing agents, see "APM agent management."

·     Add Jetty hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a Jetty application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Jetty of the Application Server Monitor class.

The page for adding a Jetty application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Jetty application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host that is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor PortEnter the JMX port used to monitor the application. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Jetty administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Jetty applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Jetty depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Jetty and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Jetty application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Jetty application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Jetty application monitor. When the IP address of a monitored Jetty host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Jetty application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Jetty application monitor you want to modify.

The page for modifying the Jetty application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Jetty application monitor."

5.     Click OK.

Viewing the Jetty application monitor report

After a Jetty application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Jetty application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Jetty application monitor to display the report.

Figure 87 shows part of a Jetty monitor report.

Figure 87 Part of a Jetty application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Jetty application.

·     IP Address—IP address of the Jetty host.

·     Application Type—Type of the monitored application, which is always Jetty.

·     Version—Version of the Jetty OS.

·     Last Polling Time—Time when APM last polled the Jetty application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Jetty application. This field is not displayed if no alarm is generated by the Jetty application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Jetty application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Jetty application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Jetty application in the last 30 days.

·     Available Time—Total amount of time that the Jetty application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Jetty application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Jetty application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Jetty application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

OS Information

The OS Information area contains the following fields:

·     OSOperating system of the Jetty host.

·     ArchitectureArchitecture of the Jetty host, for example, the x86 architecture.

·     CPU Processing DurationCPU processing duration occupied by the Jetty application.

·     Total Kernel CountTotal number of CPU kernels on the Jetty host.

·     Used Virtual MemorySize of the used virtual memory for the OS on the Jetty host.

·     Total Physical MemorySize of total physical memory on the Jetty host.

·     Free Physical MemorySize of the free physical memory on the Jetty host.

·     Physical Memory Usage RatioUsage of the physical memory on the Jetty host. Click the History Record icon icon_history_16x16.png to view the history graph of the physical memory usage.

·     Total Swap MemoryTotal virtual or swap memory size on the Jetty host.

·     Free Swap MemorySize of the free swap memory on the Jetty host.

·     Swap Usage RatioUsage of the swap memory on the Jetty host. Click the History Record icon icon_history_16x16.png to view the history graph of the swap usage ratio.

Heap Size Information

The correct operation of the Jetty application relies on the performance of the Java virtual machine (JVM). APM monitors the JVM heap memory usage.

The Heap Size Information area contains the following fields:

·     Current Heap SizeSize of the current JVM heap. Click the History Record icon icon_history_16x16.png to view the history graph of the current heap size.

·     Max Heap SizeSize of the maximum heap that the JVM can apply for.

·     Committed Heap SizeSize of the heap committed by the JVM. Click the History Record icon icon_history_16x16.png to view the history graph of the committed heap size.

Thread Information

The Thread Information area contains the following fields:

·     Active Thread CountNumber of active threads. Click the History Record icon icon_history_16x16.png to view the history graph of the active thread count.

·     Peak Thread CountMaximum number of active threads. Click the History Record icon icon_history_16x16.png to view the history graph of the peak thread count.

·     Daemon Thread CountNumber of daemon threads. Click the History Record icon icon_history_16x16.png to view the history graph of the daemon thread count.

·     Total Started Thread CountTotal number of started threads. Click the History Record icon icon_history_16x16.png to view the history graph of the started threads.

Class Information

The Class Information area contains the following fields:

·     Current Loaded Class CountNumber of classes currently loaded by the Jetty application. Click the History Record icon icon_history_16x16.png to view the history graph of the current loaded class count.

·     Total Loaded Class CountNumber of classes that have been loaded by the Jetty application. Click the History Record icon icon_history_16x16.png to view the history graph of the total loaded class count.

·     Total Removed Class CountTotal number of removed classes. Click the History Record icon icon_history_16x16.png to view the history graph of the total removed class count.

Jetty Information

The Jetty Information area contains the following fields:

·     JMX Access AddressAccess address of the Jetty application.

·     Java VM Name and version of the Java virtual machine used by the Jetty application.

Lotus Domino server

IBM Lotus Domino server is collaborative office software developed by IBM and provides various types of collaboration applications.

Configuring the Lotus Domino server

APM uses Domino Internet Inter-ORB Protocol (DIIOP) to monitor the Lotus Domino server application. To monitor the Lotus Domino server application, contact the application administrator to configure the following settings:

1.     Open the page for configuring a Lotus Domino server:

a.     Open the names.nsf file on the IBM Lotus Domino server. By default, the file is located at IBM\Domino\data in the Domino installation path.

b.     From the navigation tree, select Configuration > Severs > All Server Documents.

c.     Double-click the Lotus Domino server to be monitored in the window for selecting a Lotus Domino server.

The page for configuring the Lotus Domino server opens.

2.     Configure DIIOP:

a.     Select Ports... > Internet Ports... > DIIOP.

b.     Enter a TCP/IP port number in the TCP/IP Port Number field. The default port is 63148.

c.     Select Enable from the TCP/IP Port Status list.

3.     Configure the HTTP task:

a.     Select Ports... > Internet Ports... > Web.

b.     Enter a TCP/IP port number in the TCP/IP Port Number field. The default port is 80.

4.     Allow HTTP clients to browse Domino databases:

a.     Select Internet Protocols... > HTTP.

b.     Select Yes for the Allow HTTP clients to browse databases parameter.

5.     Enable anonymous authentication:

a.     Select Ports... > Internet Ports... > Web.

b.     In the Authentication Options area, select Yes from the Anonymous list.

Adding a Lotus Domino server application monitor

APM can locally or remotely monitor Lotus Domino server applications. When you add a Jetty application monitor, follow these restrictions and guidelines:

·     Contact the Lotus Domino server administrator to enable DIIOP access function and obtain DIIOP user access information. For information about enabling the DIIOP function, see "Configuring the Lotus Domino server."

·     To locally monitor Lotus Domino server applications, install agents on the hosts where Lotus Domino server applications are deployed. For more information about installing agents, see "APM agent management."

·     Add Lotus Domino server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a Lotus Domino server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Lotus Domino Server of the Application Server Monitor class.

The page for adding a Lotus Domino server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Lotus Domino server application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection Port—Enter the service port number of the Lotus Domino server application. For example, you can enter 25 if SMTP is used. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password that can access the DIIOP function. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Lotus Domino server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the Lotus Domino server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the Lotus Domino server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Lotus Domino server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Lotus Domino server application monitor

Authorized users can modify all parameters except the IP address and the APM server for the Lotus Domino server application. When the IP address of a monitored Lotus Domino server host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Lotus Domino server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Lotus Domino server application monitor you want to modify.

The page for modifying the Lotus Domino server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Lotus Domino server application monitor."

5.     Click OK.

Viewing the Lotus Domino server application monitor report

After a Lotus Domino server application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Lotus Domino server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Lotus Domino server application monitor to display the report.

Figure 88 shows part of a Lotus Domino server application monitor report.

Figure 88 Part of a Lotus Domino server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health state of the Lotus Domino server application.

·     IP Address—Lotus Domino server host IP address.

·     Application Type—Type of the monitored application, which is always Lotus Domino Server.

·     Version—Version of the Lotus Domino server application.

·     Last Polling Time—Time when APM last polled the Lotus Domino server application.

·     RelationshipClick the Relationship icon  to view dependencies between the Lotus Domino server application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Lotus Domino server application. This field is not displayed if no alarm was generated by the Lotus Domino server application.

Availability Today

The Availability Today area contains the following fields:

·     Current AvailabilityAvailability of the Lotus Domino server application.

¡     Click the Weekly History icon  to view the availability of the Lotus Domino server application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Lotus Domino server application in the last 30 days.

·     Available Time—Total amount of time that the Lotus Domino server application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Lotus Domino server application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Lotus Domino server application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Lotus Domino server application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage of the Lotus Domino server application.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area contains the following field:

·     Memory Usage RatioMemory usage of the Lotus Domino server application.

¡     Click the Set Threshold icon  to set alarm thresholds for the memory usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio.

Disk Usage Ratio

The Disk Usage Ratio area contains the following field:

·     Disk Usage RatioPercentage of used disk space to total disk space.

¡     Click the Set Threshold icon  to set alarm thresholds for the disk usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the disk usage ratio.

HTTP

The HTTP area contains the following fields:

·     Current ConnectionsNumber of current HTTP connections, excluding HTTP connection requests.

¡     Click the Set Threshold icon  to set alarm thresholds for current connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of current connections.

·     Max ConnectionsMaximum number of HTTP connections of the Lotus Domino server application. Click the History Record icon icon_history_16x16.png to view the history graph of maximum connections.

Users

The Users area contains the following field:

·     Current UsersNumber of users that access the Lotus Domino server application.

¡     Click the Set Threshold icon  to set alarm thresholds for current users.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of current users.

Mail

The Mail area contains the following fields:

·     Average Time for Mail DeliveryAverage mail delivery time.

¡     Click the Set Threshold icon  to set alarm thresholds for average time for mail delivery.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of average time for mail delivery.

·     Dead Mail/MinNumber of mails that cannot be delivered in the mail box per minute.

¡     Click the Set Threshold icon  to set alarm thresholds for dead mails per minute.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of dead mails per minute.

·     Waiting Mail/MinNumber of mails that are waiting to be delivered in the mail box per minute.

¡     Click the Set Threshold icon  to set alarm thresholds for waiting mails per minute.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of waiting mails per minute.

·     Delivered Mail/MinNumber of mails that are delivered from the router to the mail box per minute.

¡     Click the Set Threshold icon  to set alarm thresholds for delivered mails per minute.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of delivered mails per minute.

Network Information

The Network Information area contains the following fields:

·     Receive RateRate at which the Lotus application receives data.

·     Transmit RateRate at which the Lotus application transmits data.

·     Current BandwidthCurrent bandwidth of the network.

·     Total RateTotal rate at which the Lotus application receives and transmits data.

Process Information

The Process Information area contains the following field:

Active Processes—Number of currently active processes.

Task Information

The Task Information area contains the following fields:

·     Concurrent TasksNumber of concurrent tasks on the Lotus server.

·     Waiting TasksNumber of waiting tasks on the Lotus server.

Thread Information

The Thread Information area contains the following field:

Threads—Number of threads on the Lotus server.

Database Buffer Pool Information

The Database Buffer Pool Information area contains the following fields:

·     Buffer Pool ReadsNumber of times that the Lotus server reads data from the buffer pool.

·     Buffer Pool WritesNumber of times that the Lotus server writes data to the buffer pool.

·     Buffer Pool Read Hit RatioRead hit ratio of the buffer pool.

Database Cache Information

The Database Cache Information area contains the following fields:

·     Cache SamplesNumber of samples collected by the database cache each time.

·     Initial Open DatabasesNumber of initial open databases in the database cache.

·     Cache LookupsNumber of cache lookups for the database.

·     Cache SizeSize of the database cache.

·     Cache Congestion RejectionsNumber of rejections because of database cache congestion.

Database Cache Entity Information

The Database Cache Entity Information area contains the following fields:

·     Current EntitiesNumber of current entities in the database cache.

·     Link EntitiesNumber of link entities in the database cache.

·     Maximum EntitiesMaximum number of link entities that can be stored in the database cache.

File I/O Information

The File I/O Information area contains the following fields:

·     File I/O ReadsNumber of file I/O reads.

·     File I/O WritesNumber of file I/O writes.

Domino Server Authentication

Lotus Domino server is collaborative office software developed by IBM and provides various types of collaboration applications. In a complicated environment, APM fails to monitor the Lotus Domino server by using the procedure described in "Lotus Domino server." This section describes how to use Domino Server Authentication to monitor the Lotus Domino server. APM supports monitoring Lotus Domino 8.5 and Lotus Domino 9.x.

Configuring the Lotus Domino server

APM uses the console.nsf plugin to monitor the Lotus Domino server application. Before a Lotus Domino server application monitor is added, contact the application administrator to configure the following settings:

1.     Download the Lotus Agent installation file console.nsf:

a.     Click the Resource tab.

b.     Open the Add Application page by using one of the following methods:

-     From the navigation tree, select Application Manager > Add Application.

-     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

c.     Click Domino Server Authentication of the Application Server Monitor class.

The page for adding a Domino Server Authentication application monitor opens.

d.     Click Help in the top right corner of the page to open the help page, and then locate Download console.nsf in the Remarks area.

e.     Right-click the console.nsf link, and save the file to the data directory of the Domino Server Authentication to be monitored. By default, the default data directory is \IBM\Lotus\Domino\data of the Domino installation path.

2.     Configure the console.nsf file in the IBM Domino Administrator:

a.     Open the IBM Domino Administrator, and use the administrator account for login.

b.     Click the Domino server icon on the left server pane, and then select the server from the navigation tree that opens.

c.     On the Domino Admin tab, right-click the console.nsf file, and select Signature from the shortcut menu.

d.     Click OK in the dialog box that opens.

e.     Right-click the console.nsf file, and select Access Control > Management from the shortcut menu.

A dialog box opens.

f.     On the Basic tab, select a database file privilege from the Permissions list in the Properties area.

The permissions must be Read or higher.

g.     Click OK.

3.     Configure the console.nsf file in IBM Notes:

a.     Use the IBM Notes client to open the console.nsf file.

b.     Select Actions > pl. Brief Table Settings to open the Lotus Agent setting page.

c.     Enter the IP address that can be connected to the agent in the Trusted Server IP Address List field. In this example, enter the IP address of the APM server.

d.     Enter executable commands in the Command List field.

Make sure you include the following commands:

-     show stat server.

-     show stat platform.

-     show stat http.

-     show stat mail.

-     show stat disk.

Adding a Domino Server Authentication application monitor

Before you add a Domino Server Authentication application monitor, add Domino Server Authentication hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a Domino Server Authentication application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Domino Server Authentication of the Application Server Monitor class.

The page for adding a Domino Server Authentication application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Domino Server Authentication application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Domino Server Authentication, 80 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for Domino Server Authentication. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Domain Name—Enter a domain name for the Domino Server Authentication in the Domain Name field. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Domino Server Authentication applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Domino Server Authentication depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Domino Server Authentication and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Domino Server Authentication application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Domino Server Authentication application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Domino Server Authentication application monitor. When the IP address of a monitored Domino Server Authentication host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Domino Server Authentication application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Domino Server Authentication application monitor you want to modify.

The page for modifying the Domino Server Authentication application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Domino Server Authentication application monitor."

5.     Click OK.

Viewing the Domino Server Authentication application monitor report

After a Domino Server Authentication application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

For more information about the Domino Server Authentication application monitor report, see "Viewing the Lotus Domino server application monitor report."

 


Web server monitor

This chapter describes how to add and modify certain types of application monitor, and helps you view the details of application monitor reports.

Apache server

As a stable, powerful, open-source Web server, Apache is widely used in the Internet.

APM can monitor Apache 2.x. This section describes how to add and modify an Apache server application monitor, and helps you view the details of Apache server application monitor reports.

Configuring the Apache server

APM monitors an Apache server through the Web service port (TCP 80 by default) of the Apache server. To use APM to monitor the Apache server, make sure the Apache server is loaded with the status module (mod_status.so).

To configure the Apache server and make the server correctly load the status module:

1.     Use a text editor to open the Apache configuration file, http.conf.

2.     Remove the number sign (#) in the front of the line displaying:

LoadModule status_module modules/mod_status.so.

3.     Add the following segment to the end of the configuration file:

<location /server-status>

SetHandler server-status

Order Deny,Allow

Allow from all

</location>

ExtendedStatus On

If the configuration segment already exists in the configuration file, remove the number sign (#) in the front of the configuration segment, and modify the configuration segment into the segment above.

4.     Save the configuration file, and restart the Apache server.

Adding an Apache server application monitor

When you add Apache server application monitors for an Apache server, follow these guidelines:

·     Make sure the Apache server is loaded with the status module (mod_status.so). For information on configuring the Apache server and making the server load the status module, see "Configuring the Apache server."

·     Add Apache server hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Apache server application, make sure at least one probe is configured in APM. After an Apache server monitor is added, APM sends the IP address of the monitored Apache server to the probes for traffic collection.

To add an Apache server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Apache Server of the Web Server Monitor class.

The page for adding an Apache server application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the Apache server to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the port through which the Apache server provides services. The port is 80 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter one or more service port numbers for the Apache server. The port is 80 by default. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Apache server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Application—Click Add next to this field. On the Select Application dialog box that opens, select the application that the Apache server application depends on.

-     Enter the complete or part of the application monitor name in the Search field at the top of the page, and then click Search.

-     Select the application that the Apache server application depends on.

-     Click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependency between the Apache server and the operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Apache server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect ApplicationSelect this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an Apache server application monitor

Authorized users can modify all parameters except the IP address and the APM server for the Apache server application monitor. When the IP address of a monitored Apache server host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Apache server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify iconicon_modify_16x16.png for the Apache server application monitor you want to modify.

The page for modifying an Apache server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Apache server application monitor."

5.     Click OK.

Viewing the Apache server application monitor report

After an Apache server application monitor is added, APM collects index data of the application, and calculates its availability and health status. You can obtain monitor indexes for the Apache server application by viewing the monitor report.

To access the Apache server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Apache server application monitor to display the report.

Figure 89 shows part of an Apache server application monitor report.

Figure 89 Part of an Apache server application monitor report

apache.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health state of the Apache server.

·     IP Address—IP address of the Apache server.

·     Application TypeType of the monitored application, which is always Apache Server.

·     PortEnter the port through which the Apache server provides Web services.

·     Version–Version of Apache.

·     Server Uptime—Uptime of the Apache server when APM last polled the Apache server.

·     Total Bytes—Number of bytes of the page requests received by the Apache server when APM last polled the Apache server.

·     Total Accesses—Number of page requests received by the Apache server when APM last polled the Apache server.

·     Last Polling Time—Time when APM last polled the Apache server.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view dependencies between the Apache server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Apache server. This field is not displayed if no alarm is generated by the Apache server. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Apache server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Apache server in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Apache server in the last 30 days.

·     Available Time—Total amount of time that the Apache server was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the Apache server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Apache server was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the Apache server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Request Number

The Request Number area contains the following fields:

·     Requests/Sec—Average number of requests received by the Apache server per second from the startup time of the Apache server to the time when APM last polled the Apache server.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of requests received per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of requests received per second.

·     Bytes/Sec—Average number of bytes received by the Apache server per second from the startup time of the Apache server to the time when APM last polled the Apache server.

¡     Click the Set Threshold icon  to set alarm thresholds for the bytes received per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the bytes received per second.

·     Bytes/Request—Average size of requests received by the Apache server.

¡     Click the Set Threshold icon  to set alarm thresholds for the average size of requests received by the Apache server per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the average size of requests received by the Apache server per second.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's TrafficTotal traffic received and sent by the Apache server over the last 1 hour.

·     Today's Traffic—Total traffic received and sent by the Apache server since 00:00 today.

IIS server

IIS is a Web server developed by Microsoft, and provides Web services on Windows servers. Applications such as Exchange and ASP provide Web services through IIS.

APM can monitor IIS 6.0 or later versions. This section describes how to add/modify an IIS server application monitor, and helps you view the details of IIS server application monitor reports.

Adding an IIS server application monitor

APM monitors the IIS server performance through WMI. When you add application monitors for an IIS server, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which the IIS server is installed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add the host installed with the IIS server to the IMC platform so the connection information between the host and the access device can be obtained. For information on adding a host to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Add IIS server hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows administrator's privileges.

·     To view traffic statistics in the monitor report of the IIS server application, make sure at least one probe is configured in APM. After an IIS server monitor is added, APM sends the IP address of the monitored IIS server to the probes for traffic collection.

To add an IIS server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor. Click Add on the application monitor list page.

3.     Click IIS Server of the Web Server Monitor class.

The page for adding an IIS server application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the IIS server to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the port through which the IIS server provides Web services. The port is 80 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter a service port number for the IIS server. The port is 80 by default. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the host administrator. This field is available only when you select Disable from the Use Template list.

-     If the administrator is a domain user, use the domain name\username format.

-     If the administrator is a local user, use the host name\username or IP address\username format, or simply use the username.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of IIS server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Application—Click Add next to this field. On the Select Application dialog box that opens, select the application that the IIS server application depends on.

-     Enter the complete or part of the application monitor name in the Search field at the top of the page, and then click Search.

-     Select the application that the IIS server application depends on.

-     Click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the IIS server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the IIS server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect ApplicationSelect this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an IIS server application monitor

Authorized users can modify all parameters except the IP address and the APM server for the IIS server application monitor. When the IP address of the IIS server host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an IIS server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the IIS server application monitor you want to modify.

The page for modifying an IIS server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an IIS server application monitor."

5.     Click OK.

Viewing the IIS server application monitor report

After an IIS server application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the IIS server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an IIS server application monitor to display the report.

Figure 90 shows part of an IIS server application monitor report.

Figure 90 Part of an IIS server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health state of the IIS server.

·     IP Address—IP address of the IIS server.

·     Application Type—Type of the monitored application, which is always IIS Server.

·     Service Uptime—Uptime of the IIS server when APM last polled the IIS server.

·     Last Polling Time—Time when APM last polled the IIS server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the IIS server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the IIS server. This field is not displayed if no alarm is generated. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the IIS server in the last polling period.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the IIS server in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the IIS server in the last 30 days.

·     Available Time—Total amount of time that the IIS server was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the IIS server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the IIS server was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the IIS server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Connections

The Connections area contains the following field:

·     Connections—Number of connections between the clients and the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph of connections.

HTTP

The HTTP area contains the following fields:

·     Response Time—HTTP response time of the IIS server when APM last polled the IIS server.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

·     Reachable—Whether the IIS server is reachable.

Access Information

The Access Information area contains the following fields:

·     Send Rate—Data sending rate of the IIS server when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph of the send rate.

·     Receive Rate—Data receiving rate of the IIS server when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph of the receive rate.

·     Total Rate—Data transmitting rate of the IIS server when APM last polled the IIS server. The total rate is approximately the sum of the send rate and the receive rate. Click the History Record icon icon_history_16x16.png to view the history graph of the total rate.

File Information

The File Information area contains the following fields:

·     Files Sent/Sec—Files sent per second by the IIS server when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of files sent per second.

·     Files Received/Sec—Files received per second by the IIS server when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of files received per second.

·     Files Processed/Sec—Files processed per second by the IIS server when APM last polled the IIS server. The file process rate is approximately the sum of the file sending rate and the file receiving rate. Click the History Record icon icon_history_16x16.png to view the history graph for the number of files processed per second.

Anonymous Access

The Anonymous Access area contains the following fields:

·     Anonymous AccessesNumber of users accessing the IIS server by using anonymous connections when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of anonymous accesses.

·     Anonymous Accesses/SecNumber of users accessing the IIS server by using anonymous connections per second when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of anonymous accesses per second.

Non-Anonymous Access

The Non-Anonymous Access area contains the following fields:

·     Non-Anonymous AccessesNumber of users accessing the IIS server by using non-anonymous connections when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of non-anonymous accesses.

·     Non-Anonymous Accesses/SecNumber of users accessing the IIS server by using non-anonymous connections per second when APM last polled the IIS server. Click the History Record icon icon_history_16x16.png to view the history graph for the number of non-anonymous accesses per second.

Nginx server

Nginx is a stable Web and reverse proxy server, and an IMAP, POP3, and SMTP server. Nginx provides high performance and multiple functions, and occupies few system resources.

APM supports monitoring Nginx 1.9.3.

Configuring the Nginx server

APM monitors the Nginx server through the Web service port, TCP 80 by default. To monitor the Nginx server, first enable monitoring on the status module (stub_status).

To enable monitoring on the status module:

1.     Use a text editor to open the nginx.conf file stored on the Nginx server.

2.     Locate the following code module in the configuration file:

location /nginx_status {

……

}

¡     If the code module exists and starts with the pound sign (#), delete the pound sign (#), and then modify the contents.

To allow all hosts to access status information:

location /nginx_status {

stub_status on;

access_log off;

allow all;

}

To allow only specific hosts to access to status information:

location /nginx_status {

stub_status on;

access_log off;

allow IP; # Specify the IP addresses that are allowed to access status information

deny all;

}

¡     If the code module does not exist, add the previous code to the Server {} module in the configuration file. Typically, the added code follows the location / {...} module.

3.     Save the configuration file, and then restart the Nginx server.

Adding an Nginx server application monitor

When you add Nginx server application monitors, follow these guidelines:

·     Enable monitoring on the status module (stub_status). For more information, see "Configuring the Nginx server."

·     Add Nginx server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Nginx server application, make sure at least one probe is configured in APM. After an Nginx server application monitor is added, APM sends the IP address and service port of the monitored Nginx server application to the probes for traffic collection.

To add an Nginx server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Nginx Server of the Web Server Monitor class.

The page for adding an Nginx server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Nginx server application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Nginx server, 80 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for the Nginx server. This field is displayed only when at least one probe is configured for APM and you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Relative PathEnter the URL path where the status module resides, /nginx_status by default. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Nginx server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the Nginx server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application Group—Specify an application group for the Nginx server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an Nginx server application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Nginx server application monitor. When the IP address of a monitored Nginx server host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Nginx server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Nginx server application monitor you want to modify.

The page for modifying the Nginx server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Nginx server application monitor."

5.     Click OK.

Viewing the Nginx server application monitor report

After an Nginx server application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Nginx server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Nginx server application monitor to display the report.

Figure 91 shows part of an Nginx server application monitor report.

Figure 91 Part of an Nginx server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameName of the Nginx server application monitor.

·     Health Status—Health status of the Nginx server application.

·     IP Address—IP address of the Nginx server host.

·     Application Type—Type of the monitored application, which is always Nginx Server.

·     PortWeb service port number used by the Nginx server.

·     Last Polling Time—Time when APM last polled the Nginx server application.

·     Relationship—Click the Related Applications icon  to view dependencies between the Nginx server application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Nginx server host. This field is not displayed if no alarm is generated by the Nginx server application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Nginx application.

¡     Click the Weekly History icon  to view the availability of the Nginx server application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the Nginx server application in the last 30 days.

·     Available Time—Total amount of time that the Nginx server application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Nginx application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Nginx server application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Nginx server application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Period from the time when APM sends a request to the time when it receives a response for the request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Active Connections

The Active Connections area contains the following field:

·     Active Connections—Number of active connections handled by the Nginx server. Click the History Record icon icon_history_16x16.png to view the history graph of active connections.

Connection Information

The Connection Information area contains the following fields:

·     Connections/SecNumber of connections handled by the Nginx server per second. Click the History Record icon icon_history_16x16.png to view the history graph of connections per second.

·     Handshakes/SecNumber of handshakes handled by the Nginx server per second. Click the History Record icon icon_history_16x16.png to view the history graph of handshakes per second.

·     Requests/SecNumber of requests handled by the Nginx server per second. Click the History Record icon icon_history_16x16.png to view the history graph of requests per second.

·     Requests Handled by ConnectionAverage number of requests handled by the Nginx server for each connection. Click the History Record icon icon_history_16x16.png to view the history graph of requests handled by the Nginx server for each connection

·     Total ConnectionsTotal number of handled connections since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of total connections.

·     Total HandshakesTotal number of handled handshakes since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of total handshakes.

·     Total RequestsTotal number of handled requests since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of total requests.

·     Total Connection FailuresTotal number of connection failures since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of total connection failures.

·     Connection Failure RatioConnection failure rate in percentage since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of the connection failure ratio.

Read/Write Information

·     Message ReadsNumber of Header messages the Nginx server has received from the client since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of message reads.

·     Message WritesNumber of Header messages the Nginx server has sent to the client since the Nginx server was started or reloaded the configuration file. Click the History Record icon icon_history_16x16.png to view the history graph of message writes.

·     Connections Waiting for Request—Number of connections that are handled by the Nginx server and are waiting for the next request. If keepalive is enabled, this number is calculated by using the following formula: Connections Waiting for Request = Active Connections – (Message Reads + Message Writes). Click the History Record icon icon_history_16x16.png to view the history graph of connections waiting for request.

PHP

Hypertext Preprocessor (PHP) is a scripting language embedded in the HTML text, and is usually used to develop Web programs. When a user accesses Web pages developed by using the PHP language, the Web server first delivers the Web pages with the PHP language embedded to the PHP service for parsing, and then sends the parsed pages to the user. APM can monitor the PHP service, which is responsible for parsing pages.

This section describes how to add and modify a PHP application monitor and helps you view the details of PHP application monitor reports.

Adding a PHP application monitor

APM monitors whether PHP is running properly through the Web service port (TCP 80 by default). APM requests for PHP pages from the Web server as a client, and determines whether the PHP service can normally parse the PHP pages according to the returned results. When you add a PHP server application monitor, follow these guidelines:

·     Add the PHP server hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For information on adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the PHP server, make sure at least one probe is configured in APM. After a PHP server monitor is added, APM sends the IP address of the monitored PHP server to the probes for traffic collection.

To add a PHP application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor. Click Add on the application monitor list page.

3.     Click PHP of the Web Server Monitor class.

The page for adding a PHP application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the PHP server to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor to aid maintenance.

¡     Application Monitor Port—Enter the Web service port number, which is 80 by default. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter a service port number for the PHP server. The port is 80 by default. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Relative Path—Enter the relative path of the PHP page, which starts with a slash (/). The URL of a PHP page is in the format of http://+<IP address>+relative path, for example, http://10.154.240.55/index.php, where the relative path is /index.php. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of PHP applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Application—Click Add next to this field. On the Select Application dialog box that opens, select the application that the PHP application depends on.

-     Enter the complete or part of the application monitor name in the Search field at the top of the page, and then click Search.

-     Select the application that the PHP application depends on.

-     Click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the PHP server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the PHP application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect ApplicationSelect this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a PHP application monitor

Authorized users can modify all parameters except the IP address and the APM server for the PHP application monitor. When the IP address of a monitored PHP host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a PHP application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the PHP application monitor you want to modify.

The page for modifying a PHP application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a PHP application monitor."

5.     Click OK.

Viewing the PHP application monitor report

After a PHP application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the PHP application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a PHP application monitor to display the report.

Figure 92 shows part of a PHP application monitor report.

Figure 92 Part of a PHP application monitor report

php.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health state of PHP.

·     IP Address—IP address of the Web server which can parse PHP.

·     Application Type—Type of the monitored application, which is always PHP.

·     PortEnter the port through which the Apache server provides Web services.

·     Last Polling Time—Time when APM last polled the PHP server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between PHP and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on PHP. This field is not displayed if no alarm is generated. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the PHP application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the PHP application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the PHP application in the last 30 days.

·     Available Time—Total amount of time that PHP was available after 00:00 today.

·     Unavailable TimeTotal amount of time that PHP was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that PHP was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that PHP was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response TimeResponse time of the PHP application. Response time refers to the length of time it takes for APM to send a request to PHP plus the length of time it takes for APM to receive the PHP response.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic received and sent by the PHP server over the last 1 hour.

·     Today's Traffic—Total traffic received and sent by the PHP server since 00:00 today.


Mail server monitor

The following information describes how to add and modify mail server application monitors and how to view relevant monitor reports.

Exchange Server 2003

The Microsoft Exchange Server 2003 provides mail services for domain users by cooperating with Active Directory. It supports SMTP, POP3, and IMAP4 mail protocols.

Adding an Exchange Server 2003 application monitor

APM monitors the Exchange Server 2003 application through WMI. When you add an Exchange Server 2003 application monitor, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Exchange Server 2003 is installed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add Exchange Server 2003 hosts to the IMC platform.

For a host managed in the IMC platform, APM obtains and displays network connections of the host and its access device in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows administrator's privileges.

·     To view traffic statistics in the monitor report of the Exchange Server 2003 application, make sure at least one probe is configured in APM. After an Exchange Server 2003 application monitor is added, APM sends the IP address and service ports of the monitored Exchange Server 2003 application to the probes for traffic collection.

To add an Exchange Server 2003 application monitor:

1.     Click the Resource tab.

2.     Display the Add Application page in one of two ways:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The page displays all application types that can be monitored by APM.

3.     Click Exchange 2003 of the Mail Server Monitor class.

The page for adding an Exchange Server 2003 application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the Exchange Server 2003 application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection PortEnter one or more comma-separated service port numbers for Exchange Server 2003. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Exchange Server 2003 administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Mailbox Path—Enter the absolute path to the mailbox file in Exchange Server 2003. This field is available only when you select Disable from the Use Template list.

¡     Public Folder Path—Enter the absolute path to the public folder in Exchange Server 2003. This field is available only when you select Disable from the Use Template list.

¡     Exchange Service—Select one or more of the following Exchange Server 2003 services to be monitored by APM:

-     Microsoft Exchange IMAP4

-     Microsoft Exchange Event

-     Microsoft Exchange Information Store

-     Microsoft Exchange Management

-     Microsoft Exchange MTA Stacks

-     Microsoft Exchange System Attendant

-     Microsoft Exchange Site Replication Service

-     Microsoft Exchange POP3

-     Microsoft Exchange Routing Engine

-     Simple Mail Transfer Protocol (SMTP)

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Exchange Server 2003 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Exchange Server 2003 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Exchange Server 2003 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Exchange Server 2003 application.

-     To specify an existing application group, click Add, select an application group, and then  click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Exchange Server 2003 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Exchange Server 2003 application monitor. When the IP address of a monitored Exchange Server 2003 host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Exchange Server 2003 application monitor:

1.     Click the Resource tab

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Exchange 2003 application monitor you want to modify.

The page for modifying the Exchange Server 2003 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Exchange Server 2003 application monitor."

5.     Click OK.

Viewing the Exchange Server 2003 application monitor report

After an Exchange Server 2003 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Exchange Server 2003 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Exchange Server 2003 application monitor to display the report.

Figure 93 shows part of an Exchange Server 2003 application monitor report.

Figure 93 Part of an Exchange Server 2003 application monitor report

exchange2003.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Exchange Server 2003 application.

·     IP Address—IP address of the Exchange Server 2003 host.

·     Application Type—Type of the monitored application, which is always Exchange 2003.

·     Last Polling Time—Time when APM last polled the Exchange Server 2003 application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Exchange Server 2003 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Exchange Server 2003 host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by Exchange Server 2003, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Exchange Server 2003 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Exchange Server 2003 in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Exchange Server 2003 in the last 30 days.

·     Available Time—Total amount of time that Exchange Server 2003 was available after 00:00 today.

·     Unavailable Time—Total amount of time that Exchange Server 2003 was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that Exchange Server 2003 was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that Exchange Server 2003 was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

IMAP

The IMAP area contains the following field:

·     Current Connections—Number of IMAP connections used by the Exchange Server 2003 application.

POP

The POP area contains the following field:

·     Current Connections—Number of POP connections used by the Exchange Server 2003 application.

Mailbox

Exchange Server allows you to organize the Exchange information store into multiple storage groups for mailbox storage and public folder storage management.

·     Storage group—A storage group contains log and assistant files to manage the databases that belong to the storage group. An Exchange Server 2003 host supports up to four storage groups, each of which supports up to five databases. Databases apply to mailbox storage and public folder storage.

·     Mailbox storage—Stores mailbox data of one or more users.

·     Public folder storage—Stores public folder data of one or more users.

The Mailbox area shows the mailbox usage of Exchange Server 2003. If the Exchange Server 2003 host has multiple mailboxes, this area displays the overall usage of them.

The Mailbox area contains the following fields:

·     Size—Disk space occupied by all mailboxes.

·     Rx Queue Length—Number of mail messages in the mailbox receive queue.

·     Tx Queue Length—Number of mail messages in the mailbox transmit queue.

·     Active Clients—Number of clients that operated a mailbox in the last 10 minutes.

·     Total Logins—Number of clients logging in to the mailboxes. The number also includes the system processes.

·     Logins/Sec—Number of login requests to the mailboxes per second.

·     Recipients Delivered/Min—Number of mails delivered to the recipients per minute.

·     Messages Delivered/Min—Average number of mail messages delivered from mailboxes to recipients per minute.

·     Messages Sent/Min—Average number of mail messages sent to the mailbox transmit queue per minute.

Public Folder

The Public Folder area shows the public folder usage of Exchange Server 2003. If the Exchange Server 2003 host has multiple public folders, this area displays the overall usage of them.

The Public Folder area contains the following fields:

·     Size—Disk space occupied by all public folders.

·     Tx Queue Length—Number of mail messages in the public folder storage transmit queue.

·     Rx Queue Length—Number of mail messages in the public folder storage receive queue.

·     Active Clients—Number of clients that operated a public folder in the last 10 minutes.

·     Total Logins—Number of clients logging in to the public folders. The number also includes the system processes.

·     Logins/Sec—Number of login requests to the mailboxes per second.

·     Messages Delivered/Min—Average number of mail messages delivered from public folders to recipients per minute.

·     Recipients Delivered/Min—Number of mails delivered to the recipients per minute.

·     Messages Sent/Min—Average number of mail messages sent to the public folder transmit queue per minute.

·     Messages Submitted/Min—Average number of mail messages submitted from mail clients to public folders per minute.

Statistics

The Statistics area monitors storage usage of Exchange Server 2003.

The Statistics area contains the following fields:

·     Active Connections—Number of connections to a mailbox or public folder in the last 10 minutes.

·     Connections—Number of client connections to the Exchange information store.

·     Active Users—Number of users that have performed operations in the last 10 minutes.

SRS

The SRS area displays replications between Exchange Server 2003 servers. The site replication service (SRS) performs replications between multiple Exchange Server 2003 servers to reduce the server load.

The SRS area contains the following fields:

·     Uncompleted Replications—Number of replications between sites that have not been completed in the queue.

·     Left Replication Updates—Number of received replication updates that have not been applied to the local server.

AL

The AL area contains the following field:

·     Address List Queue LengthLength of the address list queue.

ES

The ES area contains the following field:

·     Notification QueueNumber of notifications to be processed.

MTA Statistics

The MTA Statistics area monitors operation of the Message Transport Agent (MTA) of Exchange Server 2003.

The MTA Statistics area contains the following fields:

·     Working Queue Length—Number of mail messages that have not been processed by MTA in the working queue.

·     Bytes/Min—Number of bytes of mail messages processed by MTA per minute.

·     Bytes Received/Min—Number of bytes received by MTA through TCP/IP connections per minute.

·     Bytes Sent/Min—Number of bytes sent by MTA through TCP/IP connections per minute.

·     Recipient Queues—Total number of recipients of all mail messages in MTA.

·     Working Queue Bytes—Total number of bytes of all mail messages in MTA.

TD Statistics

The TD Statistics area monitors operation of the transport driver of Exchange Server 2003.

The TD Statistics area contains the following fields:

·     Message to Send—Number of mail messages delivered to the message database (MDB). MDB is a database instance of Exchange Server 2003. MDB can be identified as mailbox or public folder storage based on the stored data type.

·     Message from MTA to IS—Number of mail messages delivered from MTA to information storage (IS).

·     Message from IS to MTA—Number of mail messages delivered from IS to MTA.

·     Host Cache Hits—Number of cache hits.

Service

The Service area can monitor the following Exchange Server 2003 services:

·     Microsoft Exchange IMAP4

·     Microsoft Exchange Event

·     Microsoft Exchange Information Store

·     Microsoft Exchange Management

·     Microsoft Exchange MTA Stacks

·     Microsoft Exchange System Attendant

·     Microsoft Exchange Site Replication Service

·     Microsoft Exchange POP3

·     Microsoft Exchange Routing Engine

·     Simple Mail Transfer Protocol (SMTP)

If one or more services were not selected when the Exchange Server 2003 monitor was added, they cannot be monitored. For more information, see "Adding an Exchange Server 2003 application monitor."

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display NameService name or alias displayed on the Windows service console. For example, on the Windows service console, the Exchange Server 2003 MTA service uses the alias Microsoft Exchange MTA Stacks instead of the original name MSExchangeMTA. Typically, the display name identifies a service more clearly.

·     Status—Service state when APM last polled Exchange Server 2003.

SMTP Statistics

The SMTP Statistics area contains the following fields:

·     Inbound ConnectionsTotal number of inbound SMTP connections for the Exchange Server 2003 application.

·     Outbound ConnectionsTotal number of outbound SMTP connections for the Exchange Server 2003 application.

·     Local Retry Queue Length—Retry queue length of mail messages locally delivered by Exchange Server 2003 application.

·     Local Queue Length—Queue length of mail messages locally delivered by the Exchange Server 2003 application.

·     Remote Retry Queue Length—Retry queue length of mail messages delivered to the external mail system of the Exchange Server 2003 application.

·     Remote Queue Length—Queue length of mail messages delivered to the external mail system of the Exchange Server 2003 application.

·     Messages to Route—Number of mail messages to route by the Exchange Server 2003 application.

·     Messages Sent—Number of mail messages processed and locally sent by the Exchange Server 2003 application.

·     Messages Unsent—Number of mail messages failed to be delivered by the Exchange Server 2003 application.

·     Classified Queue Length—Number of mail messages in the classified queue of the Exchange Server 2003 application.

Exchange Server 2007

The Microsoft Exchange Server 2007 provides mail services for domain users by cooperating with Active Directory. It supports SMTP, POP3, and IMAP4 mail protocols.

APM lets you monitor Exchange Server 2007 hosts based on their server roles selected during deployment. Exchange Server 2007 supports the following server roles:

·     Mailbox role

·     Client Access role

·     Hub Transport role

·     Unified Messaging Server role

·     Edge Transport Server role

Adding an Exchange Server 2007 application monitor

APM monitors the Exchange Server 2007 application through WMI. When you add an Exchange Server 2007 application monitor, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Exchange Server 2007 is installed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add the Exchange Server 2007 host to be monitored to the IMC platform.

For a host managed in the IMC platform, APM obtains and displays network connections of the host and its access device in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows administrator's privileges.

·     To view traffic statistics in the monitor report of the Exchange Server 2007 application, make sure at least one probe is configured in APM. After an Exchange Server 2007 application monitor is added, APM sends the IP address and service ports of the monitored Exchange Server 2007 application to the probes for traffic collection.

To add an Exchange Server 2007 application monitor:

1.     Click the Resource tab.

2.     Display the Add Application page in two ways:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The page displays all application types that can be monitored by APM.

3.     Click Exchange 2007 of the Mail Server Monitor class.

The page for adding an Exchange Server 2007 application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the Exchange Server 2007 application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection PortEnter one or more comma-separated service port numbers for Exchange Server 2007. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Exchange Server 2007 administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Exchange Service—Select the Exchange 2007 services to be monitored by APM according to the server roles of Exchange Server 2007. The available services vary with the server roles deployed and include:

-     Microsoft Exchange Active Directory Topology

-     Microsoft Exchange Anti-spam Update

-     Microsoft Exchange EdgeSync

-     Microsoft Exchange File Distribution

-     Microsoft Exchange IMAP4

-     Microsoft Exchange Information Store

-     Microsoft Exchange Mailbox Assistants

-     Microsoft Exchange Mail Submission

-     Microsoft Exchange Monitoring

-     Microsoft Exchange POP3

-     Microsoft Exchange Replication

-     Microsoft Exchange System Attendant

-     Microsoft Exchange Search Indexer

-     Microsoft Exchange Service Host

-     Microsoft Exchange Transport

-     Microsoft Exchange Transport Log Search

-     Microsoft Exchange Unified Messaging

-     Microsoft Search (Exchange)

-     Microsoft Exchange ADAM

-     Microsoft Exchange Edge Credential Service

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Exchange Server 2007 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Exchange Server 2007 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Exchange Server 2007 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Exchange Server 2007 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Exchange Server 2007 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Exchange Server 2007 application monitor. If the IP address of a monitored Exchange Server 2007 changes, add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Exchange Server 2007 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Exchange 2007 application monitor you want to modify.

The page for modifying the Exchange Server 2007 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Exchange Server 2007 application monitor."

5.     Click OK.

Viewing the Exchange Server 2007 application monitor report

After an Exchange Server 2007 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Exchange Server 2007 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Exchange Server 2007 application monitor to display the report.

Figure 94 shows part of an Exchange Server 2007 application monitor report.

Figure 94 Part of an Exchange Server 2007 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Exchange Server 2007 application.

·     IP Address—IP address of the Exchange Server 2007 host.

·     Application Type—Type of the monitored application. It is always Exchange 2007 for an Exchange Server 2007 application monitor.

·     Last Polling Time—Time when APM last polled the Exchange Server 2007 application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Exchange Server 2007 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Exchange Server 2007 host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by Exchange Server 2007, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Exchange Server 2007 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Exchange Server 2007 in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Exchange Server 2007 in the last 30 days.

·     Available Time—Total amount of time that Exchange Server 2007 was available after 00:00 today.

·     Unavailable Time—Total amount of time that Exchange Server 2007 was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that Exchange Server 2007 was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that Exchange Server 2007 was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

IMAP4

The IMAP4 area contains the following field:

·     Current IMAP4 Connections—Number of IMAP4 connections used by the Exchange Server 2007 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of current IMAP4 connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of current IMAP4 connections.

POP3

The POP3 area contains the following field:

·     Current POP3 Connections—Number of POP3 connections used by the Exchange Server 2007 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of current POP3 connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of current POP3 connections.

SMTP Send

The SMTP Send area contains the following fields:

·     Connections—Number of outbound SMTP connections used by the Exchange Server 2007 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of outbound SMTP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of outbound SMTP connections.

·     Messages Sent/Sec—Number of mail messages sent per second by the SMTP service used by the Exchange Server 2007 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of mail messages sent per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of mail messages sent per second.

SMTP Receive

The SMTP Receive area contains the following fields:

·     Connections—Number of inbound SMTP connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of inbound SMTP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of inbound SMTP connections.

·     Messages Received/Sec—Number of mail messages received by the SMTP service per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of mail messages received by the SMTP service per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of mail messages received by the SMTP service per second.

Buffer State

The Buffer State area contains the following fields:

·     Uncompleted RPC Requests—Number of RPC requests that have not been processed.

·     RPC Requests Sent/Sec—Number of RPC requests sent per second.

·     Average Delay—Average delay of RPC requests.

·     Active Connections—Number of active connections in all connection caches.

·     Idle Connections—Number of idle connections in all connection caches.

·     Connections—Number of connection caches on the Exchange Server 2007 host.

·     Buffer Capability—Total size of connection caches on the Exchange Server 2007 host.

Transmit Queue State

The Transmit Queue State area contains the following fields:

·     Active Mailbox Delivery Queue Length—Number of mail messages in the active mailbox delivery queue.

·     Message for Delivery/Sec—Number of items to be delivered per second.

·     Messages for Delivery/Sec—Number of mail messages added to the mailbox transmit queue and to be delivered per second.

·     Mailbox Redelivery Queue Length—Number of mail messages in the redelivery queue.

·     Remote Redelivery Queue Length—Number of mail messages to be delivered in the remote redelivery queue.

·     Messages Submitted/Sec—Number of mail messages added to the submit queue per second.

Service Availability

The Availability Service area contains the following field:

·     Session Hits/Sec—Number of session hits in the mailbox per second.

Active Directory Access State

The Active Directory Access State area contains the following fields:

·     Buffer Hits/Sec—Number of active directory buffer hits per second.

·     Buffer Failures/Sec—Number of active directory buffer hit failures per second.

·     LDAP Queries/Sec—Number of LDAP query requests sent by Exchange Server 2007 per second.

·     Uncompleted Asynchronous Reads—Number of LDAP asynchronous read requests that have not been completed by Exchange Server 2007.

Application Traffic

APM collects Exchange 2007 traffic based on the IP address and port number of Exchange 2007.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by Exchange 2007 server over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Exchange 2007 server since 00:00 today.

Availability State

The Availability State area contains the following fields:

·     Available Requests/Sec—Number of client requests received by the availability service per second.

·     Public Folder Queries/Sec—Number of client requests to get the availability information from public folders per second.

·     Public Folder Request Failures/Sec—Number of client request failures to get the availability information from public folders per second.

Service

The Service area monitors the following Exchange Server 2007 services:

·     Microsoft Exchange Active Directory Topology

·     Microsoft Exchange Anti-spam Update

·     Microsoft Exchange EdgeSync

·     Microsoft Exchange File Distribution

·     Microsoft Exchange IMAP4

·     Microsoft Exchange Information Store

·     Microsoft Exchange Mailbox Assistants

·     Microsoft Exchange Mail Submission

·     Microsoft Exchange Monitoring

·     Microsoft Exchange POP3

·     Microsoft Exchange Replication

·     Microsoft Exchange System Attendant

·     Microsoft Exchange Search Indexer

·     Microsoft Exchange Service Host

·     Microsoft Exchange Transport

·     Microsoft Exchange Transport Log Search

·     Microsoft Exchange Unified Messaging

·     Microsoft Search (Exchange)

·     Microsoft Exchange ADAM

·     Microsoft Exchange Edge Credential Service

If one or more services were not selected when the Exchange Server 2007 monitor was added, they cannot be monitored. For more information, see "Adding an Exchange Server 2007 application monitor."

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display NameService name or alias displayed on the Windows service console. For example, on the Windows service console, the Exchange Server 2007 MTA service uses the alias Microsoft Exchange MTA Stacks instead of the original name MSExchangeMTA. Typically, the display name identifies a service more clearly.

·     Status—Service state of the Exchange Server 2007 application.

·     MoreClick More to view status of all services that are being monitored.

Exchange Server 2010

The Microsoft Exchange Server 2010 provides mail services for domain users by cooperating with Active Directory. It supports SMTP, POP3, and IMAP4 mail protocols.

Adding an Exchange Server 2010 application monitor

APM monitors the Exchange Server 2010 application through WMI. When you add an Exchange Server 2010 application monitor, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Exchange Server 2010 is installed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add the Exchange Server 2010 host to be monitored to the IMC platform.

For a host managed in the IMC platform, APM obtains and displays network connections of the host and its access device in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the username and password of the user who has the Windows administrator's privileges.

·     To view traffic statistics in the monitor report of the Exchange Server 2010 application, make sure at least one probe is configured in APM. After an Exchange Server 2010 application monitor is added, APM sends the IP address and service ports of the monitored Exchange Server 2010 application to the probes for traffic collection.

To add an Exchange Server 2010 application monitor:

1.     Click the Resource tab.

2.     Display the Add Application page in one of two ways:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The page displays all application types that can be monitored by APM.

3.     Click Exchange 2010 of the Mail Server Monitor class.

The page for adding an Exchange Server 2010 application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the Exchange Server 2010 application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection PortEnter one or more comma-separated service port numbers for Exchange Server 2010. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Exchange Server 2010 administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Exchange Service—Select one or more of the following Exchange Server 2010 services to be monitored by APM:

-     Microsoft Exchange Active Directory Topology

-     Microsoft Exchange Anti-spam Update

-     Microsoft Exchange EdgeSync

-     Microsoft Exchange File Distribution

-     Microsoft Exchange IMAP4

-     Microsoft Exchange Information Store

-     Microsoft Exchange Mail Submission

-     Microsoft Exchange Mailbox Assistants

-     Microsoft Exchange Replication

-     Microsoft Exchange Monitoring

-     Microsoft Exchange POP3

-     Microsoft Exchange Service Host

-     Microsoft Exchange Search Indexer

-     Microsoft Exchange Transport

-     Microsoft Exchange Transport Log Search

-     Microsoft Search (Exchange)

-     Microsoft Exchange System Attendant

-     Microsoft Exchange Address Book

-     Microsoft Exchange Mailbox Replication

-     Microsoft Exchange Protected Service Host

-     Microsoft Exchange RPC Client Access

-     Microsoft Exchange Server Extension for Windows Server Backup

-     Microsoft Exchange Throttling

-     Microsoft Exchange Forms-Based Authentication

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Exchange Server 2010 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Exchange Server 2010 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Exchange Server 2010 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Exchange Server 2010 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Exchange Server 2010 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Exchange Server 2010 application monitor. If the IP address of a monitored Exchange Server 2010 host changes, add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Exchange Server 2010 application monitor:

1.     Click the Resource tab

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Exchange 2010 application monitor you want to modify.

The page for modifying the Exchange Server 2010 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Exchange Server 2010 application monitor."

5.     Click OK.

Viewing the Exchange Server 2010 application monitor report

After an Exchange Server 2010 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Exchange Server 2010 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Exchange Server 2010 application monitor to display the report.

Figure 94 shows part of an Exchange Server 2010 application monitor report.

Figure 95 Part of an Exchange Server 2010 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Exchange Server 2010 application.

·     IP Address—IP address of the Exchange Server 2010 host.

·     Application Type—Type of the monitored application. It is always Exchange 2010 for an Exchange Server 2010 application monitor.

·     Last Polling Time—Time when APM last polled the Exchange Server 2010 application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Exchange Server 2010 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Exchange Server 2010 host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by Exchange Server 2010, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Exchange Server 2010 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Exchange Server 2010 in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Exchange Server 2010 in the last 30 days.

·     Available Time—Total amount of time that Exchange Server 2010 was available after 00:00 today.

·     Unavailable Time—Total amount of time that Exchange Server 2010 was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that Exchange Server 2010 was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that Exchange Server 2010 was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

IMAP

The IMAP area contains the following field:

·     Current IMAP Connections—Number of IMAP connections used by the Exchange Server 2010 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of current IMAP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of current IMAP connections.

POP

The POP area contains the following field:

·     Current POP Connections—Number of POP connections used by the Exchange Server 2010 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of POP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of POP connections.

SMTP Send

The SMTP Send area contains the following fields:

·     Connections—Number of outbound SMTP connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of outbound SMTP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of outbound SMTP connections.

·     Messages Sent/Sec—Number of mail messages sent per second by the SMTP service.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of mail messages sent by the SMTP service per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of mail messages sent by the SMTP service per second.

SMTP Receive

The SMTP Receive area contains the following fields:

·     Connections—Number of inbound SMTP connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of inbound SMTP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of inbound SMTP connections.

·     Messages Received/Sec—Number of mail messages received by the SMTP service per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of mail messages received by the SMTP service per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of mail messages received by the SMTP service per second.

Buffer State

The Buffer State area contains the following fields:

·     Uncompleted RPC Requests—Number of RPC requests that have not been processed.

·     RPC Requests Sent/Sec—Number of RPC requests sent per second.

·     Average Delay—Average delay of RPC requests.

·     Active Connections—Number of active connections in all connection caches.

·     Idle Connections—Number of idle connections in all connection caches.

·     Connections—Number of connection caches on the Exchange Server 2010 host.

·     Buffer Capability—Total size of connection caches on the Exchange Server 2010 host.

Transmit Queue State

The Transmit Queue State area contains the following fields:

·     Active Mailbox Delivery Queue Length—Number of mail messages in the active mailbox delivery queue.

·     Message for Delivery/Sec—Number of items to be delivered per second.

·     Messages for Delivery/Sec—Number of mail messages added to the mailbox transmit queue and to be delivered per second.

·     Mailbox Redelivery Queue Length—Number of mail messages in the redelivery queue.

·     Remote Redelivery Queue Length—Number of mail messages to be delivered in the remote redelivery queue.

·     Messages Submitted/Sec—Number of mail messages added to the submit queue per second.

Availability State

The Availability State area contains the following fields:

·     Available Requests/Sec—Number of client requests received by the availability service per second.

·     Public Folder Queries/Sec—Number of client requests to get the availability information from public folders per second.

·     Public Folder Request Failures/Sec—Number of client request failures to get the availability information from public folders per second.

Active Directory Access State

The Active Directory Access State area contains the following fields:

·     Buffer Hits/Sec—Number of active directory buffer hits per second.

·     Buffer Failures/Sec—Number of active directory buffer hit failures per second.

·     LDAP Queries/Sec—Number of LDAP query requests sent by Exchange Server 2010 per second.

·     Uncompleted Asynchronous Reads—Number of LDAP asynchronous read requests that have not been completed by Exchange Server 2010.

Application Traffic

APM collects Exchange 2010 traffic based on the IP address and port number of Exchange Server 2010.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by Exchange 2010 server over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Exchange 2010 server since 00:00 today.

Service

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display NameService name or alias displayed on the Windows service console. For example, on the Windows service console, the Exchange address book service uses the alias Microsoft Exchange Address Book instead of the original name MSExchangeAB. Typically, the display name identifies a service more clearly.

·     StatusRunning status of the service.

·     MoreClick More to view status of all services that are being monitored.

Exchange Server 2013

The Microsoft Exchange Server 2013 provides mail services for domain users by cooperating with Active Directory. It supports SMTP, POP3, and IMAP4 mail protocols.

Adding an Exchange Server 2013 application monitor

APM monitors the Exchange Server 2013 application through WMI. When you add an Exchange Server 2013 application monitor, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Exchange Server 2013 is installed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add the Exchange Server 2013 host to be monitored to the IMC platform.

For a host managed in the IMC platform, APM obtains and displays network connections of the host and its access device in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the username and password of the user who has the Windows administrator's privileges.

·     To view traffic statistics in the monitor report of the Exchange Server 2013 application, make sure at least one probe is configured in APM. After an Exchange Server 2013 application monitor is added, APM sends the IP address and service ports of the monitored Exchange Server 2013 application to the probes for traffic collection.

To add an Exchange Server 2013 application monitor:

1.     Click the Resource tab.

2.     Display the Add Application page in one of two ways:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The page displays all application types that can be monitored by APM.

3.     Click Exchange 2013 of the Mail Server Monitor class.

The page for adding an Exchange Server 2013 application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the Exchange Server 2013 application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection Port—Enter one or more comma-separated service port numbers for Exchange Server 2013. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Exchange Server 2013 administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     Exchange Service—Select one or more of the following Exchange Server 2013 services to be monitored by APM:

-     Microsoft Exchange Active Directory Topology

-     Microsoft Exchange Anti-spam Update

-     Microsoft Exchange Mailbox Transport Delivery

-     Microsoft Exchange Diagnostics

-     Microsoft Exchange EdgeSync

-     Microsoft Exchange Health Manager

-     Microsoft Exchange IMAP4 Backend

-     Microsoft Exchange Information Store

-     Microsoft Exchange Mailbox Replication

-     Microsoft Exchange Migration Workflow

-     Microsoft Exchange POP3 Backend

-     Microsoft Exchange RPC Client Access

-     Microsoft Exchange Service Host

-     Microsoft Exchange Mailbox Transport Submission

-     Microsoft Exchange Transport

-     Microsoft Exchange Transport Log Search

-     Microsoft Exchange Unified Messaging

-     Tracing Service for Search in Exchange

-     Microsoft Exchange Server Extension for Windows Server Backup

-     Microsoft Exchange Mailbox Assistants

-     Microsoft Exchange Throttling

-     Microsoft Exchange Replication

-     Microsoft Exchange DAG Management

-     Microsoft Exchange Search

-     Microsoft Exchange Frontend Transport

-     Microsoft Exchange IMAP4

-     Microsoft Exchange POP3

-     Microsoft Exchange Unified Messaging Call Router

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Exchange Server 2013 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Exchange Server 2013 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Exchange Server 2013 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application Group—Specify an application group for the Exchange Server 2013 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Exchange Server 2013 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Exchange Server 2013 application monitor. If the IP address of a monitored Exchange Server 2013 host changes, add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Exchange Server 2013 application monitor:

1.     Click the Resource tab

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Exchange 2013 application monitor you want to modify.

The page for modifying the Exchange Server 2013 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Exchange Server 2013 application monitor."

5.     Click OK.

Viewing the Exchange Server 2013 application monitor report

After an Exchange Server 2013 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Exchange Server 2013 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Exchange Server 2013 application monitor to display the report.

Figure 96 shows part of an Exchange Server 2013 application monitor report.

Figure 96 Part of an Exchange Server 2013 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameName of the application monitor.

·     Health Status—Health status of the Exchange Server 2013 application.

·     IP Address—IP address of the Exchange Server 2013 host.

·     Application Type—Type of the monitored application, which is always Exchange 2013.

·     Last Polling Time—Time when APM last polled the Exchange Server 2013 application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Exchange Server 2013 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the Exchange Server 2013 host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by Exchange Server 2013, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Exchange Server 2013 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of Exchange Server 2013 in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of Exchange Server 2013 in the last 30 days.

·     Available Time—Total amount of time that Exchange Server 2013 was available after 00:00 today.

·     Unavailable Time—Total amount of time that Exchange Server 2013 was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that Exchange Server 2013 was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that Exchange Server 2013 was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

IMAP

The IMAP area contains the following field:

·     Current Connections—Number of IMAP4 connections used by the Exchange Server 2013 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of current IMAP4 connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of current IMAP4 connections.

POP

The POP area contains the following field:

·     Current Connections—Number of POP connections used by the Exchange Server 2013 application.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of POP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of POP connections.

SMTP Send

The SMTP Send area contains the following fields:

·     Connections—Number of outbound SMTP connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of outbound SMTP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of outbound SMTP connections.

·     Messages Sent/Sec—Number of mail messages sent per second by the SMTP service.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of mail messages sent by the SMTP service per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of mail messages sent by the SMTP service per second.

SMTP Receive

The SMTP Receive area contains the following fields:

·     Connections—Number of inbound SMTP connections.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of inbound SMTP connections.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of inbound SMTP connections.

·     Messages Received/Sec—Number of mail messages received by the SMTP service per second.

¡     Click the History Record icon icon_history_16x16.png to view the history graph for the number of mail messages received by the SMTP service per second.

¡     Click the Set Threshold icon  to set alarm thresholds for the number of mail messages received by the SMTP service per second.

Transmit Queue State

The Transmit Queue State area contains the following fields:

·     Active Mailbox Delivery Queue Length—Number of mail messages in the active mailbox delivery queue.

·     Message for Delivery/Sec—Number of items to be delivered per second.

·     Messages for Delivery/Sec—Number of mail messages added to the mailbox transmit queue and to be delivered per second.

·     Mailbox Redelivery Queue Length—Number of mail messages in the redelivery queue.

·     Messages Submitted/Sec—Number of mail messages added to the submit queue per second.

Availability State

The Availability State area contains the following fields:

·     Available Requests/Sec—Number of client requests received by the availability service per second.

·     Public Folder Queries/Sec—Number of client requests to get the availability information from public folders per second.

·     Public Folder Request Failures/Sec—Number of client request failures to get the availability information from public folders per second.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by Exchange 2013 server over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Exchange 2013 server since 00:00 today.

Service

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display Name—Service name or alias displayed on the Windows service console. For example, on the Windows service console, the Exchange address book service uses the alias Microsoft Exchange Address Book instead of the original name MSExchangeAB. Typically, the display name identifies a service more clearly.

·     StatusRunning status of the service.

·     More—Click More to view the status of all services that are being monitored.

POP3

The Post Office Protocol with version 3 (POP3) enables local email clients to retrieve mail messages from a remote mail server to their local hosts for management. Most mail servers support POP3.

Adding a POP3 application monitor

APM monitor the POP3 application through the POP3 service port (110 by default). Before adding a POP3 application monitor, follow these guidelines:

·     Add the host that provides the POP3 service to be monitored to the IMC platform.

For a host managed in the IMC platform, APM obtains and displays network connections of the host and its access device in the application topology. For information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the email address and mailbox account information to test the POP3 service by using APM as an email client.

·     To view traffic statistics in the monitor report of the POP3 application, make sure at least one probe is configured in APM. After a POP3 application monitor is added, APM sends the IP address and service ports of the monitored POP3 application to the probes for traffic collection.

To add a POP3 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The page displays all application types that can be monitored by APM.

3.     Click POP3 of the Mail Server Monitor class.

The page for adding a POP3 application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the POP3 application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the POP3 service port. The default value is 110. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection PortEnter one or more comma-separated POP3 service port numbers. The default value is 110. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password used to access the mailbox through POP3. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of POP3 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that POP3 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between POP3 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the POP3 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a POP3 application monitor

Authorized users can modify all parameters except the IP address and the APM server for a POP3 application monitor. If the IP address of a monitored POP3 host changes, add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a POP3 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the POP3 application monitor you want to modify.

The page for modifying the POP3 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a POP3 application monitor."

5.     Click OK.

Viewing the POP3 application monitor report

After a POP3 application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the POP3 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a POP3 applic0ation monitor to display the report.

Figure 97 shows part of a POP3 application monitor report.

Figure 97 Part of a POP3 application monitor report

POP3.PNG

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the POP3 application.

·     IP Address—IP address of the POP3 host.

·     Application Type—Type of the monitored application. It is always POP3 for a POP3 application monitor.

·     PortPOP3 service port.

·     Last Polling Time—Time when APM last polled the POP3 application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the POP3 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the POP3 host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by Exchange POP3, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the POP3 service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the POP3 application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the POP3 application in the last 30 days.

·     Available Time—Total amount of time that the POP3 service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the POP3 service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the POP3 service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the POP3 service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round trip response time of the POP3 service.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

Application Traffic

APM collects POP3 traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by POP3 over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by POP3 since 00:00 today.

SMTP

Simple Mail Transfer Protocol (SMTP) is an Internet standard protocol for email transmission between source and destination addresses. Most mail servers support SMTP.

Adding an SMTP application monitor

APM monitor the SMTP application through the SMTP service port (25 by default). Before adding an SMTP application monitor, follow these guidelines:

·     Add the host that provides the SMTP service to be monitored to the IMC platform.

For a host managed in the IMC platform, APM obtains and displays network connections of the host and its access device in the application topology. For information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the email address and mailbox account information to test the SMTP service by using APM as an email client.

·     To view traffic statistics in the monitor report of the SMTP application, make sure at least one probe is configured in APM. After an SMTP application monitor is added, APM sends the IP address and service ports of the monitored SMTP application to the probes for traffic collection.

To add an SMTP application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

The page displays all application types that can be monitored by APM.

3.     Click SMTP of the Mail Server Monitor class.

The page for adding an SMTP application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host on which the SMTP application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the SMTP service port. The default value is 110. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection PortEnter one or more comma-separated SMTP service port numbers. The default value is 110. This field is displayed only when at least one probe is configured for APM and is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources.

¡     Username/Password—Enter the username and password used to access the mailbox through SMTP. This field is available only when you select Disable from the Use Template list.

¡     Email Address—Enter a valid email address that is located on the host that provides the SMTP service. For example, apm@imc.com. APM uses the email address to send and receive a test mail. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SMTP applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that SMTP depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between SMTP and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the SMTP application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an SMTP application monitor

Authorized users can modify all parameters except the IP address and the APM server for an SMTP application monitor. If the IP address of a monitored SMTP host changes, add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an SMTP application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the SMTP application monitor you want to modify.

The page for modifying the SMTP application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an SMTP application monitor."

5.     Click OK.

Viewing the SMTP application monitor report

After an SMTP application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the SMTP application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an SMTP application monitor to display the report.

Figure 98 shows part of an SMTP application monitor report.

Figure 98 Part of an SMTP application monitor report

STMP.PNG

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the SMTP application.

·     IP Address—IP address of the SMTP host.

·     Application Type—Type of the monitored application. It is always SMTP for an SMTP application monitor.

·     PortSMTP service port.

·     Last Polling Time—Time when APM last polled the SMTP application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the SMTP application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the SMTP host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by SMTP, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SMTP service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the SMTP application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the SMTP application in the last 30 days.

·     Available Time—Total amount of time that the SMTP service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SMTP service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the SMTP service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SMTP service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round trip response time of the SMTP service in the last polling period.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

Application Traffic

APM collects SMTP traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by SMTP over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by SMTP since 00:00 today.


Web service monitor

This chapter describes how to add and modify Web service monitors, and helps you view relevant monitor reports.

RESTful Web service

Representational State Transfer (REST) is a predominant Web service design model and typically applies to HTTP-based APIs. A Web API or service that complies with constraints of REST architecture is called "RESTful Web service."

APM can monitor the running status of RESTful Web services. This section describes how to add and modify an application monitor for a RESTful Web service, and helps you view the monitor report.

Adding a RESTful Web service application monitor

APM monitors the RESTful Web service through the HTTP port that service uses. When you add a RESTful Web service application monitor, follow these guidelines:

·     Add the RESTful Web service host to the IMC platform so APM can obtain and display network connections of the host and the access device. For information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the username and password to access the RESTful Web service to be monitored if the service requires identity authentication.

·     To view traffic statistics in the monitor report of the RESTful Web service application, make sure at least one probe is configured in APM. After a RESTful Web service application monitor is added, APM sends the IP address and port of the monitored RESTful Web service application to the probes for traffic collection.

To add an application monitor for the RESTful Web service:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click REST Service of the Web Service Monitor class.

The page for adding a RESTful Web service application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host where the RESTful Web service to be monitored resides. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the HTTP port used by the RESTful Web service. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the port used by the RESTful Web service to provide services. The field is displayed only after at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password used to access the RESTful Web service if the service requires identity authentication. The fields are available only when you select Disable from the Use Template list.

¡     Path—Enter the URL of the RESTful Web service. Do not include the IP address or port information in the URL. APM determines whether the RESTful Web service is available by accessing the specified URL. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of RESTful Web service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the RESTful Web service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the RESTful Web service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the RESTful Web service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a RESTful Web service application monitor

Authorized users can modify all parameters except the IP address and the APM server for a RESTful Web service application monitor. When the IP address of a monitored RESTful Web service host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a RESTful Web service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the RESTful Web service application monitor you want to modify.

The page for modifying the RESTful Web service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a RESTful Web service application monitor."

5.     Click OK.

Viewing the RESTful Web service application monitor report

After a RESTful Web service application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the RESTful Web service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a RESTful Web service application monitor to display the report.

Figure 99 shows part of a RESTful Web service application monitor report.

Figure 99 Part of a RESTful Web service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the RESTful Web service.

·     IP Address—IP address of the host on which the RESTful Web service is located.

·     Application Type—Type of the monitored application, which is always REST Service.

·     Last Polling Time—Time when APM last polled the RESTful Web service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the RESTful Web service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the RESTful Web service. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the RESTful Web service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the RESTful Web service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the RESTful Web service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the RESTful Web service in the last 30 days.

·     Available Time—Total amount of time that the RESTful Web service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the RESTful Web service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the RESTful Web service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the RESTful Web service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round trip response time of the RESTful Web service.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

SOAP-based Web service

Simple Object Access Protocol (SOAP) is used by Web services for exchanging XML messages typically through HTTP and SMTP.

APM can monitor the running status of SOAP-based Web services. This chapter describes how to add and modify an application monitor for a SOAP-based Web service, and helps you view the monitor report.

Adding a SOAP-based Web service application monitor

APM monitors a SOAP-based Web service through accessing the HTTP port that service uses. When you add a SOAP-based Web service application monitor, follow these guidelines:

·     Add the RESTful Web service host to the IMC platform so APM can obtain and display network connections of the host and the access device. For information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the username and password used to access the SOAP-based Web service if the service requires identity authentication.

·     To view traffic statistics in the monitor report of the SOAP-based Web service application, make sure at least one probe is configured in APM. After a SOAP-based Web service application monitor is added, APM sends the IP address and port of the monitored RESTful Web service application to the probes for traffic collection.

To add an application monitor for the SOAP-based Web service:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click SOAP Service of the Web Service Monitor class.

The page for adding a SOAP-based Web service application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the host where the SOAP-based Web service to be monitored resides. If the host is already added to the IMC platform, you can also click Select, and then select the host from the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the HTTP port used by the SOAP-based Web service. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the port used by the SOAP-based Web service to provide services. This field is displayed only after at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password used to access the SOAP-based Web service if the service requires identity authentication. The fields are available only when you select Disable from the Use Template list.

¡     Path—Enter the URL of the SOAP-based Web service. Do not include the IP address or port information in the URL. APM determines whether the SOAP-based Web service is available by accessing the specified URL. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SOAP-based Web service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the SOAP-based Web service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the SOAP-based Web service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the SOAP-based Web service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a SOAP-based Web service application monitor

Authorized users can modify all parameters except the IP address and the APM server for a SOAP-based Web service application monitor. When the IP address of a monitored SOAP-based Web service host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a SOAP-based Web service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the SOAP-based Web service application monitor you want to modify.

The page for modifying the SOAP-based Web service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a SOAP-based Web service application monitor."

5.     Click OK.

Viewing the SOAP-based Web service application monitor report

After a SOAP-based Web service is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the SOAP-based Web service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a SOAP-based Web service application monitor to display the report.

Figure 100 shows part of a SOAP-based Web service application monitor report.

Figure 100 Part of a SOAP-based Web service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the SOAP-based Web service.

·     IP Address—IP address of the host on which the SOAP-based Web service is located.

·     Application Type—Type of the monitored application, which is always SOAP Service.

·     Last Polling Time—Time when APM last polled the SOAP-based Web service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the SOAP-based Web service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the SOAP-based Web service. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the SOAP-based Web service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SOAP-based Web service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the SOAP-based Web service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the SOAP-based Web service in the last 30 days.

·     Available Time—Total amount of time that the SOAP-based Web service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SOAP-based Web service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the SOAP-based Web service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SOAP-based Web service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round trip response time of the SOAP-based Web service.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.


LDAP service monitor

This chapter describes how to add and modify LDAP service application monitors, and how to view relevant monitor reports.

Active Directory service

Active Directory (AD) is a directory service developed based on Lightweight Directory Access Protocol (LDAP) to run on the Windows Server operating systems. Administrators can easily locate the objects stored in the AD.

APM supports monitoring the running status of the AD service. This section describes how to add and modify the application monitor for the AD service and helps you view the monitor report.

Adding an AD service application monitor

APM monitors the AD service through WMI. Before adding an AD application monitor, complete the following tasks:

·     Add AD service hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows Server administrator's privileges.

·     To view traffic statistics in the monitor report of the AD service application, make sure at least one probe is configured in APM. After an AD service application monitor is added, APM sends the IP address and service port of the monitored AD service application to the probes for traffic collection.

To add an AD service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page in one of the two following ways:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Active Directory of the LDAP Service Monitor class.

The page for adding an AD service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the AD service application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection Port—Enter the listening port number for AD service. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the authorized Windows Server host administrator. This field is available only when you select Disable from the Use Template list.

If the administrator is a domain user, use the domain name\username format.

If the administrator is a local user, use the host name\username or IP address\username, or username.

¡     Password—Enter the password of the administrator. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of AD service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the AD service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between AD service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the AD service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an AD service application monitor

Authorized users can modify all parameters except the IP address and the APM server for an AD service application monitor. When the IP address of a monitored AD service changes, operators must add a new application monitor for the AD service. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an AD service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the desired AD service application monitor.

The page for modifying the AD service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an AD service application monitor."

5.     Click OK.

Viewing the AD service application monitor report

After an AD service application monitor is added, APM collects application index data, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the AD service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an AD service application monitor to display the report.

Figure 101 shows part of an AD service application monitor report.

Figure 101 Part of an AD service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the AD service.

·     IP Address—IP address of the AD service host.

·     Application Type—Type of the monitored application, which is always Active Directory.

·     Last Polling Time—Time when APM last polled the AD service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between AD service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the AD service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the AD service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the AD service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of AD service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of AD service in the last 30 days.

·     Available Time—Total amount of time that the AD service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the AD service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the AD service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the AD service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Network Monitor

The Network Monitor area contains the following fields:

·     ABClient Sessions—Number of connected ABClient sessions of the AD service. Click the History Record icon icon_history_16x16.png to view the history graph for the number of connected ABClient sessions.

·     DS Notification Queue Size—Number of pending update notifications that have been queued but not yet sent to clients. Click the History Record icon icon_history_16x16.png to view the history graph for the size of DS notification queue.

Database

The database of the AD service is the ntds.dit file, which is the core of the AD service and stores large amount of domain data.

The Database area contains the following field:

·     File Size—Size of the ntds.dit file. Click the History Record icon icon_history_16x16.png to view the history graph for the size of the file.

NTFRS Process

The NTFRS process refers to the File Replication Service of AD. It is used for file synchronization among multiple domain controllers (DCs) deployed with AD, ensuring global synchronization of domain accounts and user configuration files.

The NTFRS Process area contains the following fields:

·     CPU Usage Ratio—CPU usage ratio of the NTFRS process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

·     Handles—Total number of handles opened by the NTFRS process. Click the History Record icon icon_history_16x16.png to view the history graph for the number of handles.

·     IO Read Rate—Rate at which the NTFRS process is reading data from I/O operations. The I/O activity includes network, file, and device I/Os. Click the History Record icon icon_history_16x16.png to view the history graph of the I/O read rate.

·     IO Write Rate—Rate at which the NTFRS process is writing data to I/O operations. The I/O activity includes network, file, and device I/Os. Click the History Record icon icon_history_16x16.png to view the history graph of the I/O write rate.

LSASS Process

The Local Security Authority Subsystem Service (LSASS) process of the Windows operating system processes authentication requests and permits/denies user requests. It processes domain logins from users in AD.

The LSASS Process area contains the following fields:

·     CPU Usage in LSASS Process—CPU usage ratio of the LSASS process.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

·     Handles—Total number of handles opened by the LSASS process. Click the History Record icon icon_history_16x16.png to view the history graph for the number of handles.

·     IO Read Rate—Rate at which the LSASS process is reading data from I/O operations. The I/O activity includes network, file, and device I/Os. Click the History Record icon icon_history_16x16.png to view the history graph of the I/O read rate.

·     IO Write Rate—Rate at which the LSASS process is writing data to I/O operations. The I/O activity includes network, file, and device I/Os. Click the History Record icon icon_history_16x16.png to view the history graph of the I/O write rate.

Performance

The Performance area contains the following fields:

·     Client Bindings/Sec—Number of DC-to-client bindings per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of DC-to-client bindings per second.

·     Server Bindings/Sec—Number of DC-to-DC bindings per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of DC-to-DC bindings per second.

·     Directory Reads/Sec—Number of reads from directory per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of reads from the directory per second.

·     Directory Writes/Sec—Number of writes to directory per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of writes to the directory per second.

Copy Statistics

The Copy Statistics area contains the following fields:

·     Copied Objects/Sec—Rate at which replication updates received from ADs are applied by the local AD. This counter excludes changes that are received but not applied. Click the History Record icon icon_history_16x16.png to view the history graph for the number of copied objects per second.

·     Left Objects/Sec—Number of object updates received in the current directory replication update packet that have not yet been applied to the local AD. Click the History Record icon icon_history_16x16.png to view the history graph for the number of remaining objects.

·     Inbound Objects/Sec—Number of objects received per second from other ADs through inbound replication. Click the History Record icon icon_history_16x16.png to view the history graph for the number of inbound objects per second.

·     Outbound Objects/Sec—Number of objects sent per second to other ADs through outbound replication. Click the History Record icon icon_history_16x16.png to view the history graph for the number of outbound objects per second.

·     Inbound Rate—Inbound replication rate of the current AD. Click the History Record icon icon_history_16x16.png to view the history graph for the inbound rate.

·     Outbound Rate—Outbound replication rate of the current AD. Click the History Record icon icon_history_16x16.png to view the history graph for the outbound rate.

LDAP Statistics

The LDAP Statistics area contains the following fields:

·     Active LDAP Threads—Number of threads used by the LDAP subsystem. Click the History Record icon icon_history_16x16.png to view the history graph for the number of active LDAP threads.

·     LDAP Binding Time—Time used for the last LDAP binding. Click the History Record icon icon_history_16x16.png to view the history graph of the LDAP binding time.

·     LDAP Client Sessions—Number of currently connected LDAP client sessions. Click the History Record icon icon_history_16x16.png to view the history graph for the number of LDAP client sessions.

·     LDAP Searches/Sec—Number of searches performed by LDAP clients per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of searches performed by LDAP clients per second.

·     LDAP UDP Operations/Sec—Number of UDP operations processed by the LDAP subsystem per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of LDAP UDP operations per second.

·     LDAP Writes/Sec—Number of writes performed by LDAP clients per second. Click the History Record icon icon_history_16x16.png to view the history graph for the number of LDAP writes per second.

Active Directory Service

APM can obtain the service status on the server where AD the service is located through WMI parameters. When monitoring the AD service, APM monitors the following services that are closely related to the proper operation of AD:

·     Windows Time

·     DNS Client

·     File Replication Service

·     Intersite Messaging

·     Kerberos Key Distribution Center

·     Security Accounts Manager

·     Server

·     Workstation

·     Remote Procedure Call

·     Net Logon

The names of these services are display names. Operators can view the services on the service console of the server where AD is located.

The Active Directory Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display Name—Service name or alias displayed on the Windows service console. For example, on the Windows service console, the DNS client service uses the alias DNS Client rather than the original name DNScache. Typically, the display name identifies a service more clearly.

·     State—Service state in the last polling interval. A service whose state is not Running might cause abnormality of the AD service.

LDAP service

This section describes how to add and modify the application monitor for the LDAP service and helps you view the monitor report.

Adding an LDAP service application monitor

APM monitors the running state of the LDAP service through the LDAP service port (TCP port 389 by default). Before adding an LDAP service application monitor, complete the following tasks:

·     Add LDAP service hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the username and password used to query the LDAP service. APM uses the LDAP username and password to access the LDAP service.

To add an LDAP service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page in one of the two following ways:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click LDAP of the LDAP Service Monitor class.

The page for adding an LDAP service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the LDAP service application to be monitored is installed. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     DescriptionEnter a description for the application monitor to aid maintenance.

¡     Application Monitor Port—Enter the listening port of the LDAP service. The default is TCP port 389. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the LDAP username following the applicable LDAP product format (see the product user manual). This field is available only when you select Disable from the Use Template list.

In the Username area, user test in domain imc.com belongs to Organization Unit (OU) apm. Enter Username as: cn=test, ou=apm, dc=imc, dc=com.

¡     Password—Enter the password of the LDAP user. This field is available only when you select Disable from the Use Template list.

¡     Search Filter—Enter the criteria for filtering queried entries. For example, if you enter cn=*, entries with any name are displayed. You can set the AND or OR relationship between multiple criteria. The AND or OR relationship setting varies with LDAP products. For more information, see the relevant product manual. This field is available only when you select Disable from the Use Template list.

¡     Base DN—Enter the basic directory for query. For example, if you enter ou=apm, dc=imc, dc=com, APM queries only entries of OU apm in the domain imc.com. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of LDAP service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the LDAP service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between LDAP service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the LDAP service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an LDAP service application monitor

Authorized users can modify all parameters except the IP address and the APM server for an LDAP service application monitor. If the IP address of the host where the LDAP service is located changes, add a new application monitor for the LDAP service. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an LDAP service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the LDAP service application monitor you want to modify.

The page for modifying the LDAP service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an LDAP service application monitor."

5.     Click OK.

Viewing the LDAP service application monitor report

After adding the LDAP service application monitor, APM starts collecting index data of the application to calculate its availability and health status. Authorized users obtain monitor indexes of the LDAP service by viewing the monitor report.

To access the LDAP service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an LDAP service application monitor to display the report.

Figure 102 shows part of an LDAP service application monitor report.

Figure 102 Part of an LDAP service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the LDAP service.

·     IP Address—IP address of the LDAP service host.

·     Application Type—Type of the monitored application, which is always LDAP.

·     Port—Listening port number of LDAP service. The default is 389.

·     Last Polling Time—Time when APM last polled the LDAP service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between AD service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the LDAP service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the LDAP service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the LDAP service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the LDAP service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the LDAP service in the last 30 days.

·     Available Time—Total amount of time that the LDAP service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the LDAP service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the LDAP service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the LDAP service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Login Details

APM uses the username and password configured in the LDAP service application monitor to access the LDAP service at every polling interval.

The Login Details area contains the following field:

·     Login Time—Time taken for APM to pass the LDAP authentication by using the LDAP username and password. Click the History Record icon icon_history_16x16.png to view the history graph of the login time.

Search Details

After passing the LDAP authentication, APM queries all entries of the search base according to the Search Base and Query Filter configured in the LDAP service application monitor.

The Search Details area contains the following fields:

·     Search Time—Time taken for APM to query all entries passing the query filter in the Search Base and obtain the query result. Click the History Record icon icon_history_16x16.png to view the history graph of the search time.

·     Response Time—Time taken for APM to access the LDAP service and complete a query. The response time approximately equals login time plus search time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

Search Result

The Search Result area contains the following fields:

¡     Result—Result (successful or not) of the query for entries passing the query filter in the Search Base.

¡     Rows—Number of entries passing the query filter in the Search Base.


File/Directory monitor

This chapter describes how to add and modify file/directory monitors, and helps you view relevant monitor reports.

File

APM can monitor the size and last modification time of individual files on Windows, UNIX, and Linux operating systems. This section describes how to add a file monitor, and helps you view the monitor report.

Adding a file monitor

APM can monitor files through WMI or CLI. When you add application monitors for files, follow these guidelines:

·     Add the file host to the IMC platform so that APM can obtain and display network connections of the host and the access device in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To monitor a file on a Windows host, first configure and enable WMI for the Windows operating system (see the Microsoft Windows operating system online help), and provide the username and password of the user who has the Windows administrator's privileges.

·     To monitor a file on a Linux or UNIX host, first enable Telnet or SSH for the host (see the Linux configuration guide), and provide the username and password of the user who has the administrator's privileges.

To add a file monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click File of the File/Directory Monitor class.

The page for adding a file monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the file to be monitored is located. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, Telnet, or WMI) through which APM monitors the file application, and then click the Configure icon  (not available for WMI) to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on the operating system where the file is located.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password.

The following parameters to be configured vary with authentication modes:

 

Parameter

Remarks

Username

Enter the SSH username. The user must have the operating system administrator's privilege.

Password

Enter the password of the SSH user.

Private Key File

Enter the directory of the SSH private key file or browse to the file.

Private Key Password

Enter the password to decrypt the SSH private key file.

Super Password

Enter the super password with which an SSH user can elevate privileges after login.

 

-     PortEnter the SSH port on the operating system.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from the operating system. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from the operating system within the timeout time, APM considers the interaction a failure.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the operating system host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on the operating system where the file is located.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password.

The following parameters to be configured vary with authentication modes:

 

Parameter

Remarks

Username

Enter the Telnet username. The user must have the operating system administrator's privilege.

Password

Enter the password of the Telnet user.

Super Password

Enter the super password with which a Telnet user can elevate privileges after login.

 

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from the operating system. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from the operating system within the timeout time, APM considers the interaction a failure.

When WMI is selected, configure the following parameters:

-     Username—Enter the username of the Windows administrator.

If the administrator is a domain user, use domain name\username.

If the administrator is a local user, use host name\username or IP address\username, or use username.

-     Password—Enter the password of the administrator.

¡     File Name—Enter the absolute path and name of the file you want to monitor. Use the C:\pagefile.sys format for Windows, or the /var/log/messages format for Linux and UNIX.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of file applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the file application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the file and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the file application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a file monitor

Authorized users can modify all parameters except the IP address and the APM server for a file monitor. If the IP address of the host where the monitored file is located changes, operators must add a new application monitor for the file. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a file monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the file monitor you want to modify.

The page for modifying the file monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a file monitor"

5.     Click OK.

Viewing the file monitor report

After a file application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the file monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a file monitor to display the report.

Figure 103 shows part of a file monitor report.

Figure 103 Part of a file monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the file.

·     IP Address—IP address of the host where the file is located.

·     Application Type—Type of the monitored application, which is always File.

·     File LocationAbsolute path of the monitored file.

·     Last Polling Time—Time when APM last polled the file.

·     RelationshipClick the Relationship icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the file. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the file.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the file.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the file in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the file in the last 30 days

·     Available Time—Total amount of time that the file was available after 00:00 today.

·     Unavailable Time—Total amount of time that the file was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the file was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the file was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

File Statistics

The File Statistics area contains the following fields:

·     File Size—Size of the file. Click the Set Threshold icon  to set alarm thresholds for the file size.

·     Last Modified—Time when the file was most recently modified.

Directory

APM can monitor the size of individual directories on Windows, UNIX, and Linux operating systems. This section describes how to add and modify a directory monitor, and helps you view the monitor report.

Adding a directory monitor

APM can monitor directories through WMI or CLI. When you add application monitors for directories, follow these guidelines:

·     Add the host where the directory to be monitored is located to the IMC platform so that APM can obtain and display network connections of the host and the access device in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To monitor a directory on a Windows host, first configure and enable WMI for the Windows operating system (see the Microsoft Windows operating system online help), and provide the username and password of the user who has the Windows administrator's privileges.

·     To monitor a directory on a Linux or UNIX host, first enable Telnet or SSH for the host (see the Linux configuration guide), and configure the Telnet or SSH username and password on both the host and the IMC platform. The Telnet or SSH user must have the administrator privilege.

To add a directory monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Directory of the File/Directory Monitor class.

The page for adding a directory monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host where the directory to be monitored is located. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH, Telnet, or WMI) through which APM monitors the file application, and then click the Configure icon  (not available for WMI) to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on the operating system where the file is located.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password.

The following parameters to be configured vary with authentication modes:

 

Parameter

Remarks

Username

Enter the SSH username. The user must have the operating system administrator's privilege.

Password

Enter the password of the SSH user.

Private Key File

Enter the directory of the SSH private key file or browse to the file.

Private Key Password

Enter the password to decrypt the SSH private key file.

Super Password

Enter the super password with which an SSH user can elevate privileges after login.

 

-     PortEnter the SSH port on the operating system.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from the operating system. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from the operating system within the timeout time, APM considers the interaction a failure.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the operating system host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on the operating system where the file is located.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password.

The following parameters to be configured vary with authentication modes:

 

Parameter

Remarks

Username

Enter the Telnet username. The user must have the operating system administrator's privilege.

Password

Enter the password of the Telnet user.

Super Password

Enter the super password with which a Telnet user can elevate privileges after login.

 

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from the operating system. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from the operating system within the timeout time, APM considers the interaction a failure.

When WMI is selected, configure the following parameters:

-     Username—Enter the username of the Windows administrator.

If the administrator is a domain user, use domain name\username.

If the administrator is a local user, use host name\username or IP address\username, or use username.

-     Password—Enter the password of the administrator.

¡     Directory Name—Enter the absolute path and name of the directory you want to monitor. Use the C:\Windows format for Windows or the /home/Apache format for Linux and UNIX. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of directory applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the directory application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the directory and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the directory application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a directory monitor

Authorized users can modify all parameters except the IP address and the APM server for a directory monitor. When the IP address of the host where the monitored directory is located changes, operators must add a new application monitor for the directory. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a directory monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the directory monitor you want to modify.

The page for modifying the directory monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a directory monitor."

5.     Click OK.

Viewing the directory monitor report

After a directory application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the directory monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a directory monitor to display the report.

Figure 104 shows part of a directory monitor report.

Figure 104 Part of a directory monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the directory.

·     IP Address—IP address of the host where the directory is located.

·     Application Type—Type of the monitored application, which is always Directory.

·     Directory LocationAbsolute path of the monitored directory.

·     Last Polling Time—Time when APM last polled the directory.

·     RelationshipClick the Relationship icon icon_dep_topo_16x16.png to view relations between applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the directory. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the directory.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the directory.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the directory in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the directory in the last 30 days.

·     Available Time—Total amount of time that the directory was available after 00:00 today.

·     Unavailable Time—Total amount of time that the directory was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the directory was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the directory was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Directory Statistics

The Directory Statistics area contains the following fields:

·     Directory Size—Disk space occupied by the directory.

¡     Click the Set Threshold icon  to set alarm thresholds for the directory size.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the directory size.

·     Sub Directory CountsNumber of sub directories.

·     File CountsNumber of files.

Directory Incremental

The Directory Incremental area contains the following field:

·     Directory Incremental—Size change of the directory. Click the History Record icon icon_history_16x16.png to view the history graph of the directory incremental.


Service monitor

This chapter describes how to add and modify service application monitors, and helps you view relevant monitor reports.

SNMP service

Simple Network Management Protocol (SNMP) is a network management protocol widely supported by operating systems and network devices. SNMP MIB uses a hierarchical structure to describe nodes on the network, each of which is identified by a unique OID. Network management systems can obtain various index data from devices by reading their OIDs via SNMP. The default SNMP service port is UDP 161.

APM monitors the SNMP service status by reading specific OIDs. This section describes how to add and modify an SNMP service application monitor, and helps view the monitor report.

Adding an SNMP service application monitor

When you add an SNMP monitor, follow these guidelines:

·     SNMP is enabled and configured on the SNMP hosts to be monitored.

·     The target SNMP hosts must be added to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the SNMP service application, make sure at least one probe is configured in APM. After an SNMP service application monitor is added, APM sends the IP address of the monitored SNMP service application to the probes for traffic collection.

To add an SNMP service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click SNMP Monitor of the Service Monitor class.

The page for adding an SNMP service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the SNMP service application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     OID—Enter the OID for SNMP monitoring. You can obtain OIDs by using a network management tool. For example, the OID of the system up time (sysUpTime) is 1.3.6.1.2.1.1.3.0. This field is available only when you select Disable from the Use Template list.

¡     OID Data TypeSelect the type of the returned OID data. Options are the following:

-     NULL

-     INTEGER

-     BITS

-     OCTET STRING

-     OBJECT IDENTIFIER

-     Integer32

-     IpAddress

-     Counter32

-     Gauge32

-     TimeTicks

-     Counter64

-     Unsigned32

-     DateAndTime

APM can resolve only the returned OID data that has correct OID data type. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the SNMP service port. The default value is 161. This field is displayed only when at least one probe is configured for APM and when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     SNMPSet the SNMP version and the corresponding access parameters. Click the Configure icon  on the right of the SNMP window, set the SNMP version and associated access parameters, and then click OK. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SNMP service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the SNMP service application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between SNMP service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the SNMP service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an SNMP service application monitor

Authorized users can modify all parameters except the IP address and the APM server for an SNMP service application monitor. When the IP address of a monitored SNMP host changes, authorized users must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an SNMP service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify iconicon_modify_16x16.png for the SNMP service application monitor you want to modify.

The page for modifying the SNMP service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an SMTP application monitor."

5.     Click OK.

Viewing the SNMP service application monitor report

After an SNMP service application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the SNMP service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an SNMP application monitor to display the report.

Figure 105 shows part of an SNMP service application monitor report.

Figure 105 Part of an SNMP service application monitor report

SNMP.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the SNMP service application.

·     IP Address—IP address of the SNMP service host.

·     Application Type—Type of the monitored application, which is always SNMP Monitor.

·     Last Polling Time—Time when APM last polled the SNMP service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the SNMP service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management"

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the SNMP service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the SNMP service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SNMP service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the SNMP service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the SNMP service in the last 30 days.

·     Available Time—Total amount of time that the SNMP service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SNMP service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the SNMP service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SNMP service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Ping Test

The Ping Test area contains the following field:

·     Response TimeRound trip response time of the SNMP service. Response time refers to the duration from APM sending a request to SNMP to APM receiving the SNMP response.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

SNMP OID

The SNMP OID area contains the following field:

·     OID/Value—OID and its value for SNMP monitoring.

Application Traffic

APM collects SNMP service traffic based on the IP address and port number of SNMP host.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by SNMP service over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by SNMP service since 00:00 today.

DNS service

Domain Name System (DNS) is a core Internet service. With DNS, users can use easy-to-remember domain names to access websites. The DNS service can automatically translate the domain names you specified into IP addresses. The default DNS service ports are TCP 53 and UDP 53.

APM monitors the DNS service status by requesting the DNS service to translate a specific domain name into an IP address. This section describes how to add and modify a DNS monitor, and helps view the monitor report.

Adding a DNS service application monitor

APM monitors DNS status through DNS service ports TCP/UDP 53. When you add a DNS service application monitor, follow these guidelines:

·     Add the target host to the IMC platform. For information about adding a host to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the DNS application, make sure at least one probe is configured in APM. After a DNS service application monitor is added, APM sends the IP address of the monitored DNS application to the probes for traffic collection.

To add a DNS service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click DNS Monitor of the Service Monitor class.

The page for adding a DNS service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the DNS service application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Traffic Collection Port—Enter the DNS service port. The default value is 53, including TCP 53 and UDP 53. This field is displayed only when at least one probe is configured for APM and when you select Enable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is displayed only when you select Enable from the Use Template list.

¡     Host—Enter the domain name of a website for DNS monitoring. For example, enter www.H3C.com. This field is displayed only when you select Enable from the Use Template list.

¡     Record TypeSelect a record type for the domain name. Options are AAAA, CNAME, MX, SOA, A, SPF, NS, SRV, TXT, and PTR. For more information about record types, see Table 13. This field is displayed only when you select Enable from the Use Template list.

Table 13 Record types

Record Types

Remarks

AAAA

DNS Extensions to Support IP Version 6.

CNAME

Canonical name for an alias.

MX

Mail exchange.

SOA

Start of a zone of authority.

A

Host address.

SPF

Sender Policy Framework.

NS

Authoritative name server.

SRV

Service record, which identifies the location of servers.

TXT

Text strings.

PTR

Domain name pointer.

 

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is displayed only when you select Enable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of DNS service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the DNS service application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between DNS service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the DNS service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect ApplicationSelect this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a DNS service application monitor

Authorized users can modify all parameters except the IP address and the APM server for a DNS service application monitor. When the IP address of a monitored DNS host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a DNS service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the DNS service application monitor you want to modify.

The page for modifying a DNS service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a DNS service application monitor."

5.     Click OK.

Viewing the DNS service application monitor report

After a DNS service application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the DNS service application report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a DNS service application monitor to display the report.

Figure 106 shows part of a DNS service application monitor report.

Figure 106 Part of a DNS service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the DNS service application.

·     IP Address—IP address of the DNS service host.

·     Application Type—Type of the monitored application, which is always DNS Monitor.

·     Last Polling Time—Time when APM last polled the DNS service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the DNS service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the DNS host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the DNS service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the DNS service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the DNS service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the DNS service in the last 30 days.

·     Available Time—Total amount of time that the DNS service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the DNS service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the DNS service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the DNS service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Response Time

The Response Time area contains the following fields:

·     Response Time—Round trip response time of the DNS service. Response time refers to the duration from APM sending a request to APM receiving a response.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Host—Domain name that APM requests the DNS service to translate.

·     Record Type—Record type of the domain name.

·     Alias—Alternative names of the domain name.

·     Query Result—IP address of the specified domain name.

Application Traffic

APM collects DNS service traffic based on the IP address and port number of DNS host.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by DNS service over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by DNS service since 00:00 today.

Java Runtime

Java Runtime refers to Java Runtime Environment (JRE). It is required to run Java applications and applets. APM monitors JRE applications.

·     Java Management ExtensionsJMX, is a Java technology that supplies tools for managing and monitoring applications, system objects, devices and service oriented networks.

·     Remote Method InvocationRMI, provides a model for distributed computation with Java objects. These objects can be new Java objects or simple Java wrappers around an existing Application Programming Interface (API).

·     Java Naming and Directory InterfaceJNDI, part of the Java platform, providing applications based on Java technology with a unified interface to multiple naming and directory services. The commonly used JNDI name is jmxrmi.

Configuring Java Runtime to support RMI access

The APM monitors the JRE applications by obtaining monitor index data through RMI access. By default, most JRE applications do not provide RMI access. Operators must modify the JRE start script to support RMI access. This section describes how to configure application with JRE to support RMI access. The applications with JRE include Tomcat server and IMC.

1.     Use a text editor, such as a Notepad and vi, to open the start script of the JRE application.

For Tomcat with JRE

¡     In Windows operating system: <Tomcat installation path>\bin\catalina.bat

¡     In Linux/Unix operating system: <Tomcat installation path>/bin/catalina.sh

For IMC with JRE

¡     In Windows operating system: <IMC installation path>\Client\bin\startup.bat.

¡     In Linux/Unix operating system: <IMC installation path>/Client/bin/startup.sh.

2.     Add the following text to the script:

set JAVA_OPTS=%JAVA_OPTS% -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=1099 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false

Parameter description:

¡     Dcom.sun.management.jmxremote.port=1099—1099 is the listening port. It can be another port, but cannot conflict with other services.

¡     Dcom.sun.management.jmxremote.ssl=false—false indicates that no SSL connection is needed for remote RMI access.

¡     Dcom.sun.management.jmxremote.authenticate=false—false indicates that no authentication is needed for remote RMI access. For information about enabling authentication, see the Java document.

¡     No carriage returns can be included.

¡     For IMC, this text should be in front of the part "%IMC_HOME%\bin\bootstrap.jar" start.

3.     Save the script and restart the JRE application.

Adding Java Runtime application monitor

When you add application monitors for Java Runtime, follow these guidelines:

·     The target hosts must be added to the IMC platform so that the connections between the devices and access devices can be obtained. For information about adding devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     If authentication is required for remote RMI access (the value for Dcom.sun.management.jmxremote.authenticate is true), get the username and password in advance.

·     To view traffic statistics in the monitor report of the Java Runtime application, make sure at least one probe is configured in APM. After a Java Runtime application monitor is added, APM sends the IP address and port number of monitored Java Runtime application to the probes for traffic collection.

To add a Java Runtime application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click JavaRuntime of the Service Monitor class.

The page for adding a Java Runtime application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Java Runtime application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor PortEnter the RIM port. Make sure the port number is the same as that specified in the script Dcom.sun.management.jmxremote.port. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the JRE application service port. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username and Password—Enter the authentication username and password for remote RMI access. If the authentication is not enabled, these fields are not needed. This field is available only when you select Disable from the Use Template list.

¡     JNDI—Enter the JNDI name for RMI access. The well-known JNDI name is jmxrmi. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Java Runtime applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Java Runtime depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Java Runtime and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Java Runtime application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying Java Runtime application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Java Runtime application monitor. When the IP address of a monitored Java Runtime host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Java Runtime application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the Java Runtime application monitor you want to modify.

The page for modifying the Java Runtime application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding Java Runtime application monitor."

5.     Click OK.

Viewing Java Runtime application monitor report

After adding the Java Runtime application monitor, APM collects application index data to calculate its availability and health status. Obtain monitor indexes for Java Runtime application by viewing the monitor report.

To access the Java Runtime application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Java Runtime application monitor to display the report.

Figure 107 shows part of a Java Runtime application monitor report.

Figure 107 Part of an Java Runtime application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Java Runtime application.

·     IP Address—IP address of the Java Runtime host.

·     Application Type—Type of the monitored application, which is always JavaRuntime.

·     VM Version—Version of the Java VM that the Java Runtime uses.

·     ArchitectureArchitecture of the Java Runtime host.

·     OSOperating system installed on the Java Runtime host.

·     Last Polling Time—Time when APM last polled the Java Runtime.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Java Runtime and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Java Runtime host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the Java Runtime.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Java Runtime.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Java Runtime application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Java Runtime application in the last 30 days.

·     Available Time—Total amount of time that the Java Runtime was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Java Runtime was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Java Runtime was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Java Runtime was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

OS

The OS area contains the following fields:

·     Available processors—Number of processors on the Java Runtime host. For a multi-core CPU, each core represents a processor.

·     Committed Virtual Memory Size—Virtual memory size assigned to the Java Runtime process when APM last polled Java Runtime.

·     Free Physical Memory Size—Free physical memory size on the Java Runtime host when APM last polled Java Runtime.

·     Free Swap Space Size—Free swap space size on the Java Runtime host. Swap space is the amount of physical memory and virtual memory.

·     Process CPU Time—Time how long the JVM occupies CPU since JVM starts.

·     Total Physical Memory Size—Total physical memory size on the Java Runtime host.

·     Total Swap Space Size—Total amount of the physical and virtual memory on the Java Runtime host.

·     Version—Version of the operating system of the Java Runtime host.

Runtime

The Runtime area contains the following fields:

·     Name—Name of the Java Runtime.

·     Spec Name—Name of the Java Runtime specification.

·     Spec Vendor—Vendor of the Java Runtime specification.

·     Spec Version—Version of the Java Runtime specification.

·     VM Name—Name of the Java VM.

·     VM Vendor—Vendor of the Java VM.

·     VM Version—Version of the Java VM.

Heap Memory Usage

The Heap Memory Usage area contains the following fields:

·     CommittedCommitted heap memory when JVM starts.

·     Init—Initial heap memory.

·     Max—Maximum heap memory.

·     Used—Heap memory being used. Click the Set Threshold icon  to set alarm thresholds for the used heap memory.

NonHeap Memory Usage

The NonHeap Memory Usage area contains the following fields:

·     Committed—Committed non-heap memory when JVM starts.

·     Init—Initial non-heap memory.

·     Max—Maximum non-heap memory.

·     Used—Non-heap memory being used. Click the Set Threshold icon  to set alarm thresholds for the used non-heap memory.

Application Traffic

APM collects JRE application traffic of the Java Runtime host.

The Application Traffic area contains the following field:

·     Last Hour's Traffic—Total traffic sent and received by Java Runtime over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by Java Runtime since 00:00 today.

Class Loading

The Class Loading area contains the following fields:

·     Loaded Class Count—Number of classes loaded to the memory when APM last polled J.

·     Unloaded Class Count—Number of unloaded classes since JRE starts.

·     Total loaded Class Count—Number of loaded classes since JRE starts, including the unloaded classes.

FTP service

File Transfer Protocol (FTP) is an application layer protocol based on the client/server model. It is used to transfer files from one host to another over an IP network. FTP server uses TCP port 20 to transfer data and TCP port 21 to transfer control commands.

APM monitors the FTP service status through simulating the behavior of the FTP client. This section describes how to add and modify an FTP service application monitor, and helps view the monitor report.

Adding an FTP service application monitor

When you add application monitors for FTP, follow these guidelines:

·     Add FTP hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the FTP account of the user who has the file upload and download privileges, and the test file to test the upload and download function of FTP. The test file can be at most 10 MB.

·     To view traffic statistics in the monitor report of the FTP service application, make sure at least one probe is configured in APM. After an FTP application monitor is added, APM sends the IP address and port of the monitored FTP service application to the probes for traffic collection.

To add an FTP service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click FTP Monitor of the Service Monitor class.

The page for adding an FTP service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the FTP service application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Username/Password—Enter the username and password of the FTP user. The fields are available only when you select Disable from the Use Template list.

¡     Whether to Download File—Select Yes if you want to test the download function of FTP. Otherwise, select No. This field is available only when you select Disable from the Use Template list.

-     Remote Source File Name—Enter the test file name.

APM downloads the file from the root directory of the FTP server.

-     Local Source File Name—Enter the local test file name, which must contains the absolute path of the file.

¡     Whether to Upload File—Select Yes if you want to test the upload function of FTP. Otherwise, select No. This field is available only when you select Disable from the Use Template list.

-     Local Source File Name—Enter the local test file name, which must contains the absolute path of the file.

-     Remote Source File Name—Enter the test file name.

APM uploads the file to the root directory of the FTP server.

¡     Application Monitor Port—Enter the port on FTP. The default port is 21. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for FTP. The default port is 21. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of FTP service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the FTP service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the FTP service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the FTP service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an FTP service application monitor

Authorized users can modify all parameters except the IP address and the APM server for an FTP service application monitor. When the IP address of a monitored FTP host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an FTP service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the FTP service application monitor you want to modify.

The page for modifying the FTP service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an FTP service application monitor."

5.     Click OK.

Viewing the FTP service application monitor report

After an FTP service application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the FTP service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an FTP application monitor to display the report.

Figure 108 shows part of an FTP service application monitor report.

Figure 108 Part of an FTP service application monitor report

FTP.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the FTP service application.

·     IP Address—IP address of the FTP service host.

·     Application Type—Type of the monitored application, which is always FTP Monitor.

·     Last Polling Time—Time when APM last polled the FTP service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the FTP service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the FTP service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the FTP service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the FTP service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the FTP service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the FTP service in the last 30 days.

·     Available Time—Total amount of time that the FTP service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the FTP service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the FTP service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the FTP service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Connection Information

Typically, a host that provides FTP services is called an FTP server. APM attempts to connect to and sends login requests to the FTP server in each polling period.

The Connection Information area contains the following fields:

·     Connection Time—Shows how long it took APM to connect to the FTP server in the most recent successful connection attempt.

¡     Click the Set Threshold icon  to set alarm thresholds for the connection time.

¡     Click the History Record icon icon_history_16x16.png to view the connection time history graph.

·     Login Time—Shows how long it took APM to log in to the FTP server in the most recent successful login attempt.

¡     Click the Set Threshold icon  to set alarm thresholds for the login time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the login time.

File Information

After login, APM collects files and directories in the home directory of the FTP account, not including subdirectories and files in the directories. Contents displayed in the monitor report and the privileges to upload, download, and delete files vary with different FTP accounts.

The File Information area contains the following fields:

·     Number of Files—Number of files in the home directory of the FTP account.

·     Number of Directories——Number of directories in the home directory of the FTP account.

Upload

When the upload function test is configured, APM uploads the selected test file and records the upload results after login to the FTP server.

The Upload area contains the following fields:

·     Uploaded File Size—Size of the file to be uploaded.

·     Uploading Duration—Time duration for uploading the file with FTP.

·     Average Uploading Rate—Average file uploading rate of FTP.

¡     Click the Set Threshold icon  to set alarm thresholds for the average uploading rate.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the average uploading rate.

Download

When the download function test is configured, APM downloads the selected test file and records the download results after login to the FTP server.

The Download area contains the following fields:

·     Downloaded File Size—Size of the file to be downloaded.

·     Downloading Duration—Time duration for downloading the file with FTP.

·     Average Downloading Rate—Average file downloading rate of FTP.

¡     Click the Set Threshold icon  to set alarm thresholds for the average downloading rate.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the average downloading rate.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by FTP over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by FTP since 00:00 today.

SFTP service

Secure File Transfer Protocol (SFTP) is part of SSH. It is used to transfer files from one SFTP host to another over an IP network. SFTP establishes connections to an SSH daemon (also known as sshd). The default sshd port is TCP 22.

APM monitors the SFTP service status through simulating the behavior of the SFTP client. This section describes how to add and modify an SFTP service application monitor, and helps view the monitor report.

Adding an SFTP service application monitor

When you add application monitors for SFTP, follow these guidelines:

·     Add SFTP hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the SFTP account of the user who has the file upload and download privileges, and the test file to test the upload and download function of SFTP. The test file can be at most 10 MB.

·     To view traffic statistics in the monitor report of the SFTP service application, make sure at least one probe is configured in APM. After an SFTP application monitor is added, APM sends the IP address and port of the monitored SFTP service application to the probes for traffic collection.

To add an SFTP service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click SFTP Monitor of the Service Monitor class.

The page for adding an SFTP service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the SFTP service application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Username/Password—Enter the username and password of the SFTP user. The fields are available only when you select Disable from the Use Template list.

¡     Whether to Download File—Select Yes if you want to test the download function of SFTP. Otherwise, select No. This field is available only when you select Disable from the Use Template list.

-     Remote Source File Name—Enter the test file name.

APM downloads the file from the root directory of the SFTP server.

-     Local Source File Name—Enter the local test file name, which must contains the absolute path of the file.

¡     Whether to Upload File—Select Yes if you want to test the upload function of SFTP. Otherwise, select No. This field is available only when you select Disable from the Use Template list.

-     Local Source File Name—Enter the local test file name, which must contains the absolute path of the file.

-     Remote Source File Name—Enter the test file name.

APM uploads the file to the root directory of the SFTP server.

¡     Application Monitor Port—Enter the port on SFTP. The default port is 22. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number for SFTP. The default port is 22. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SFTP service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the SFTP service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the SFTP service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the SFTP service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an SFTP service application monitor

Authorized users can modify all parameters except the IP address and the APM server for an SFTP service application monitor. When the IP address of a monitored SFTP host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an SFTP service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the SFTP service application monitor you want to modify.

The page for modifying the SFTP service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an SFTP service application monitor."

5.     Click OK.

Viewing the SFTP service application monitor report

After an SFTP service application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the SFTP service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an SFTP application monitor to display the report.

Figure 109 shows part of an SFTP service application monitor report.

Figure 109 Part of an SFTP service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the SFTP service application.

·     IP Address—IP address of the SFTP service host.

·     Application Type—Type of the monitored application, which is always SFTP Monitor.

·     Last Polling Time—Time when APM last polled the SFTP service.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the SFTP service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the SFTP service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the SFTP service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SFTP service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the SFTP service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the SFTP service in the last 30 days.

·     Available Time—Total amount of time that the SFTP service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SFTP service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the SFTP service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SFTP service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Connection Information

APM attempts to connect to and sends login requests to the SFTP server in each polling period. Typically, a host that provides SFTP services is called an SFTP server.

The Connection Information area contains the following fields:

·     Connection Time—Shows how long it took APM to connect to the SFTP server in the most recent successful connection attempt.

¡     Click the Set Threshold icon  to set alarm thresholds for the connection time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the connection time.

·     Login Time—Shows how long it took APM to log in to the SFTP server in the most recent successful login attempt.

¡     Click the Set Threshold icon  to set alarm thresholds for the login time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the login time.

File Information

After login, APM collects files and directories in the home directory of the SFTP account, not including subdirectories and files in the directories. Contents displayed in the monitor report and the privileges to upload, download, and delete files vary with different SFTP accounts.

The File Information area contains the following fields:

¡     Number of Files—Number of files in the home directory of the SFTP account. Click the History Record icon icon_history_16x16.png to view the history graph of the number of files.

¡     Number of Directories——Number of directories in the home directory of the SFTP account. Click the History Record icon icon_history_16x16.png to view the history graph of the number of directories.

Upload

When the upload function test is configured, APM uploads the selected test file and records the upload results after login to the SFTP server.

The Upload area contains the following fields:

·     Uploaded File Size—Size of the file to be uploaded.

·     Uploading Duration—Time duration for uploading the file with SFTP.

·     Average Uploading Rate—Average file uploading rate of SFTP.

¡     Click the Set Threshold icon  to set alarm thresholds for the average uploading rate.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the average uploading rate.

Download

When the download function test is configured, APM downloads the selected test file and records the download results after login to the SFTP server.

The Download area contains the following fields:

·     Downloaded File Size—Size of the file to be downloaded.

·     Downloading Duration—Time duration for downloading the file with SFTP.

·     Average Downloading Rate—Average file downloading rate of SFTP.

¡     Click the Set Threshold icon  to set alarm thresholds for the average downloading rate.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the average downloading rate.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by SFTP over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by SFTP since 00:00 today.

IPMI service

The Intelligent Platform Management Interface (IPMI) is a set of open hardware interface specifications. You can use the IPMI service to monitor physical features of servers, such as temperature, fan, and power supply.

APM supports monitoring the IPMI service.

Adding an IPMI service application monitor

When you add an IPMI service application monitor, follow these guidelines:

·     Obtain the IP address of the baseboard management controller (BMC).

BMC is the intelligence in the IPMI architecture. It is a specialized microcontroller embedded on the motherboard of a server.

·     Obtain the username and password of the user who has the administrator's privileges.

To add an IPMI service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click IPMI Monitor of the Service Monitor class.

The page for adding an IPMI service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the BMC.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the BMC. The fields are available only when you select Disable from the Use Template list.

¡     IPMI VersionSelect a version number from the IPMI Version list. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of IPMI service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the IPMI service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the IPMI service and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the IPMI service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying an IPMI service application monitor

Authorized users can modify all parameters except the IP address and the APM server for an IPMI application monitor. When the IP address of a monitored IPMI service host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify an IPMI service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for an IPMI service application monitor you want to modify.

The page for modifying the IPMI service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an IPMI service application monitor."

5.     Click OK.

Viewing the IPMI service application monitor report

After an IPMI service application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the IPMI service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an IPMI service application monitor to display the report.

Figure 110 shows part of an IPMI service application monitor report.

Figure 110 Part of an IPMI service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameName of the application monitor.

·     Health Status—Health status of the IPMI service application.

·     IP Address—IP address of the IPMI service host.

·     Application Type—Type of the monitored application, which is always IPMI Monitor.

·     VersionVersion number of the IPMI service.

·     Last Polling Time—Time when APM last polled the IPMI service application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the IPMI service application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the IPMI service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by the IPMI service, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the IPMI service application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the IPMI service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the PMI service in the last 30 days.

·     Available Time—Total amount of time that the IPMI service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the IPMI service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the IPMI service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the IPMI service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Memory

The Memory area contains the following fields:

·     Component Name—Name of the memory card.

·     Status—State of the memory card.

Power Supply

The Power Supply area contains the following fields:

·     Component Name—Name of the power supply.

·     StatusState of the power supply.

Temperature

The Temperature area contains the following fields:

·     Component Name—Name of the temperature sensor.

·     StatusState of the temperature sensor.

·     ValueMonitor value obtained by the temperature sensor.

Fan

The Fan area contains the following fields:

·     Component Name—Name of the fan.

·     StatusState of the fan.

Board

The Board area contains the following fields:

·     Manufacturer—Manufacturer of the board.

·     Product Name—Name and model of the device to which the board applies.

·     Production Date—Date when the board was produced.

·     Part Number—Part number of the board.

·     Serial Number—Serial number of the board.

·     System GUID—Globally unique identifier of the board.

Chassis

The Chassis area contains the following fields:

·     BMC Version—Version of the BMC.

·     IPMI Driver Type—Type of the IPMI driver.

·     Self-Check Result—Self-check result of the server.

·     Power Supply Status—State of the power supply for the chassis.

·     Chassis Intrusion—Whether the chassis is open or has been opened before.

·     Front Panel—Whether the front panel is open.

·     Cooling Fan Fault—Whether the cooling fans operate correctly.

·     Disk Fault—Whether the disks operate correctly on the server.

·     Power-On Hours—Hours since the server was started.

Ping test service

This service allows APM to log in to a host through SSH or Telnet to ping a destination IP address to test the connectivity. The host is called the ping test service host. Currently, only the Linux server can act as a ping test service host.

This section describes how to add and modify a ping test service application monitor, and helps view the monitor report.

Adding a ping test service application monitor

APM monitors ping test service applications through CLI. When you add ping test service application monitors, follow these guidelines:

·     Enable Telnet or SSH on the ping test service hosts. For more information about enabling Telnet or SSH on a Linux server, see the Linux server configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the administrator's privileges on the ping test service hosts.

·     Add ping test service hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a ping test service application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click Ping Test Monitor of the Service Monitor class.

The page for adding a ping test service application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the ping test service host. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     Name—Enter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the ping test service application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on the ping test service host.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication Mode—Select the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password.

The following parameters to be configured vary with authentication modes:

Username—Enter the SSH username. The user must have the administrator's privileges on the ping test service host.

Password—Enter the password of the SSH user.

Private Key File—Enter the directory of the SSH private key file or browse to the file.

Private Key Password—Enter the password to decrypt the SSH private key file.

Super Password—Enter the super password with which an SSH user can elevate privileges after login.

-     Port—Enter the SSH port on the ping test service host.

-     Timeout (1-120 seconds)—Enter the maximum time period that APM waits for an SSH response from the ping test service host. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from the host within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)—Enter how many times APM retries to send SSH packets to the ping test service host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on the ping test service host.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication Mode—Select the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password.

The following parameters to be configured vary with authentication modes:

Username—Enter the Telnet username. The user must have the administrator's privileges on the ping test service host.

Password—Enter the password of the Telnet user.

Super Password—Enter the super password with which a Telnet user can elevate privileges after login.

-     Timeout (1-60 seconds)—Enter the maximum time period that APM waits for a Telnet response from the ping test service host. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from the host within the timeout time, APM considers that the interaction has failed.

¡     IP Address—Enter the destination IP address in the ping test. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of ping test service applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the ping test service depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the ping test service and operating system applications by IP address, and displays their dependencies in the application topology.

¡     Application Group—Specify an application group for the ping test service application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify the connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a ping test service application monitor

Authorized users can modify all parameters except the IP address of a ping test service host and the APM server. When the IP address of a monitored ping test service host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a ping test service application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the ping test service application monitor you want to modify.

The page for modifying the ping test service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a ping test service application monitor."

5.     Click OK.

Viewing the ping test service application monitor report

After a ping test service application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the ping test service application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a ping test service application monitor to display the report.

Figure 111 shows part of a ping test service application monitor report.

Figure 111 Part of a ping test service application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health state of the ping test service application.

·     IP Address—IP address of the ping test service host.

·     Application Type—Type of the monitored application, which is always Ping Test Monitor.

·     Last Polling Time—Time when APM last polled the ping test service host.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the ping test service and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the ping test service host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the ping test service.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the ping test service.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the ping test service in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the ping test service in the last 30 days.

·     Available Time—Total amount of time that the ping test service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the ping test service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the ping test service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the ping test service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Connection Test

The Attribute and Value fields display the attributes and values collected for the ping test service in the last polling interval.

TCP port

TCP Port application monitor belongs to common monitor. APM monitors applications that use TCP ports to provide services.

APM sends a TCP connection request to a monitored TCP port and records the time that the application takes to respond to the request. You can obtain the availability and health status of the application based on the response time. This section describes how to add a TCP Port application monitor and view the TCP Port application monitor report.

Adding a TCP Port application monitor

Before APM monitors an application through TCP port, as a best practice, add the host running the application to the IMC platform. You can view the network connection between the host running the application and the access device in the application topology. For information about adding a device running an application, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a TCP Port application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click TCP Port of Service Monitor.

The page for adding a TCP Port application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host running the TCP Port service application. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host has already been added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use Template—Select Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the port number to be monitored. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)Select a polling interval for the application monitor (in seconds). Options are 30, 60, 120, 180, 240, 300, 600, 1200, and 1800. The default polling interval is 300 seconds. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of TCP Port applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that TCP Port depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between TCP Port and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the TCP Port application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a TCP Port application monitor

Authorized users can modify all parameters except the IP address and the APM server for a TCP Port application monitor. When the IP address of a monitored TCP Port host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a TCP Port application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the TCP Port application monitor you want to modify.

The page for modifying the TCP Port service application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a TCP Port application monitor."

5.     Click OK.

Viewing the TCP Port application monitor report

After a TCP Port application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the TCP Port application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a TCP Port application monitor to display the report.

Figure 112 shows part of a TCP Port application monitor report.

Figure 112 Part of a TCP Port application monitor report

Tcp port.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the TCP Port application.

·     IP Address—IP address of the TCP Port host.

·     Application Type—Type of the monitored application, which is always TCP Port.

·     Last Polling Time—Time when APM last polled TCP Port.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between TCP Port and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the TCP Port host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by TCP Port.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of TCP Port.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the TCP Port application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the TCP Port application in the last 30 days.

·     Available Time—Total amount of time that TCP Port was available after 00:00 today.

·     Unavailable Time—Total amount of time that TCP Port was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that TCP Port was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that TCP Port was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Duration that APM occupies to connect to TCP Port most recently.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Ceph

Ceph is an open-source storage system that implements object storage on a distributed cluster. The system is scalable, self-healing, and self-managed.

APM supports monitoring Ceph through the API provided by Ceph.

Adding a Ceph application monitor

Before adding a Ceph application monitor, contact the administrator to obtain the username and password of a user who has the administrator's privileges on the Ceph system.

To add a Ceph application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Ceph of the Service Monitor class.

The page for adding a Ceph application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Ceph application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if the host is already managed in the IMC platform. If the host is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Selecting devices."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of a Ceph user who has the administrator's privileges.

¡     Password—Enter the password of the Ceph user.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Ceph applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Ceph depends on, and then click OK.

Operating system applications cannot be selected. APM automatically adds the dependencies between Ceph and operating system applications by IP address and displays their dependencies in the application topology.

Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Ceph application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify the connectivity to the application by using the previous parameter settings. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Ceph application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Ceph application monitor. When the IP address of a monitored Ceph host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Ceph application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Ceph application monitor you want to modify.

The page for modifying the Ceph application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Ceph application monitor."

5.     Click OK.

Viewing the Ceph application monitor report

After a Ceph application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Ceph application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Ceph application monitor to display the report.

Figure 113 shows part of a Ceph application monitor report.

Figure 113 Part of a Ceph application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Ceph application.

·     Application DescriptionDescription of the Ceph application.

·     Application Type—Type of the monitored application, which is Ceph.

·     CEPH Version—Version of the Ceph application.

·     Last Polling TimeTime when APM last polled the Ceph application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between Ceph and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Ceph application. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the Ceph application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Ceph application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Ceph application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Ceph application in the last 30 days.

·     Available Time—Total amount of time that the Ceph application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Ceph application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Ceph application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Ceph application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CEPF Storage

The CEPF Storage area contains the following fields:

·     Total BytesTotal storage space of Ceph.

·     Used Bytes—Used storage space of Ceph.

·     Available Bytes—Free storage space of Ceph..

·     Read Bytes Per Second—Number of bytes read by Ceph per second.

·     Write Bytes Per Second—Number of bytes written into Ceph per second.

·     Data Size—Total storage data size of Ceph.

·     Use %—Ratio of the used bytes to the total bytes. Click the Set Threshold icon  to set alarm thresholds for the storage usage ratio.

·     icon_history_16x16.png—Click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

OSD Status

The OSD Status area contains the following fields:

·     OSDs—Number of OSDs present.

·     OSDUP—Number of OSDs up and running.

·     OSDIN—Number of OSDs in the cluster.

·     OSDOUT—Number of OSDs out of the cluster.

·     OSDs In and Down—Number of down OSDs in the cluster.

·     FULL—Whether the OSD is Full.

·     NEARFULL—Whether the OSD is reaching near full..

PG Status

The PG Status area contains the following fields:

·     Active PGs—Total number of Active placement groups.

·     Down—Number of Down placement groups.

·     Incomplete—Number of placement groups in Incomplete state.

·     Stale—The number of placement groups in an unknown state.

·     Active+Clean PGs—Total number of Active and Clean placement groups.

·     Active+Remapped PGs—Total number of Active and Remapped placement groups.

·     Active+Degraded PGs—The total number of Active and Degraded placement groups.

·     Active+Clean+Scrubbing+Deep—Total number of Active, Clean, Scrubbing, and Deep placement groups.

·     Down+Remapped+Peering—Total number of Down, Remapped, and Peering placement groups.

·     Degraded—Number of Degraded placement groups.

·     Peering—Number of placement groups undergoing the peering process.

·     PGs—Total number of placement groups.

·     icon_history_16x16.png—Click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Monitor Details

The Monitor Details area contains the following fields:

·     Monitor Name—Name of the monitor.

·     Monitor address—The address required for monitors to discover each other using the monitor map.

·     Rank—Rank of the Ceph monitor in the cluster.

·     Severity—Health severity of the monitor.

·     Total Bytes—Total disk memory of the monitor.

·     Used Bytes—Used memory of the monitor.

·     Available Bytes—Free memory of the monitor.

·     Used %—Percentage of used memory to the total memory of the monitor. Click the Set Threshold icon  to set alarm thresholds for the monitor memory usage ratio.

·     Last Updated—Last time when the monitor status was updated.

Dell CMC

The Dell Chassis Management Controller (CMC) provides remote management on Dell PowerEdge M1000e blade servers and controls their power supplies. It has processors and memory, and obtains power from the blade servers. APM supports monitoring Dell CMC.

Adding a Dell CMC application monitor

APM monitors Dell CMC applications through CLI. When you add Dell CMC application monitors, follow these guidelines:

·     Enable Telnet or SSH on Dell CMC. For more information, see the Dell CMC configuration guide.

·     Obtain the username and password of the Telnet or SSH user who has the Dell CMC administrator's privileges.

To add a Dell CMC application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Dell CMC Service of the Service Monitor class.

The page for adding a Dell CMC application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Dell CMC application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the service port number for the Dell CMC application. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Dell CMC applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Dell CMC depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Dell CMC and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Dell CMC application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Dell CMC application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Dell CMC application monitor. When the IP address of a monitored Dell CMC host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Dell CMC application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Dell CMC application monitor you want to modify.

The page for modifying the Dell CMC application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Dell CMC application monitor."

5.     Click OK.

Viewing the Dell CMC application monitor report

After a Dell CMC application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Dell CMC application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Dell CMC application monitor to display the report.

Figure 114 shows part of a Dell CMC application monitor report.

Figure 114 Part of a Dell CMC application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the Dell CMC application monitor.

·     Health Status—Health status of the Dell CMC application.

·     IP Address—IP address of the host where the Dell CMC application resides.

·     Application Type—Type of the monitored application, which is always Dell CMC Service.

·     Last Polling Time—Time when APM last polled the Dell CMC application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view dependencies between the Dell CMC application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Dell CMC host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the Dell CMC application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Dell CMC application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Dell CMC application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Dell CMC application in the last 30 days.

·     Available Time—Total amount of time that the Dell CMC application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Dell CMC application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Dell CMC application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Dell CMC application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Module Info

The Module Info area contains the following fields:

·     Module NameName of the module.

·     Presence—Whether the module exists in the chassis.

·     Power State—Whether the module is powered on.

·     Health—Whether the module operates correctly.

·     Service Tag—Service tag of the module.

Ping Command

The Packet Internet Groper (ping) command is used to verify network connectivity in order to help users analyze and locate network problems. APM supports monitoring ping commands.

Adding a Ping Command application monitor

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Ping Command of the Service Monitor class.

The page for adding a Ping Command application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Ping Command application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Ping Packet Size (Bytes)Enter the ping packet size, which is 32 bytes (default) or larger. If you do not specify the ping packet size, the default setting (32 bytes) applies. This field is available only when you select Disable the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Ping Command applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Ping Command depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Ping Command and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Ping Command application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Ping Command application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Ping Command application monitor. When the IP address of a monitored Ping Command host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Ping Command application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Ping Command monitor you want to modify.

The page for modifying the Ping Command application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Ping Command application monitor."

5.     Click OK.

Viewing the Ping Command application monitor report

After a Ping Command application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Ping Command application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Ping Command application monitor to display the report.

Figure 115 shows part of a Ping Command application monitor report.

Figure 115 Part of a Ping Command application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the Ping Command application monitor.

·     Health Status—Health status of the Ping Command application.

·     IP Address—IP address of the host where the Ping Command application resides.

·     Application Description—Description of the Ping Command application.

·     Application Type—Type of the monitored application, which is always Ping Command.

·     Last Polling Time—Time when APM last polled the Ping Command application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view dependencies between the Ping Command application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Ping Command host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the Ping Command application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Ping Command application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Ping Command application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Ping Command application in the last 30 days.

·     Available Time—Total amount of time that the Ping Command application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Ping Command application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Ping Command application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Ping Command application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Ping Test

The Ping Test area contains the following fields:

·     Response TimeResponse time of the ping test.

·     Packets Sent—Number of packets sent during the ping test.

·     Packets Received—Number of packets received during the ping test.

Common Application

You can monitor a Linux or Windows host by adding a Common Application application monitor.

Adding a Common Application application monitor

When you add a Common Application application monitor, follow these guidelines:

·     If the Common Application host runs the Linux operating system, see "Linux server monitor" for relevant restrictions and guidelines.

·     If the Common Application host runs the Windows operating system, see "Windows OS monitor" for relevant restrictions and guidelines.

To add a Common Application application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Common Application of the Service Monitor class.

The page for adding a Common Application application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Common Application application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

If the Common Application host runs the Linux operating system, see "Linux server monitor" for how to configure the application monitor parameters when you select Disable from the Use Template list.

If the Common Application host runs the Windows operating system, see "Windows OS monitor" for how to configure the application monitor parameters when you select Disable from the Use Template list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Common Application applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Common Application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Common Application and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Common Application application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not specified, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a Common Application application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Common Application application monitor. When the IP address of a monitored Common Application host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Common Application application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Common Application application monitor you want to modify.

The page for modifying the Common Application application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Common Application application monitor."

5.     Click OK.

Viewing the Common Application application monitor report

After a Common Application application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Common Application application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Common Application application monitor to display the report.

Figure 116 shows part of a Common Application application monitor report.

Figure 116 Part of a Common Application application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the Common Application application monitor.

·     Health Status—Health status of the Common Application application.

·     IP Address—IP address of the host where the Common Application application resides.

·     Application Description—Description of the Common Application application.

·     Application Type—Type of the monitored application, which is always Common Application.

·     Last Polling Time—Time when APM last polled the Common Application application.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view dependencies between the Common Application application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Common Application host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the Common Application application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Common Application application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Common Application application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Common Application application in the last 30 days.

·     Available Time—Total amount of time that the Common Application application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Common Application application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Common Application application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Common Application application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage Ratio—CPU usage of the application in the last polling interval.

¡     Click the Set Threshold icon  to set the CPU usage alarm thresholds for the application.

¡     Click the History Record icon icon_history_16x16.png to view statistics of the history graph of the CPU usage for the application.

Memory Usage Ratio

The Memory Usage Ratio area displays information about physical memory and swap memory.

The Memory Usage Ratio area contains the following fields:

·     Physical MemoryPhysical memory of the application, which corresponds to the physical memory bar.

·     Swap—Swap memory of the application, which corresponds to a disk space.

·     Total—Total amount of the physical or swap memory.

·     In Use—Size of the physical or swap memory that is being used. Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory that is being used.

·     Usage RatioPhysical or swap memory usage ratio. The usage ratio is calculated by using the formula: Usage ratio = Memory in use/Total memory × 100%.

¡     Click the Set Threshold icon  to set alarm thresholds for the physical or swap memory.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the physical or swap memory usage.

Ping Test

APM pings the application host every polling interval. In a ping test, APM sends up to three ICMP packets to the host. When APM receives a response, it considers the ping test a success and records the response time. When APM receives no response after three tries, it considers the ping test a failure.

The Ping Test area contains the following fields:

·     Response Time—Ping response time in the last ping test. Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

·     Packets Sent—Number of ICMP packets sent in the last ping test. The maximum value is 3.

·     Packets Received—Number of ICMP responses received by APM in the last ping test. The value is 0 or 1.

Process

APM collects CPU and memory usages of selected processes. By default, APM does not monitor any process, and the process list is empty.

The Process area contains the following fields:

·     Config—Click the Config icon  to quickly populate the Application Instance List with all detected processes running on the application. Select the desired processes, and then click OK. APM collects CPU and memory usages of the selected processes in the next polling interval.

·     Process Name—Name of the process.

·     CLI—Command line used to start the process.

·     CPU Usage—CPU usage of the process in the last polling interval.

¡     Click the Set Threshold icon  for a process to set CPU usage alarm thresholds for the process.

¡     Click the History Record icon icon_history_16x16.png for a process to view the CPU usage history graph for the process.

·     Memory Usage—Memory usage of the process in the last polling interval. Click the History Record icon icon_history_16x16.png for a process to view the memory usage history graph for the process.

 


HTTP service monitor

This chapter describes how to add and modify the URL application monitor and URL sequence application monitor, and helps you view the monitor reports.

URL

A uniform resource locator (URL) provides a reference to an Internet resource and a means of locating the resource. For more information about URL, see RFC 1738. You can access resources provided by HTTP services through URLs.

By accessing a URL, APM judges whether the HTTP service is properly running on the host that provides the resource to which the URL links.

Adding a URL application monitor

APM accesses URLs through the HTTP service port (TCP port 80 by default). When you add a URL application monitor, add HTTP service hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a URL application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click the URL of the HTTP Service Monitor class.

The page for adding a URL application monitor opens.

¡     IP Address—Enter the IP address of the host on which the HTTP service application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     DescriptionEnter a description for the application monitor to aid maintenance.

¡     Application Monitor Port—Enter the HTTP service port for URL access. The default port number is 80. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     SchemeSelect HTTP or HTTPS from the list. This field is available only when you select Disable from the Use Template list.

¡     Domain NameEnter the domain name of the Web page, for example, www.h3c.com. This field is available only when you select Disable from the Use Template list.

¡     Relative Path—Enter the relative path of the Web page, which starts with a slash (/). The URL of a Web page is in the format of http://+<IP address>+relative path, for example, http://10.154.240.55/imc/index.html, where the relative path is /imc/index.html. This field is available only when you select Disable from the Use Template list.

¡     KeywordSpecify the keyword contained on the Web page. APM counts the number of the specified keywords on the Web page file after the Web page is displayed. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of URL applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the URL application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between URL and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the URL application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the connection.

4.     Click OK.

Modifying a URL application monitor

Authorized users can modify all parameters except the IP address and the APM server for a URL application monitor. If the IP address of the URL that is being monitored changes, operators must add a new application monitor for the URL. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a URL application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the URL application monitor you want to modify.

The page for modifying the URL application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a URL application monitor."

5.     Click OK.

Viewing the URL application monitor report

After a URL application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the URL application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a URL application monitor to display the report.

Figure 117 shows part of a URL application monitor report.

Figure 117 Part of a URL application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the URL.

·     IP Address—IP address of the HTTP service host.

·     Application Type—Type of the monitored application, which is always URL.

·     Port—Port number used to access the URL. The Web server provides HTTP services through the port.

·     Last Polling Time—Time when APM last polled the URL application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between URL and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the URL. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the URL.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the URL.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the URL in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the URL in the last 30 days.

·     Available Time—Total amount of time that the URL service was available after 00:00 today.

·     Unavailable Time—Total amount of time that the URL service was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the URL service was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the URL service was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

APM requests the Web page indicated by the URL at each polling interval, and records the URL response time.

The Response Time area contains the following fields:

·     Relative path—Relative path of the monitored URL.

·     Response Time—Round trip response time for a URL request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Page Size

APM calculates the file size of the obtained Web page, and records changes in page file size in a trend graph.

The Page Size area contains the following fields:

·     Page Size—Size of the obtained Web page.

·     Rate of Change—Change in file size between the most recent two obtained Web pages. For example, if the file size of the most recently obtained Web page is 50 KB and the file size of its previous Web page is 40 KB, the change rate is 25% ((50-40)/40 × 100%). The value is positive if the page file size increases, and the value is negative if the page file size decreases.

Keyword

APM counts the number of keywords in the page file after the Web page is displayed.

The Keyword area contains the following fields:

·     KeywordKeywords on the Web page that are counted by APM.

·     Keyword NumberNumber of keywords on the Web page. Click the History Record icon icon_history_16x16.png to view the history graph of the keyword number.

Response Code

The Response Code area contains the following field:

·     Response CodeValue returned when APM receives the response from the Web page.

URL sequence

By using a URL sequence, APM tests a series of URL links. Test operations include Web page access, form query, and simple login. You can evaluate the interaction with the Web pages, collect HTTP service performance data, and analyze the quality of service.

Adding a URL sequence application monitor

APM accesses URLs through the HTTP service port (TCP port 80 by default). When you add a URL sequence application monitor, add HTTP service hosts to the IMC platform so APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To use the URL sequence application monitor function, you must use software such as Badboy to record operations and generate the URL sequence description file. APM collects data based on the description file.

To add a URL sequence application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click the URL Sequence of the HTTP Service Monitor class.

The page for adding a URL sequence application monitor opens.

¡     IP Address—Enter the IP address of the host on which the HTTP service application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     DescriptionEnter a description for the application monitor to aid maintenance.

¡     KeywordSpecify the keyword contained on the Web page. APM counts the number of the specified keywords on the Web page after the Web page is displayed.

¡     Sequence Description FileClick the Browse button and select the recorded URL sequence description file.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM ServerSelect the APM server. Options are displayed in the format of Server IP address(Application type:n/N). The N represents the number of applications that have been monitored on the APM server. The n represents the number of the same type of applications that have been monitored on the APM server. The option 127.0.0.1(Application type:n/N) indicates that the APM server is running on the same host as the IMC platform.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the URL sequence application depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between URL sequence and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the URL sequence application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the connection.

4.     Click OK.

Modifying a URL sequence application monitor

You can modify all parameters except the IP Address and APM Server. If the IP address of the URL that is being monitored changes, you must add a new URL sequence application monitor.

To modify a URL sequence application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the URL sequence application monitor you want to modify.

The page for modifying the URL sequence application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a URL sequence application monitor."

5.     Click OK.

Viewing the URL sequence application monitor report

After a URL sequence application monitor is added, APM collects index data for the URL sequence, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling.

To access the URL sequence application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a URL sequence application monitor to display the report.

Figure 118 shows part of a URL sequence application monitor report.

Figure 118 Part of a URL sequence application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the URL sequence.

·     IP Address—IP address of the HTTP service host.

·     Application Type—Type of the monitored application, which is always URL Sequence.

·     Port—Port number used to access the URL sequence. The Web server provides HTTP services through the port.

·     Last Polling Time—Time when APM last polled the URL sequence.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between URL and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the URL sequence. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the URL sequence.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the URL sequence.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the URL sequence in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the URL sequence in the last 30 days.

·     Available Time—Total amount of time that the URL sequence was available after 00:00 today.

·     Unavailable Time—Total amount of time that the URL sequence was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the URL sequence was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the URL sequence was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Sequence Monitoring Information

The Sequence Monitoring Information area contains the following fields:

·     Test Start TimeTime when APM started the test and sent the URL request.

·     Duration—Round trip response time for a URL request.

·     URLURL that was connected to during the test.

·     HTTP Status CodeHTTP status code returned by the test.

·     HTTP Status ValueDescription for HTTP status code.

·     Test ResultWhether a response is received for the URL request.

·     Responded BytesNumber of bytes in the response.

·     KeywordKeywords on the Web page that are counted by APM.

·     Keyword NumberNumber of keywords on the Web page found at the most recent poll. Because APM does not resolve or execute the HTTP or Java code of a Web page, this statistic might be different from the statistic collected by the Web browser.


Middleware/Portal monitor

This chapter describes how to add and modify middleware or portal application monitors, and helps you view relevant monitor reports.

Office SharePoint 2007

Office SharePoint 2007 is a set of enterprise business solutions developed by Microsoft. APM can monitor Office SharePoint 2007. The following information describes how to add and modify an Office SharePoint 2007 application monitor, and view the monitor report.

Adding an Office SharePoint 2007 application monitor

APM monitors the Office SharePoint 2007 application through WMI. When you add application monitors for Office SharePoint 2007, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Office SharePoint 2007 is deployed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add Office SharePoint 2007 hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows administrator's privileges.

To add an Office SharePoint 2007 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Office SharePoint 2007 of the Middleware/Portal Monitor class.

The page for adding an Office SharePoint 2007 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which Office SharePoint 2007 to be monitored is deployed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the Office SharePoint 2007 administrator. This field is available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the Office SharePoint 2007 administrator. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Office SharePoint 2007 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Office SharePoint 2007 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Office SharePoint 2007 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Office SharePoint 2007 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Office SharePoint 2007 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Office SharePoint 2007 application monitor. When the IP address of a monitored Office SharePoint 2007 host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Office SharePoint 2007 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Office SharePoint 2007 application monitor you want to modify.

The page for modifying the Office SharePoint 2007 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Office SharePoint 2007 application monitor."

5.     Click OK.

Viewing the Office SharePoint 2007 application monitor report

After an Office SharePoint 2007 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Office SharePoint 2007 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Office SharePoint 2007 application monitor to display the report.

Figure 119 shows part of an Office SharePoint 2007 application monitor report.

Figure 119 Part of an Office SharePoint 2007 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Office SharePoint 2007 application.

·     IP Address—IP address of the Office SharePoint 2007 host.

·     Application Type—Type of the monitored application, which is always Office SharePoint 2007.

·     Last Polling Time—Time when APM last polled Office SharePoint 2007.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Office SharePoint 2007 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Office SharePoint 2007 host. This field is not displayed if no alarm is generated by the Office SharePoint 2007 application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Office SharePoint 2007 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Office SharePoint 2007 in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Office SharePoint 2007 in the last 30 days.

·     Available Time—Total amount of time that the Office SharePoint 2007 application was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the Office SharePoint 2007 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Office SharePoint 2007 application was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the Office SharePoint 2007 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following fields:

·     CPU Usage Ratio dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graphView the CPU usage ratio of the Office SharePoint 2007 application.

¡     Trend graph—View the changes of the CPU usage ratio for the Office SharePoint 2007 application in a line chart.

·     CPU Usage RatioCPU usage ratio of the Office SharePoint 2007 application.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Status

The Memory Status area contains the following fields:

·     Idle Memory (MB)—Amount of the idle memory of the Office SharePoint 2007 host. Idle memory can be allocated for use by processes or the system. Click the History Record icon icon_history_16x16.png to view the history graph of the idle memory.

·     Faulty Pages/Sec—Average number of faulty pages counted per second by the operating system of the Office SharePoint 2007 host. Click the History Record icon icon_history_16x16.png to view the history graph of faulty pages per second.

·     In Use (%)—Committed virtual memory usage ratio of the Office SharePoint 2007 host. Committed virtual memory usage ratio = committed memory in use/maximum committed virtual memory × 100%. Click the History Record icon icon_history_16x16.png to view the history graph of the committed virtual memory usage ratio.

Excel Calculation Services

The Excel Calculation Services area contains the following fields:

·     Sessions/Sec—Average number of sessions opened per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the sessions per second.

·     Received Requests/Sec—Average number of active requests received per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the requests received per second.

·     Active Requests—Number of active requests being processed by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Error Requests/Sec—Average number of error requests returned per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the error requests per second.

·     Cached Charts Requested/Sec—Average times of requested charts obtained per second from cached charts by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the cache charts requested per second.

·     Reports Requested/Sec—Average number of report requests received per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the reports requested per second.

·     Active Sessions—Total number of active sessions in Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the active sessions.

Office Search Collector

The Office Search Collector area contains the following fields:

·     Backoff Reason—Reason that causes the Office search collector to enter backoff state. A value of 0 indicates that the Office search collector is operating correctly. Other different values indicate different reasons. Click the History Record icon icon_history_16x16.png to view the history graph of the backoff reason.

·     Idle Threads—Number of threads possessed by the Office search collector and waiting for documents. Click the History Record icon icon_history_16x16.png to view the history graph of the idle threads.

·     Delayed Documents—Number of documents delayed to be searched by the Office search collector subject to site hit frequency rules. Click the History Record icon icon_history_16x16.png to view the history graph of the delayed documents.

·     Retried Documents—Number of documents that will be retried after timeout. Click the History Record icon icon_history_16x16.png to view the history graph of the retried documents.

·     Active Queue Length—Number of documents waiting for robot threads in the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the active queue length.

·     Server Objects—Number of servers accessed by the Office search collector during a crawl. Office SharePoint 2007 creates a server object for a server being accessed for the first time. Click the History Record icon icon_history_16x16.png to view the history graph of the server objects.

·     Created Server Objects—Number of server objects created by the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the created server objects.

·     Network Access Threads—Number of threads waiting for responses from remote data storage or processing responses. Click the History Record icon icon_history_16x16.png to view the history graph of the network access threads.

·     Threads in Plugins—Number of threads that have been retrieved and are processed by plugins, such as Ifilter. Click the History Record icon icon_history_16x16.png to view the history graph of the threads in plugins.

Excel Service Web Front End

The Excel Service Web Front End area contains the following fields:

·     Active Requests—Number of active requests being processed by Excel Web services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Requests/Sec—Number of requests received per second by Excel Web services. Click the History Record icon icon_history_16x16.png to view the history graph of the requests per second.

Excel Web Access

The Excel Web Access area contains the following fields:

·     Web Access Time—Average Excel Web access request time. Click the History Record icon icon_history_16x16.png to view the history graph of the Web access time.

·     Chart Requests/Sec—Number of chart requests processed per second by the Excel Web access. Click the History Record icon icon_history_16x16.png to view the history graph of the chart requests per second.

·     Average Chart Request Time—Average time length from the time when the Excel Web access receives chart requests to the time when the Excel Web access sends responses to the Web browser. Click the History Record icon icon_history_16x16.png to view the history graph of the average chart request time.

Active Server Pages

The Active Server Pages area contains the following fields:

·     Errors/Sec—Average number of errors per second. Click the History Record icon icon_history_16x16.png to view the history graph of the errors per second.

·     Queued Requests—Number of requests waiting for services in the queue. Click the History Record icon icon_history_16x16.png to view the history graph of the queued requests.

·     Rejected Requests—Number of requests rejected due to insufficient resources. Click the History Record icon icon_history_16x16.png to view the history graph of the rejected requests.

·     Requests/Sec—Average number of requests executed per second. Click the History Record icon icon_history_16x16.png to view the history graph of the requests per second.

·     Current Sessions—Number of sessions being served per second. Click the History Record icon icon_history_16x16.png to view the history graph of the current sessions.

·     Transactions/Sec—Average number of transactions started per second. Click the History Record icon icon_history_16x16.png to view the history graph of the transactions per second.

·     Pending Transactions—Number of transactions being processed. Click the History Record icon icon_history_16x16.png to view the history graph of the pending transactions.

Document Conversion

The Document Conversion area contains the following fields:

·     Pending Sessions—Number of documents to be converted. Click the History Record icon icon_history_16x16.png to view the history graph of the pending sessions.

·     Processed Email Messages—Email message processing rate of Office SharePoint 2007. Click the History Record icon icon_history_16x16.png to view the history graph of the processed email messages.

Service

APM monitors the following services of Office SharePoint 2007:

·     Office Document Conversions Launcher Service

·     Office Document Conversions Load Balancer Service

·     Windows SharePoint Servers Search

·     Windows SharePoint Services Timer

·     Windows SharePoint Services Tracing

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display NameDisplay name of the service, which is equivalent to the alias of the service. The Window service console shows display names of services. In most cases, the display name of a service differs from the original name.

·     StatusStatus of the service.

Office Search Archive Plugin

The Office Search Archive Plugin area contains the following fields:

·     Name—Name of the Office search archive plugin.

·     Active Documents in the First QueueNumber of documents in the first queue of the Office search archive plugin.

·     Total Documents in the First QueueNumber of used documents in the first Office search archive plugin queue.

·     Active Documents in the Second Queue—Number of documents in the second Office search archive plugin queue.

·     Total Documents in the Second QueueNumber of used documents in the second Office search archive plugin queue.

·     Total DocumentsNumber of documents processed by the Office search archive plugin.

·     Error DocumentsNumber of error documents returned by the Office search archive plugin.

·     Retried DocumentsNumber of retried documents marked by the Office search archive plugin.

·     Active QueuesLength of the active queue.

·     Blocked DocumentsNumber of documents in the waiting queue of the Office search archive plugin.

·     Sessions Inserted in BatchesNumber of sessions batch inserted to the database server.

Office Search Plan Plugin

The Office Search Plan Plugin area contains the following fields:

·     Name—Name of the Office search plan plugin.

·     Loaded AliasNumber of aliases that the Office search plan plugin has loaded.

·     Mapped AliasNumber of mapped aliases.

·     Copied AliasNumber of aliases ignored because of duplication.

·     Error DocumentsNumber of error documents returned by the Office search plan plugin.

·     UpdatesTimes of alias updates by the Office search plan plugin.

·     Total DocumentsNumber of documents processed by the Office search plan plugin.

·     Total Properties ProcessedNumber of properties processed by the Office search plan plugin.

Office Server Search Index

The Office Server Search Index area contains the following fields:

·     Name—Name of the Office server search index.

·     QueriesNumber of queries to the Office server search index.

·     Query FailuresNumber of failed queries to the Office server search index.

·     Query SuccessesNumber of successful queries to the Office server search index.

·     Documents FilteredNumber of documents filtered by the Office server search index.

·     Index SizeSize of the Office server search index.

Web Content Publishing Management Storage

The Web Content Publishing Management Storage area contains the following fields:

·     Name—Name of the Web content publishing management storage.

·     Cache Hit RatioHit ratio of the Web content publishing management storage.

·     Discarded ObjectsTotal number of objects removed from the Web content publishing management storage.

·     Cache Hits/SecAverage number of cache hits per second of the Web content publishing management storage.

·     Cache Failures/SecAverage number of cache misses per second of the Web content publishing management storage.

·     Cache Flushes/SecAverage number of cache flushes per second of the Web content publishing management storage.

Office SharePoint 2010

Office SharePoint 2010 is a set of enterprise business solutions developed by Microsoft. APM can monitor Office SharePoint 2010. The following information describes how to add and modify an Office SharePoint 2010 application monitor, and view the monitor report.

Adding an Office SharePoint 2010 application monitor

APM monitors the Office SharePoint 2010 application through WMI. When you add application monitors for Office SharePoint 2010, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Office SharePoint 2010 is deployed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add Office SharePoint 2010 hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows administrator's privileges.

To add an Office SharePoint 2010 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Office SharePoint 2010 of the Middleware/Portal Monitor class.

The page for adding an Office SharePoint 2010 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which Office SharePoint 2010 to be monitored is deployed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host that is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the Office SharePoint 2010 administrator. This field is available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the Office SharePoint 2010 administrator. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Office SharePoint 2010 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Office SharePoint 2010 depends on, and the click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Office SharePoint 2010 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Office SharePoint 2010 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Office SharePoint 2010 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Office SharePoint 2010 application monitor. When the IP address of a monitored Office SharePoint 2010 host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Office SharePoint 2010 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Office SharePoint 2010 application monitor you want to modify.

The page for modifying the Office SharePoint 2010 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Office SharePoint 2010 application monitor."

5.     Click OK.

Viewing the Office SharePoint 2010 application monitor report

After an Office SharePoint 2010 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Office SharePoint 2010 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Office SharePoint 2010 application monitor to display the report.

Figure 120 shows part of an Office SharePoint 2010 application monitor report.

Figure 120 Part of an Office SharePoint 2010 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Office SharePoint 2010 application.

·     IP Address—IP address of the Office SharePoint 2010 host.

·     Application Type—Type of the monitored application, which is always Office SharePoint 2010.

·     Last Polling Time—Time when APM last polled Office SharePoint 2010.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Office SharePoint 2010 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Office SharePoint 2010 host. This field is not displayed if no alarm is generated by the Office SharePoint 2010 application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Office SharePoint 2010 application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Office SharePoint 2010 application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Office SharePoint 2010 application in the last 30 days.

·     Available Time—Total amount of time that the Office SharePoint 2010 application was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the Office SharePoint 2010 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Office SharePoint 2010 application was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the Office SharePoint 2010 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following fields:

·     CPU Usage Ratio dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graphView the CPU usage ratio of the Office SharePoint 2010 application.

¡     Trend graph—View the changes of the CPU usage ratio for the Office SharePoint 2010 application in a line chart. Point to a spot on the curve to view the CPU usage ratio at the specific time point.

·     CPU Usage RatioCPU usage ratio of the Office SharePoint 2010 application.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Status

The Memory Status area contains the following fields:

·     Idle Memory (MB)—Amount of the idle memory of the Office SharePoint 2010 host. Idle memory can be allocated for use by processes or the system. Click the History Record icon icon_history_16x16.png to view the history graph of the idle memory.

·     In Use (%)—Committed virtual memory usage ratio of the Office SharePoint 2010 host. Committed virtual memory usage ratio = committed memory in use/maximum committed virtual memory × 100%. Click the History Record icon icon_history_16x16.png to view the history graph of the committed virtual memory usage ratio.

Excel Calculation Services

The Excel Calculation Services area contains the following fields:

·     Sessions/Sec—Average number of sessions opened per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the sessions per second.

·     Received Requests/Sec—Average number of active requests received per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the received requests per second.

·     Active Requests—Number of active requests being processed by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Error Requests/Sec—Average number of error requests returned per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the error requests per second.

·     Cached Charts Requested/Sec—Average times of requested charts obtained per second from cached charts by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the cached charts requested per second.

·     Reports Requested/Sec—Average number of report requests received per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the reports requested per second.

·     Active Sessions—Total number of active sessions in Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the active sessions.

Office Search Collector

The Office Search Collector area contains the following fields:

·     Idle Threads—Number of threads possessed by the Office search collector and waiting for documents. Click the History Record icon icon_history_16x16.png to view the history graph of the idle threads.

·     Document Entries In Memory—Number of document entries in the memory of the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the document entries in memory.

·     Active Queue Length—Number of documents waiting for robot threads in the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the active queue length.

·     Server Objects—Number of servers accessed by the Office search collector during a crawl. Office SharePoint 2010 creates a server object for a server being accessed for the first time. Click the History Record icon icon_history_16x16.png to view the history graph of the server objects.

·     Created Server Objects—Number of server objects created by the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the created server objects.

·     Network Access Threads—Number of threads waiting for responses from remote data storage or processing responses. Click the History Record icon icon_history_16x16.png to view the history graph of the network access threads.

·     Threads in Plugins—Number of threads that have been retrieved and are processed by plugins, such as Ifilter. Click the History Record icon icon_history_16x16.png to view the history graph of the threads in plugins.

Excel Service Web Front End

The Excel Service Web Front End area contains the following fields:

·     Active Requests—Number of active requests being processed by Excel Web services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Requests/Sec—Number of requests received per second by Excel Web services. Click the History Record icon icon_history_16x16.png to view the history graph of the requests per second.

Active Server Pages

The Active Server Pages area contains the following fields:

·     Errors/Sec—Average number of errors per second. Click the History Record icon icon_history_16x16.png to view the history graph of the errors per second.

·     Queued Requests—Number of requests waiting for services in the queue. Click the History Record icon icon_history_16x16.png to view the history graph of the queued requests.

·     Rejected Requests—Number of requests rejected due to insufficient resources. Click the History Record icon icon_history_16x16.png to view the history graph of the rejected requests.

·     Requests/Sec—Average number of requests executed per second. Click the History Record icon icon_history_16x16.png to view the history graph of the requests per second.

·     Current Sessions—Number of sessions being served per second. Click the History Record icon icon_history_16x16.png to view the history graph of the current sessions.

·     Transactions/Sec—Average number of transactions started per second. Click the History Record icon icon_history_16x16.png to view the transactions per second.

·     Pending Transactions—Number of transactions being processed.

Service

APM monitors the following services of Office SharePoint 2010:

·     Microsoft SharePoint Server 2010 Document Conversions Launcher

·     Microsoft SharePoint Server 2010 Document Conversions Load Balancer

·     SharePoint Foundation Search V4

·     SharePoint 2010 Timer

·     SharePoint 2010 Tracing

·     SharePoint 2010 VSS Writer

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display NameDisplay name of the service, which is equivalent to the alias of the service. The Window service console shows display names of services. In most cases, the display name of a service differs from the original name.

·     StatusStatus of the service when APM last polled Office SharePoint 2010.

Office Search Archive Plugin

The Office Search Archive Plugin area contains the following fields:

·     Name—Name of the Office search archive plugin.

·     Total DocumentsNumber of used documents in the Office search archive plugin queue.

·     Retried DocumentsNumber of retried documents marked by the Office search archive plugin.

·     Active QueuesLength of the active queue.

·     Blocked DocumentsNumber of documents in the waiting queue of the Office search archive plugin.

·     Sessions Inserted in BatchesNumber of sessions batch inserted to the database server.

Office Search Plan Plugin

The Office Search Plan Plugin area contains the following fields:

·     Name—Name of the Office search plan plugin.

·     Loaded AliasNumber of aliases that the Office search plan plugin has loaded.

·     Mapped AliasNumber of mapped aliases.

·     Copied AliasNumber of aliases ignored because of duplication.

·     UpdatesTimes of alias updates by the Office search plan plugin.

·     Total DocumentsNumber of documents processed by the Office search plan plugin.

·     Total Properties ProcessedNumber of properties processed by the Office search plan plugin.

Office Server Search Index

The Office Server Search Index area contains the following fields:

·     Name—Name of the Office server search index.

·     QueriesNumber of queries to the Office server search index.

·     Query FailuresNumber of failed queries to the Office server search index.

·     Query SuccessesNumber of successful queries to the Office server search index.

·     Documents FilteredNumber of documents filtered by the Office server search index.

·     Index SizeSize of the Office server search index.

Web Content Publishing Management Storage

The Web Content Publishing Management Storage area contains the following fields:

·     Name—Name of the Web content publishing management storage.

·     Cache Hit RatioHit ratio of the Web content publishing management storage.

·     Discarded ObjectsTotal number of objects removed from the Web content publishing management storage.

·     Cache Hits/SecAverage number of cache hits per second of the Web content publishing management storage.

·     Cache Failures/SecAverage number of cache misses per second of the Web content publishing management storage.

·     Cache Flushes/SecAverage number of cache flushes per second of the Web content publishing management storage.

Office SharePoint 2013

Office SharePoint 2013 is a set of enterprise business solutions developed by Microsoft. APM can monitor Office SharePoint 2013. The following information describes how to add and modify an Office SharePoint 2013 application monitor, and view the monitor report.

Adding an Office SharePoint 2013 application monitor

APM monitors the Office SharePoint 2013 application through WMI. When you add application monitors for Office SharePoint 2013, follow these guidelines:

·     Configure and enable WMI for the Windows operating system on which Office SharePoint 2013 is deployed. For information about enabling WMI for Windows, see Microsoft Windows Server online help.

·     Add Office SharePoint 2013 hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the correct username and password of the user who has the Windows administrator's privileges.

To add an Office SharePoint 2013 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Office SharePoint 2013 of the Middleware/Portal Monitor class.

The page for adding an Office SharePoint 2013 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which Office SharePoint 2013 to be monitored is deployed. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start." APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform.

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of the Office SharePoint 2013 administrator. This field is available only when you select Disable from the Use Template list.

¡     Password—Enter the password of the Office SharePoint 2013 administrator. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Office SharePoint 2013 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Office SharePoint 2013 depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Office SharePoint 2013 and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Office SharePoint 2013 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Office SharePoint 2013 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an Office SharePoint 2013 application monitor. When the IP address of a monitored Office SharePoint 2013 host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an Office SharePoint 2013 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Office SharePoint 2013 application monitor you want to modify.

The page for modifying the Office SharePoint 2013 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Office SharePoint 2013 application monitor."

5.     Click OK.

Viewing the Office SharePoint 2013 application monitor report

After an Office SharePoint 2013 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Office SharePoint 2013 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an Office SharePoint 2013 application monitor to display the report.

Figure 121 shows part of an Office SharePoint 2013 application monitor report.

Figure 121 Part of an Office SharePoint 2013 application monitor report

Share Point2013.PNG

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the Office SharePoint 2013 application.

·     IP Address—IP address of the Office SharePoint 2013 host.

·     Application Type—Type of the monitored application, which is always Office SharePoint 2013.

·     Last Polling Time—Time when APM last polled Office SharePoint 2013.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Office SharePoint 2013 application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Office SharePoint 2013 host. This field is not displayed if no alarm is generated by the Office SharePoint 2013 application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Office SharePoint 2013 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Office SharePoint 2013 application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Office SharePoint 2013 application in the last 30 days.

·     Available Time—Total amount of time that the Office SharePoint 2013 application was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the Office SharePoint 2013 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Office SharePoint 2013 application was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the Office SharePoint 2013 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following fields:

·     CPU Usage Ratio dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graphView the CPU usage ratio of the Office SharePoint 2013 application.

¡     Trend graph—View the changes of the CPU usage ratio for the Office SharePoint 2013 application in a line chart.

·     CPU Usage RatioCPU usage ratio of the Office SharePoint 2013 application obtained when APM last polled Office SharePoint 2013.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage ratio.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Status

The Memory Status area contains the following fields:

·     Idle Memory (MB)—Amount of the idle memory of the Office SharePoint 2013 host. Idle memory can be allocated for use by processes or the system. Click the History Record icon icon_history_16x16.png to view the history graph of the idle memory.

·     In Use (%)—Committed virtual memory usage ratio of the Office SharePoint 2013 host. Committed virtual memory usage ratio = committed memory in use/maximum committed virtual memory × 100%. Click the History Record icon icon_history_16x16.png to view the history graph of the committed virtual memory usage ratio.

Excel Calculation Services

The Excel Calculation Services area contains the following fields:

·     Sessions/Sec—Average number of sessions opened per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the sessions per second.

·     Received Requests/Sec—Average number of active requests received per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the requests received per second.

·     Active Requests—Number of active requests being processed by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Error Requests/Sec—Average number of error requests returned per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the error requests per second.

·     Cached Charts Requested/Sec—Average times of requested charts obtained per second from cached charts by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the cached charts requested per second.

·     Reports Requested/Sec—Average number of report requests received per second by Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the reports requested per second.

·     Active Sessions—Total number of active sessions in Excel calculation services. Click the History Record icon icon_history_16x16.png to view the history graph of the active sessions.

Office Search Collector

The Office Search Collector area contains the following fields:

·     Idle Threads—Number of threads possessed by the Office search collector and waiting for documents. Click the History Record icon icon_history_16x16.png to view the history graph of the idle threads.

·     Document Entries In Memory—Number of document entries in the memory of the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the document entries in memory.

·     Active Queue Length—Number of documents waiting for robot threads in the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of the active queue length.

·     Server Objects—Number of servers accessed by the Office search collector during a crawl. Office SharePoint 2013 creates a server object for a server being accessed for the first time. Click the History Record icon icon_history_16x16.png to view the history graph of the server objects.

·     Created Server Objects—Number of server objects created by the Office search collector. Click the History Record icon icon_history_16x16.png to view the history graph of created server objects.

·     Network Access Threads—Number of threads waiting for responses from remote data storage or processing responses. Click the History Record icon icon_history_16x16.png to view the history graph of the network access threads.

·     Threads in Plugins—Number of threads that have been retrieved and are processed by plugins, such as Ifilter. Click the History Record icon icon_history_16x16.png to view the history graph of the threads in plugins.

Excel Service Web Front End

The Excel Service Web Front End area contains the following fields:

·     Active Requests—Number of active requests being processed by Excel Web services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Requests/Sec—Number of requests received per second by Excel Web services. Click the History Record icon icon_history_16x16.png to view the history graph of the requests per second.

Visio Web Access Services

The Visio Web Access Services area contains the following fields:

·     Avg Request Process Time(ms)—Average duration for Visio Web access services to respond to a request. Click the History Record icon icon_history_16x16.png to view the history graph of the average request process time.

·     Requests Received Per Second—Number of requests received by Visio Web access services per second. Click the History Record icon icon_history_16x16.png to view the history graph of the requests received per second.

·     Static Content Initial Transmission Time—Average duration for Visio Web access services to send original HTML and Java scripts to the client. Click the History Record icon icon_history_16x16.png to view the history graph of the static content initial transmission time.

Access Data Services

The Access Data Services area contains the following fields:

·     Active Requests—Number of active requests that are being processed by Access data services. Click the History Record icon icon_history_16x16.png to view the history graph of the active requests.

·     Active Sessions—Number of active sessions for Access data services. Click the History Record icon icon_history_16x16.png to view the history graph of the active sessions.

·     Avg Cache Data Get Time—Average duration for Access data services to search data in the cache. Click the History Record icon icon_history_16x16.png to view the history graph of the average cache data get time.

·     Avg Result Set Open Time—Average duration for Access data services to open the result set and return the first data block. Click the History Record icon icon_history_16x16.png to view the history graph of the average result set open time.

·     Avg Session Time—Average session duration for Access data services at a sampling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the average session time.

·     Avg Request Process Time—Average duration for Access data services to process a request at a sampling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the average request process time.

·     Active Data Storage Requests—Number of active requests that are sent by Access data services and are being processed by data storage. Click the History Record icon icon_history_16x16.png to view the history graph of the active data storage requests.

·     Access Workload Availability—Percentage of logical server availability for Access workload. Click the History Record icon icon_history_16x16.png to view the history graph of the access workload availability.

·     Application Workload Availability—Percentage of logical server availability for application workload. Click the History Record icon icon_history_16x16.png to view the history graph of the application workload availability.

·     Avg Data Storage Request Processing Time—Average duration for data storage to process a request at the most recent sampling interval. Click the History Record icon icon_history_16x16.png to view the history graph of the average data storage request processing time.

·     Remaining Access Workload Capacity—Remaining database capacity for Access workload. Click the History Record icon icon_history_16x16.png to view the history graph of the remaining access workload capacity.

·     Remaining Application Workload Capacity—Remaining database capacity for application workload. Click the History Record icon icon_history_16x16.png to view the history graph of the remaining application workload capacity.

Service

APM monitors the following services of Office SharePoint 2013:

·     SharePoint Timer Services

·     SharePoint Tracing Services

·     SharePoint Search Host Controller

·     Office Document Conversions Load Balancer

·     Office Document Conversions Launcher

The Service area contains the following fields:

·     Service Name—Original name of the service.

·     Display NameDisplay name of the service, which is equivalent to the alias of the service. The Window service console shows display names of services. In most cases, the display name of a service differs from the original name.

·     StatusStatus of the service when APM last polled Office SharePoint 2013.

Web Content Publishing Management Storage

The Web Content Publishing Management Storage area contains the following fields:

·     Name—Name of the Web content publishing management storage.

·     Cache Hit RatioHit ratio of the Web content publishing management storage.

·     Discarded ObjectsTotal number of objects removed from the Web content publishing management storage.

·     Cache Hits/SecAverage number of cache hits per second of the Web content publishing management storage.

·     Cache Failures/SecAverage number of cache misses per second of the Web content publishing management storage.

·     Cache Flushes/SecAverage number of cache flushes per second of the Web content publishing management storage.

Word Automation Services

The Word Automation Services area contains the following fields:

·     NameName of the Word automation service.

·     Timer Job Execution Time—Duration of the conversion task.

ActiveMQ

ActiveMQ is an open source message queue product offered by Apache Software Foundation. APM can monitor ActiveMQ 5.8.0 through JMX but does not collect traffic for ActiveMQ.

The following information describes how to add and modify an ActiveMQ application monitor, and view the monitor report.

Adding an ActiveMQ application monitor

To add an ActiveMQ application monitor, follow these restrictions and guidelines:

·     Contact the ActiveMQ administrator to enable JMX.

·     If JMX requires authentication, obtain the username and password of the ActiveMQ administrator. The username and password are required for adding the application monitor.

·     Add the hosts where ActiveMQ is deployed to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add an ActiveMQ application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click ActiveMQ of the Middleware/Portal Monitor class.

The page for adding an ActiveMQ application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the ActiveMQ server to be monitored. APM automatically checks the IP address and associates the application monitor with the ActiveMQ server if it is already managed in the IMC platform. To monitor an ActiveMQ server that is already managed in the IMC platform, you can also click Select, and then select the ActiveMQ server in the Select Devices dialog box. For information about selecting an ActiveMQ server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor PortEnter the JMX port for the ActiveMQ. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the ActiveMQ administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of ActiveMQ applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the ActiveMQ server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the ActiveMQ server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the ActiveMQ server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an ActiveMQ application monitor

Authorized users can modify all parameters except the IP address and the APM server for an ActiveMQ server. When the IP address of a monitored ActiveMQ server changes, operators must add a new application monitor for the ActiveMQ server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an ActiveMQ application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the ActiveMQ application monitor you want to modify.

The page for modifying the ActiveMQ application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an ActiveMQ application monitor."

5.     Click OK.

Viewing the ActiveMQ application monitor report

After an ActiveMQ application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the ActiveMQ application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an ActiveMQ application monitor to display the report.

Figure 122 shows part of an ActiveMQ application monitor report.

Figure 122 Part of an ActiveMQ application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the ActiveMQ server.

·     IP Address—IP address of the ActiveMQ server.

·     Application Type—Type of the monitored application, which is always ActiveMQ for an ActiveMQ application monitor.

·     Version—Version of the ActiveMQ server.

·     Last Polling Time—Time when APM last polled the ActiveMQ server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the ActiveMQ server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the ActiveMQ server. This field is not displayed if no alarm is generated by the ActiveMQ server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the ActiveMQ server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the ActiveMQ application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the ActiveMQ application in the last 30 days.

·     Available Time—Total amount of time that the ActiveMQ server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the ActiveMQ server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the ActiveMQ server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the ActiveMQ server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

OS Information

The OS Information area contains the following fields:

·     OS—Operating system of the host where ActiveMQ is deployed.

·     Architecture—Architecture of the host where ActiveMQ is deployed.

·     Total Kernel Count—Total number of CPU kernels on the host where ActiveMQ is deployed.

·     Used Virtual Memory—Used virtual memory size of the OS on the host where ActiveMQ is deployed.

·     Total Physical Memory—Total physical memory size of the OS on the host where ActiveMQ is deployed.

·     Free Physical Memory—Free physical memory size of the OS on the host where ActiveMQ is deployed.

·     Physical Memory Usage Ratio—Usage of the physical memory on the host where ActiveMQ is deployed. Click the History Record icon icon_history_16x16.png to view the history graph of the physical memory usage ratio.

·     Total Swap Memory—Total swap memory size on the host where ActiveMQ is deployed.

·     Free Swap MemoryFree swap memory size on the host where ActiveMQ is deployed.

·     Swap Usage Ratio—Usage of the swap memory on the host where ActiveMQ is deployed. Click the History Record icon icon_history_16x16.png to view the history graph of the swap usage ratio.

Heap Size Information

The Heap Size Information area contains the following fields:

·     Current Heap Size—Heap size of ActiveMQ. Click the History Record icon icon_history_16x16.png to view the current heap size.

·     Max Heap Size—Assigned maximum heap size of ActiveMQ.

·     Committed Heap Size—Committed heap size of ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the committed heap size.

Thread Information

The Thread Information area contains the following fields:

·     Active Thread Count—Number of active threads generated by ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the active threads.

·     Peak Thread Count—Maximum number of active threads generated by ActiveMQ since ActiveMQ was started. Click the History Record icon icon_history_16x16.png to view the history graph of the peak threads.

·     Daemon Thread Count—Number of daemon threads generated by ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the daemon threads.

·     Started Thread Count—Number of threads started by ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the started threads.

Class Information

The Class Information area contains the following fields:

·     Current Loaded Class Count—Number of classes loaded by ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the current loaded classes.

·     Total Loaded Class Count—Total number of classes loaded by ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the total loaded classes.

·     Total Removed Class Count—Total number of classes removed by ActiveMQ. Click the History Record icon icon_history_16x16.png to view the history graph of the total removed classes.

ActiveMQ Information

The ActiveMQ Information area contains the following fields:

·     Health Status—Health status of ActiveMQ.

·     Java VM—Information about the Java VM used by ActiveMQ.

·     Data File Directory—Directory where ActiveMQ data files are saved.

·     Memory Limit—Maximum memory size of ActiveMQ.

·     File Storage Limit—Maximum file storage size of ActiveMQ.

·     Temporary Storage Limit—Temporary maximum storage size of ActiveMQ.

Hadoop

Hadoop is an open-source distributed system framework developed by the Apache software foundation. The Hadoop framework includes the following modules:

·     Hadoop Distributed File System (HDFS)—A distributed file system that provides data storage services. An HDFS cluster has one name node and multiple data nodes.

·     Yet Another Resource Negotiator (YARN)—A resource management system responsible for managing and scheduling resources in clusters. A YARN cluster has one resource manager and multiple node managers.

APM supports monitoring Hadoop 2.7.0 and later versions.

Adding a Hadoop application monitor

APM monitors Hadoop applications through the RESTful API. When you add a Hadoop application monitor, follow these restrictions and guidelines:

·     Contact the Hadoop administrator to obtain the IP address and port number of the Hadoop name node. The IP address and port number can be obtained by viewing the following information in the hdfs-site.xml file of the Hadoop installation path:

<property>

    <name>dfs.http.address</name>

    <value>hadoop-master.imc.com:50070</value>

</property>

·     Contact the Hadoop administrator to obtain the IP address and port number of the Hadoop resource manager. The IP address and port number can be obtained by viewing the following information in the yarn-site.xml file of the Hadoop installation path:

<property>

    <name>yarn.resourcemanager.webapp.address</name>

    <value>hadoop-master.imc.com:8088</value>

</property>

·     Contact the Hadoop administrator to check whether a username is configured for the HDFS name node and the YARN resource manager, respectively.

·     Add the hosts where Hadoop is deployed to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the Hadoop application, make sure at least one probe is configured in APM. After a Hadoop application monitor is added, APM sends the IP address and service port of the monitored Hadoop application to the probes for traffic collection.

To add a Hadoop application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Hadoop of the Middleware/Portal Monitor class.

The page for adding a Hadoop application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host where the Hadoop name node is deployed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor PortEnter the port number of the Hadoop name node. The default is 50070. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port number of Hadoop. The default is 50070. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Name Node User NameIf a username is configured for the HDFS name node, enter the username.

¡     Resource Manager IPEnter the IP address of the Hadoop resource manager.

¡     Resource Manager PortEnter the port number of the Hadoop resource manager.

¡     Resource Manager User NameIf a username is configured for the YARN resource manager, enter the username.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Hadoop applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that Hadoop depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between Hadoop and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the Hadoop server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Hadoop application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Hadoop application. When the IP address of a monitored Hadoop changes, operators must add a new application monitor for the Hadoop. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Hadoop application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Hadoop application monitor you want to modify.

The page for modifying the Hadoop application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Hadoop application monitor."

5.     Click OK.

Viewing the Hadoop application monitor report

After a Hadoop application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Hadoop application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Hadoop application monitor to display the report.

Figure 123 shows part of a Hadoop application monitor report.

Figure 123 Part of a Hadoop application monitor report

 

The Hadoop application monitor report has the Summary, HDFS, and YARN tabs. Click each tab to view the corresponding information.

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Current health status of Hadoop.

·     IP Address—IP address of the Hadoop name node.

·     Application Description—Description of the Hadoop application.

·     Application Type—Type of the monitored application, which is always Hadoop for a Hadoop application monitor.

·     Software Version—Version of the monitored Hadoop.

·     Last Polling Time—Time when APM last polled the Hadoop.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Hadoop and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Hadoop. This field is not displayed if no alarm is generated by the Hadoop.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Hadoop server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Hadoop application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Hadoop application in the last 30 days.

·     Available Time—Total amount of time that the Hadoop application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Hadoop application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Hadoop application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Hadoop application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

HDFS Response Time

The HDFS Response Time area contains the following field:

·     HDFS Response TimePeriod from the time when APM connects to the HDFS service to the time when it receives a response.

¡     Click the Set Threshold icon  to set alarm thresholds for the HDFS response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the HDFS response time.

YARN Response Time

The YARN Response Time area contains the following field:

·     YARN Response TimePeriod from the time when APM connects to the YARN service to the time when it receives a response.

¡     Click the Set Threshold icon  to set alarm thresholds for the YARN response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the YARN response time.

HDFS Memory Usage

The HDFS Memory Usage area contains the following fields:

·     HDFS Committed Heap MemoryHeap memory size assigned to the JVM by the operating system.

·     HDFS Initialized Heap MemoryInitial heap memory size of the JVM.

·     HDFS Max Heap MemoryMaximum heap memory size of the JVM.

·     HDFS Used Heap MemoryUsed heap memory size of the JVM.

·     HDFS Committed Non-Heap MemoryNon-heap memory size assigned to the JVM by the operating system.

·     HDFS Initialized Non-Heap MemoryInitial non-heap memory size of the JVM.

·     HDFS Max Non-Heap MemoryMaximum non-heap memory size of the JVM.

·     HDFS Used Non-Heap MemoryUsed non-heap memory size of the JVM.

YARN Memory Usage

The YARN Memory Usage area contains the following fields:

·     YARN Committed Heap MemoryHeap memory size assigned to the JVM by the operating system.

·     YARN Initialized Heap MemoryInitial heap memory size of the JVM.

·     YARN Max Heap MemoryMaximum heap memory size of the JVM.

·     YARN Used Heap MemoryUsed heap memory size of the JVM.

·     YARN Committed Non-Heap MemoryNon-heap memory size assigned to the JVM by the operating system.

·     YARN Initialized Non-Heap MemoryInitial non-heap memory size of the JVM.

·     YARN Max Non-Heap MemoryMaximum non-heap memory size of the JVM.

·     YARN Used Non-Heap MemoryUsed non-heap memory size of the JVM.

Application Traffic

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the Hadoop application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the Hadoop application since 00:00 today.

NameNode Information

The NameNode Information area contains the following fields:

·     NameNode HostHost where the HDFS name node is deployed.

·     Start TimeTime when the HDFS name node was started.

·     Hadoop VersionVersion of Hadoop.

·     Compiled InformationCompilation information of Hadoop.

·     HDFS Cluster IDID of the cluster to which the HDFS name node belongs.

·     BlockPool IDID of the block pool of the HDFS name node.

·     NameNode StatusCurrent status of the HDFS name node.

·     Safe ModeWhether the HDFS is in safe mode.

DataNode Information

The DataNode Information area contains the following fields:

·     Live DataNodes—Number of active data nodes.

·     Live DataNodes PercentageRatio of the active data nodes to the total data nodes.

·     Dead DataNodesNumber of dead data nodes.

·     Dead DataNodes PercentageRatio of the dead data nodes to the total data nodes.

·     Decommissioning DataNodesNumber of data nodes that are being decommissioned from the cluster.

·     Decommissioned DataNodesNumber of data nodes that have been decommissioned from the cluster.

·     Corrupted DataNodesNumber of corrupted data nodes.

File System Usage

The File System Usage area contains the following fields:

·     DFS TotalTotal size of the DFS.

·     DFS UsedUsed size of the DFS.

·     DFS Used PercentageRatio of the used size to the total size of the DFS.

·     DFS Used Non-DFSUsed size of the non-DFS.

·     DFS AvailableAvailable size of the DFS.

·     DFS Available PercentageRatio of the available size to the total size of the DFS.

·     DFS Used Block PoolUsed size of the DFS block pool.

·     DFS Used Block Pool PercentageRatio of the used size to the total size of the DFS block pool.

·     DFS Total FilesTotal number of files in the DFS.

Block Information

The Block Information area contains the following fields:

·     Blocks CapacityTotal capacity of the blocks in the HDFS.

·     Total BlocksTotal number of blocks.

·     Lost BlocksNumber of lost blocks.

·     Corrupted BlocksNumber of corrupted blocks.

·     Excessive BlocksNumber of excessive blocks.

·     Under-Replicated BlocksNumber of blocks that are being replicated.

·     Suspended Replication BlocksNumber of blocks for which replication is suspended.

·     Scheduled Replication BlocksNumber of blocks that are scheduled to be replicated.

·     Suspended Deletion BlocksNumber of blocks for which deletion is suspended.

Snapshot Directories

The Snapshot Directories area contains the following fields:

·     PathPath of the snapshot directory in the HDFS.

·     Snapshot CountNumber of snapshots created in the snapshot directory.

·     Snapshot QuotaQuota of snapshots that can be created in the snapshot directory.

·     Directory Modified AtTime when the snapshot directory was most recently modified.

·     PermissionUser permission of the snapshot directory.

·     OwnerOwner of snapshot directory.

·     GroupUser group to which the owner of the snapshot directory belongs.

Snapshots

The Snapshots area contains the following fields:

·     Snapshot IDID of the snapshot.

·     DirectoryDirectory where the snapshot is stored.

·     Snapshot Modified AtTime when the snapshot was most recently modified.

Live DataNodes

The Live DataNodes area contains the following fields:

·     DataNode HostHost where the active data node is deployed.

·     DataNode IP AddressIP of the host where the active data node is deployed.

·     DataNode HTTP ServiceHTTP service IP address of the active data node.

·     DataNode StatusCurrent status of the active data node.

·     HDFS VersionHadoop version of the active data node.

·     Time Since Last ContactPeriod of time since the most recent communication between the active data node with the name node.

·     DataNode BlocksNumber of blocks stored on the active data node.

·     DataNode Total CapacityTotal capacity of the file system on the active data node.

·     DataNode UsedUsed size of the file system on the active data node.

·     DataNode Used PercentageRatio of the used size to the total size of the file system on the active data node.

·     DataNode AvailableAvailable size of the file system on the active data node.

·     DataNode Available PercentageRatio of the available size to the total size of the file system on the active data node.

·     DataNode Used Non-NFSUsed size of the non-NFS on the active data node.

·     DataNode Used Block PoolUsed size of the block pool on the active data node.

·     DataNode Used Block Pool PercentageRatio of the used size to the total size of the block pool on the active data node.

Dead DataNodes

The Dead DataNodes area contains the following fields:

·     Dead DataNode HostHost where the dead data node is deployed.

·     Dead DataNode IP AddressIP of the host where the dead data node is deployed.

·     Dead DataNode Time Since Last ContactPeriod of time since the most recent communication between the dead data node with the name node.

·     DecommissionedWhether the dead data node is decommissioned from the cluster.

Decommissioning DataNodes

The Decommissioning DataNodes area contains the following fields:

·     Decommissioning DataNode HostHost where the data node that is being decommissioned from the YARN is deployed.

·     Decommissioning DataNode IP AddressIP of the host where the data node that is being decommissioned from the YARN is deployed.

·     Decommissioning DataNode Time Since Last ContactPeriod of time since the most recent communication between the data node that is being decommissioned from the YARN with the name node.

Node Manager Information

The Node Manager Information area contains the following fields:

·     Live NodeManagersNumber of active node managers in the YARN.

·     Decommissioned NodeManagersNumber of decommissioned node managers in the YARN.

·     Lost NodeManagersNumber of lost node managers in the YARN.

·     Unhealthy NodeManagersNumber of unhealthy node managers in the YARN.

·     Rebooted NodeManagersNumber of rebooted node managers in the YARN.

Application Information

The Application Information area contains the following fields:

·     Submitted ApplicationsNumber of submitted applications.

·     Running ApplicationsNumber of running applications.

·     Suspended ApplicationsNumber of suspended applications.

·     Completed ApplicationsNumber of completed applications.

·     Killed ApplicationsNumber of killed applications.

·     Failed ApplicationsNumber of applications that fail execution because of calculation errors or other errors.

Live Node Manager

The Live Node Manager area contains the following fields:

·     NodeManager HostHost where the active node manager is deployed.

·     Node IDID of the active node manager.

·     RackRack where the active node manager is located.

·     NodeManager StatusCurrent status of the active node manager.

·     NodeManager HTTP ServiceHTTP service IP address of the active node manager.

·     Last Updated AtTime when the active data manager was most recently updated.

·     Health ReportHealth status report of the active node manager.

·     YARN VersionHadoop version of the active node manager.

·     Used MemoryUsed memory size of the active node manager.

·     Available MemoryAvailable memory size of the active node manager.

Applications

The Applications area contains the following fields:

·     Application IDID of the application.

·     NameName of the application.

·     TypeType of the application.

·     Current StatusCurrent status of the application.

·     Final StatusFinal status of the application.

·     ProgressExecution progress of the application.

·     UserUser to which the application belongs.

·     QueueQueue where the application is located.

·     YARN Cluster IDID of the cluster where the application is located.

·     Started AtTime when the application execution was started.

·     Finished AtTime when the application execution was completed.

·     Elapsed TimeDuration of the application execution.

Oracle GoldenGate

The Oracle GoldenGate (OGG) is a log-based, structured data replication software platform.

APM supports monitoring Oracle GoldenGate 12.1.2.1.0 through CLI.

Adding an Oracle GoldenGate application monitor

When you add an OGG application monitor, follow these restrictions and guidelines:

·     To monitor an OGG application through CLI, enable Telnet or SSH on the operating system running OGG.

·     Obtain the username and password of the Telnet or SSH user who has the OGG administrator's privileges.

·     Contact the OGG administrator to obtain the path to execute GGSCI.

·     Add OGG hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add an Oracle GoldenGate application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Oracle GoldenGate of the Middleware/Portal Monitor class.

The page for adding an Oracle GoldenGate application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the OGG application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if the host is already managed in the IMC platform. If the host is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Selecting devices."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Monitor Type—Select the protocol (SSH or Telnet) through which APM monitors the OGG application, and then click the Configure icon  to configure related parameters. This field is available only when you select Disable from the Use Template list.

When SSH is selected, configure the following parameters:

-     Edit SSH Parameters—Select this option if you want to manually configure SSH parameters for APM. Make sure the SSH settings are the same as those on the OGG host.

-     Select an Existing Template—Select this option if you want to select an existing SSH template for APM. For information about setting SSH parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication Mode—Select the authentication mode for SSH users. Options are Password, Private Key, Password + Private Key, Password + Super Password, Private Key + Super Password, and Password + Private Key + Super Password.

The following parameters to be configured vary with authentication modes:

 

Parameter

Remarks

User Name

Enter the SSH username. The user must have the OGG administrator's privilege.

Password

Enter the password of the SSH user.

Private Key File

Enter the directory of the SSH private key file or browse to the file.

Private Key Password

Enter the password to decrypt the SSH private key file.

Super Password

Enter the super password with which an SSH user can elevate privileges after login.

 

-     PortEnter the SSH port on the OGG host.

-     Timeout (1-120 seconds)Enter the maximum time period that APM waits for an SSH response from OGG. The value range is 1 to 120 seconds and the default is 10 seconds. If no SSH response is received from OGG within the timeout time, APM considers that the interaction has failed.

-     Retries (1-5)Enter how many times APM retries to send SSH packets to the OGG host.

When Telnet is selected, configure the following parameters:

-     Edit Telnet Parameters—Select this option if you want to manually configure Telnet parameters for APM. Make sure the Telnet settings are the same as those on the OGG host.

-     Select an Existing Template—Select this option if you want to select an existing Telnet template for APM. For information about setting Telnet parameter templates, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

-     Authentication ModeSelect the authentication mode for Telnet users. Options are Password (No Operator or Super/Manager), Username + Password, Super/Manager Password, Password + Super/Manager Password (No Operator), Username + Password + Super/Manager Password, No Username + No Password, and Username + No Password.

The following parameters to be configured vary with authentication modes.

 

Parameter

Remarks

User Name

Enter the Telnet username. The user must have the OGG administrator's privilege.

Password

Enter the password of the Telnet user.

Super Password

Enter the super password with which a Telnet user can elevate privileges after login.

 

-     Timeout (1-60 seconds)Enter the maximum time period that APM waits for a Telnet response from the OGG host. The value range is 1 to 60 seconds and the default is 4 seconds. If no Telnet response is received from the OGG host within the timeout time, APM considers that the interaction has failed.

¡     GGSCI Path—Enter the GGSCI execution path.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Oracle GoldenGate applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that OGG depends on, and then click OK.

Operating system applications cannot be selected. APM automatically adds the dependencies between OGG and operating system applications by IP address and displays their dependencies in the application topology.

Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the OGG application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify the connectivity to the application by using the previous parameter settings. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an Oracle GoldenGate application monitor

Authorized users can modify all parameters except the IP address and the APM server for an OGG application monitor. When the IP address of a monitored OGG host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify an Oracle GoldenGate application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the OGG application monitor you want to modify.

The page for modifying the OGG application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an Oracle GoldenGate application monitor."

5.     Click OK.

Viewing the Oracle GoldenGate application monitor report

After an OGG application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the Oracle GoldenGate application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an OGG application monitor to display the report.

Figure 124 shows part of an OGG application monitor report.

Figure 124 Part of an OGG application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the OGG application.

·     IP AddressIP address of the OGG host.

·     Application DescriptionDescription of the OGG application.

·     Application Type—Type of the monitored application, which is Oracle GoldenGate.

·     Last Polling TimeTime when APM last polled the OGG application.

·     Version—Version of the OGG application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between OGG and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the OGG application. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the OGG application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the OGG application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the OGG application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the OGG application in the last 30 days.

·     Available Time—Total amount of time that the OGG application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the OGG application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the OGG application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the OGG application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Program Info

The Program Info area contains the following fields:

·     Program—MANAGER, EXTRACT, or REPLICAT.

·     Status—Process running status.

·     Group—Name of the process.

·     Lag at Chkpt—Lag time from reading the check point at the source to writing it to the target.

·     Time Since Chkpt—Time since the last check point.

Total Statistics

The Total Statistics area contains the following fields:

·     Group—Name of process.

·     Statistics Since Time—Time when the statistics started.

·     Statistics Last Time—Last time when statistics was performed.

·     Total Inserts—Total number of insert operations.

·     Total Updates—Total number of update operations.

·     Total Befores—Total number of before operations.

·     Total Deletes—Total number delete operations.

·     Total Discards—Total number of discard operations.

·     Total Operations—Total number of operations.

Added Statistics

The Added Statistics area contains the following fields:

·     Group—Name of the process.

·     Added Inserts—Number of insert operations added between two collections.

·     Added Updates—Number of update operations added between two collections.

·     Added Befores—Number of before operations added between two collections.

·     Added Deletes—Number of delete operations added between two collections.

·     Added Discards—Number of discard operations added between two collections.

·     Added Operations—Total number of operations added between two collections.

Message

The Message area contains the following fields:

·     Time—Time when the log was recorded.

·     Message—Content of the log.

RabbitMQ

The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware. RabbitMQ is an implementation of AMQP written in the Erlang language.

APM supports monitoring RabbitMQ 3.5.0 and later versions.

Adding a RabbitMQ application monitor

APM monitors RabbitMQ applications through agents or the REST service. When you add a RabbitMQ application monitor, follow these restrictions and guidelines:

·     To monitor a RabbitMQ application through an agent, deploy the agent on the host where the RabbitMQ application is installed. For more information about agents, see "APM agent management."

·     To monitor a RabbitMQ application through the REST service:

¡     Contact the RabbitMQ administrator to obtain the username and password of a user who has the RabbitMQ administrator's privileges.

¡     Enable the Web console feature on RabbitMQ by using the rabbitmq-plugins.bat enable rabbitmq_management command.

¡     Contact the RabbitMQ administrator to obtain the REST service port number. The default is 15627. If the default setting is modified, view the port number of the rabbitmq_management service on the host where RabbitMQ is deployed. The port number of the rabbitmq_management service is the port number of the REST service.

·     Add the hosts where RabbitMQ is deployed to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a RabbitMQ application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click RabbitMQ of the Middleware/Portal Monitor class.

The page for adding a RabbitMQ application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host where the RabbitMQ application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if it is already managed in the IMC platform. To monitor a host that is already managed in the IMC platform, you can also click Select, and then select the RabbitMQ name node in the Select Devices dialog box. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor PortEnter the REST service port number of RabbitMQ. The default is 15672. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the RabbitMQ administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of RabbitMQ applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the RabbitMQ server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between RabbitMQ and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the RabbitMQ application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a RabbitMQ application monitor

Authorized users can modify all parameters except the IP address and the APM server for a RabbitMQ application. When the IP address of a monitored RabbitMQ host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a RabbitMQ application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the RabbitMQ application monitor you want to modify.

The page for modifying the RabbitMQ application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a RabbitMQ application monitor."

5.     Click OK.

Viewing the RabbitMQ application monitor report

After a RabbitMQ application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the RabbitMQ application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a RabbitMQ application monitor to display the report.

Figure 125 shows part of a RabbitMQ application monitor report.

Figure 125 Part of a RabbitMQ application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the RabbitMQ.

·     IP Address—IP address of the RabbitMQ host.

·     Port—Listening port number of the RabbitMQ application.

·     Application Description—Description of the RabbitMQ application.

·     Application Type—Type of the monitored application, which is always RabbitMQ for a RabbitMQ application monitor.

·     Last Polling Time—Time when APM last polled the RabbitMQ.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the RabbitMQ and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the RabbitMQ. This field is not displayed if no alarm is generated by the RabbitMQ.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the RabbitMQ server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the RabbitMQ application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the RabbitMQ application in the last 30 days.

·     Available Time—Total amount of time that the RabbitMQ application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the RabbitMQ application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the RabbitMQ application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the RabbitMQ application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Queued Messages

The Queued Messages area contains the following fields:

·     Queued MessagesNumber of queued messages.

·     Unacknowledged MessagesNumber of unacknowledged messages.

·     Total MessagesTotal number of messages.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Messages Rate

The Messages Rate area contains the following fields:

·     Publish Messages RateRatio of the published messages to the total messages.

·     Deliver/Get Messages RateRatio of the delivered messages to the total messages.

·     Acknowledged Messages RateRatio of the acknowledged messages to the total messages.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Exchanges Public Rate

The Exchanges Public Rate area contains the following fields:

·     Incoming Publish RateNumber of messages received by the RabbitMQ application per second.

·     Outcoming Publish RateNumber of messages sent by the RabbitMQ application per second.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Exchanges Details

The Exchange Details area contains the following fields:

·     NameName of the message exchange.

·     TypeType of message exchange. Options are:

¡     Direct

¡     Fanout

¡     Topic

¡     Headers

Connection

The Connection area contains the following fields:

·     Peer AddressIP addresses of both ends of the connection.

·     ProtocolAMQP protocol used by the connection.

·     Receive RateRatio of the messages received over the connection to the total messages.

·     Send RateRatio of the messages sent over the connection to the total messages.

·     StateStatus of the connection.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Nodes

The Nodes area contains the following fields:

·     NameName of the node.

·     Socket Descriptors UsedNumber of used socket descriptors on the node.

·     Socket Descriptors AvailableNumber of available socket descriptors on the node.

·     Socket Descriptors UtilizationRatio of the used socket descriptors to the total socket descriptors on the node.

·     Erlang Processes UsedNumber of used Erlang processes on the node.

·     Erlang Processes AvailableNumber of available Erlang processes on the node.

·     Erlang Processes UtilizationRatio of the used Erlang processes to the total Erlang processes on the node.

·     Memory UsedUsed memory size on the node.

·     Memory AvailableAvailable memory size on the node.

·     Memory UtilizationRatio of the used memory size to the total memory size on the node.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data. Click the Set Threshold icon  for an index to set alarm thresholds for the corresponding index.

Queues

The Queues area contains the following fields:

·     NameName of the message queue.

·     ExclusiveNumber of exclusive queues.

·     Messages ReadyNumber of ready messages in the queue.

·     Messages UnacknowledgedNumber of unacknowledged messages in the queue.

·     Total MessagesTotal number of messages in the queue.

·     Incoming RateRatio of the messages that enter the queue to the total messages.

·     Deliver/Get RateRatio of the delivered/got messages to the total messages in the queue.

·     Acknowledged RateRatio of the acknowledged messages to the total messages in the queue.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Channels

The Channels area contains the following fields:

·     ChannelName of the message channel.

·     User NameUsername bound to the channel.

·     Prefetch MessagesNumber of messages prefetched for the channel.

·     Unacknowledged MessagesNumber of unacknowledged messages in the channel.

·     Unconfirmed MessagesNumber of unconfirmed messages in the channel.

·     Publish RateRatio of the published messages to the total messages.

·     Deliver/Get RateRatio of the delivered/got messages to the total messages in the channel.

·     Acknowledged RateRatio of the acknowledged messages to the total messages in the channel.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

TongLINK/Q

TongLINK/Q is message-oriented middleware developed by TongTech to provide synchronous transfer, asynchronous transfer, store and forward, and reliable transfer to secure data delivery between different applications. APM supports monitoring TongLINK/Q applications.

Adding a TongLINK/Q application monitor

When you add application monitors for TongLINK/Q, follow these guidelines:

·     Set the application monitor port to be the same value as the ListenPort attribute value for [SuperviseBroker] in the tlsys.conf file located in the TongLINK/Q installation folder.

·     Add TongLINK/Q hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a TongLINK/Q application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click TongLINK/Q of the Middleware/Portal Monitor class.

The page for adding a TongLINK/Q application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the TongLINK/Q server to be monitored. APM automatically checks the IP address and associates the application monitor with the TongLINK/Q server if it is already managed in the IMC platform. To monitor a TongLINK/Q server that is already managed in the IMC platform, you can also click Select, and then select the TongLINK/Q server in the Select Devices dialog box. For information about selecting a TongLINK/Q server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the port on TongLINK/Q. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of TongLINK/Q applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the TongLINK/Q server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the TongLINK/Q server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the TongLINK/Q server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a TongLINK/Q application monitor

Authorized users can modify all parameters except the IP address and the APM server for a TongLINK/Q application monitor. When the IP address of a monitored TongLINK/Q host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a TongLINK/Q application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the TongLINK/Q application monitor you want to modify.

The page for modifying the TongLINK/Q application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a TongLINK/Q application monitor."

5.     Click OK.

Viewing the TongLINK/Q application monitor report

After a TongLINK/Q application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the TongLINK/Q application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a TongLINK/Q application monitor to display the report.

Figure 126 shows part of a TongLINK/Q application monitor report.

Figure 126 Part of a TongLINK/Q application monitor report

 

The TongLINK/Q application monitor report contains the Summary, QCU, and JMS tabs. Click each tab to view corresponding information about the TongLINK/Q application.

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the TongLINK/Q application.

·     IP Address—IP address of the TongLINK/Q host.

·     Application Type—Type of the monitored application, which is always TongLINK/Q.

·     Port—Port number used by the TongLINK/Q application.

·     Version—Version of the TongLINK/Q application.

·     License Start TimeTime when the license takes effect on the TongLINK/Q application.

·     License End TimeTime when the license for the TongLINK/Q application expires.

·     Last Polling Time—Time when APM last polled TongLINK/Q.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the TongLINK/Q application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the TongLINK/Q host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the TongLINK/Q application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the TongLINK/Q application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the TongLINK/Q application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the TongLINK/Q application in the last 30 days.

·     Available Time—Total amount of time that the TongLINK/Q application was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the TongLINK/Q application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the TongLINK/Q application was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the TongLINK/Q application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Node

A node is a set of TongLINK/Q instances required for system running, including core processes, memory resources, the log system, data storage, and application processes. APM monitors TongLINK/Q by node.

The Node area contains the following fields:

·     Node Name—Name of the node.

·     System StatusSystem status of the node.

·     Max. Programs—Maximum number of programs supported by the node.

·     Max. Instances—Maximum number of instances supported by the node.

·     Max. Branches in Single Cluster—Maximum number of branches supported by the node in a cluster.

·     Max. Network Groups—Maximum number of network groups supported by the node.

·     Max. Network Transactions—Maximum number of network transactions supported by the node.

·     Queue Creation and Recovery Threads—Number of queue creation and recovery threads configured for the node.

·     Sending Connections—Number of sending connections configured for the node.

·     Receiving Connections—Number of receiving connections configured for the node.

Page Monitor Processes

A page monitor process monitors queues of messages and sends signals to the queue management process to handle the messages. Signals are sent in special situations such as the lifecycle of a message ends and message reading by the application times out.

The Page Monitor Processes area contains the following field:

·     Page Monitor Processes—Number of page monitor processes configured for a node.

Sending Processes

A sending process sends messages located in queues in a QCU. Each node can have multiple sending processes, and each sending process can have multiple connections.

The Sending Processes area contains the following fields:

·     Sending Processes—Number of current sending processes.

·     Max. Sending Processes—Maximum number of sending processes supported by the node.

·     Sending Processes Usage—Usage of the sending processes.

Receiving Processes

A receiving process receives messages, and then places the messages in corresponding queues.

The Receiving Processes area contains the following fields:

·     Receiving Processes—Number of current receiving processes.

·     Max. Receiving Processes—Maximum number of receiving processes supported by a node.

·     Receiving Processes Usage—Usage of the receiving processes.

JMS Broker Processes

Java Message Service (JMS) is an API provided by the Java platform to the message-oriented middleware for asynchronous communication between two applications or in a distributed system. A JMS broker process communicates with the JMS client to send and receive messages.

The JMS Broker Processes area contains the following fields:

·     JMS Broker Processes—Number of current JMS broker processes.

·     Max. JMS Brokers—Maximum number of JMS brokers supported by a node.

·     JMS Broker Processes Usage—Usage of the JMS broker processes.

Thin Client Processes

The Thin Client Processes area contains the following fields:

·     Thin Client Processes—Number of processes that communicate with the thin client broker in TongLINK/Q.

·     Max. Thin Clients—Maximum number of thin clients supported by a node.

·     Thin Client Processes Usage—Usage of the thin client processes.

TLQ System Process

TLQ system processes contain node monitor processes, remote management processes, and JNDI broker processes.

The TLQ System Process area contains the following fields:

·     Process ID—ID of the TLQ system process.

·     Configuration ID—Configuration ID of the TLQ system process.

·     Process Name—Name of the TLQ system process.

·     Status—Status of the TLQ system process.

·     Listening Port—Port number that the TLQ system process listens to.

QCU Monitor Information

A queue control unit (QCU) runs separately in a node. It monitors and manages queues and messages in the queues.

The QCU Monitor Information area contains the following fields:

·     QCU—QCU name.

·     QCU Status—Status of the QCU.

·     Remote Queues—Number of remote queues in the QCU.

·     Cluster Queues—Number of cluster queues in the QCU.

·     Virtual Queues—Number of virtual queues in the QCU.

·     Available Messages in Dynamic Sending Queue—Number of available messages in a dynamic sending queue in the QCU.

·     Data Entries in Sending Queue—Number of data entries in a sending queue in the QCU.

·     Data Entries in Local Queue—Number of data entries in a local queue in the QCU.

·     Signal Lamps—Number of signal lamps in the QCU.

QCU Space Information

The QCU Space Information area contains the following fields:

·     QCU—QCU name.

·     Non-Persistent Space in Dynamic Sending Queue—Size of the non-persistent space in a dynamic sending queue in the QCU.

·     Persistent Space in Dynamic Sending Queue—Size of the persistent space in a dynamic sending queue in the QCU.

·     Dynamic Space in Local Queue—Size of the dynamic space in a local queue in the QCU.

·     Non-Persistent Space in Dynamic Local Queue—Size of the non-persistent space in a dynamic local queue in the QCU.

·     Queue Sending Swap—Size of the sending swap for a queue in the QCU.

·     Queue Receiving Swap—Size of the receiving swap for a queue in the QCU.

·     Queue Share Memory—Size of the share memory for a queue in the QCU.

BQS Monitor Information

The BQS Monitor Information area contains the following fields:

·     QCU—QCU name.

·     Sending Buffer—Size of the sending buffer for the Buffer Queue System (BQS) in the QCU.

·     Receiving Buffer—Size of the receiving buffer for the BQS in the QCU.

·     Share Memory—Size of the share memory for the BQS in the QCU.

·     Share Memories—Number of share memory resources for the BQS in the QCU.

History Messages in QCU

History messages include buffer messages and file messages. Buffer messages refer to pieces of user data in the memory. File messages are sent and received in file format. One file message corresponds to one file on a hard disk.

The History Messages in QCU area contains the following fields:

·     QCU—QCU name.

·     Buffer Messages Successfully Sent—Number of buffer messages that have been successfully sent in the QCU.

·     File Messages Successfully Sent—Number of file messages that have been successfully sent in the QCU.

·     Buffer Messages Successfully Received—Number of buffer messages that have been successfully received in the QCU.

·     File Messages Successfully Received—Number of file messages that have been successfully received in the QCU.

·     Buffer Messages Failed to Send—Number of buffer messages that failed to be sent in the QCU.

·     File Messages Failed to Send—Number of file messages that failed to be sent in the QCU.

·     Buffer Messages Failed to Receive—Number of buffer messages that failed to be received in the QCU.

·     File Messages Failed to Receive—Number of file messages that failed to be received in the QCU.

QCU Process

The QCU Process area contains the following fields:

·     QCU—QCU name.

·     Total Processes—Total number of processes for the QCU.

·     Sending Processes—Number of sending processes for the QCU.

·     Receiving Processes—Number of receiving processes for the QCU.

·     Thin Client Brokers—Number of thin client brokers for the QCU.

·     JMS Brokers—Number of JMS brokers for the QCU.

·     Publish/Subscribe Brokers—Number of publish/subscribe brokers for the QCU.

Sending Queues

A sending queue stores messages that are to be sent to a remote node.

The Sending Queues area contains the following fields:

·     QCUName of the QCU to which the sending queue belongs.

·     Sending Queues—Number of sending queues in the QCU.

·     Max. Sending Queues—Maximum number of sending queues in the QCU.

·     Sending Queues Usage—Usage of the sending queues in the QCU.

Local Queues

Local queues are physical queues created on local nodes. Local queues store messages transferred from remote networks, messages sent by local applications, event messages generated by the system, and system management messages.

The Local Queues area contains the following fields:

·     QCUName of the QCU to which the local queue belongs.

·     Local Queues—Number of local queues in the QCU.

·     Max. Local Queues—Maximum number of local queues in the QCU.

·     Local Queues Usage—Usage of the local queues in the QCU.

Sending Queue

The Sending Queues area contains the following fields:

·     QCUName of the QCU to which the sending queue belongs.

·     Queue Name—Name of the sending queue.

·     Queue Status—Status of the sending queue.

·     Existing Sending ConnectionsWhether or not the sending queue includes sending connections. Options are:

¡     0—No sending connections are configured.

¡     1—Sending connections exist.

·     Sending Connection—Sending connection corresponding to the queue.

·     Sending Process ID—Sending process ID for the queue.

·     Connection TypeConnection type of the sending queue. Options are:

¡     0—Permanent connection.

¡     1—On-demand connection.

·     Connection IP—Connection IP address of the queue.

·     Connection Port—Connection port number of the queue.

·     Sending Process Status—Sending process status of the queue.

·     Connection Status—Connection status of the queue.

·     Link Status—Link status of the queue.

·     Configured Messages—Number of messages configured for the queue.

·     Used Messages—Number of used messages in the queue.

·     Remaining Messages—Number of remaining messages in the queue.

·     Occupied Space—Size of the occupied space in the queue.

·     Remaining Space—Size of the remaining space in the queue.

Local Queue

The Local Queues area contains the following fields:

·     QCUName of the QCU to which the local queue belongs.

·     Queue Name—Name of the local queue.

·     Queue Status—Status of the local queue.

·     Waiting Consumers—Number of waiting consumers for the local queue.

·     Usage Type—Usage type of the local queue.

·     Trigger Type—TongLINK/Q starts message handling processes based on any of the following trigger modes:

¡     N—None. TongLINK/Q does not start message processing.

¡     F—OnFirst. TongLINK/Q starts message processing when the local queue has the first message in Ready state.

¡     E—OnEvery. TongLINK/Q starts message processing each time when the local queue has a message in Ready state.

¡     A—OnAmount. TongLINK/Q starts message processing when the local queue has a specific number of messages.

¡     D—OnDirect. TongLINK/Q starts message processing when the number of messages in the local queue exceeds the product of current handling processes and the TrigAmount attribute value.

·     Trigger Program No.—Sequence number of the trigger program for the queue. TongLINK/Q starts the corresponding message handling process based on the sequence number.

·     Configured Messages—Number of messages configured for the local queue.

·     Queued Messages—Total number of used messages in the local queue.

·     Remaining Messages—Number of remaining messages in the local queue.

·     Occupied Space—Size of the occupied space in the local queue.

·     Remaining Space—Size of the remaining space in the local queue.

Sending Connection

The Sending Connection area contains the following fields:

·     QCUName of the QCU to which the sending connection belongs.

·     Sending Process—Sending process of the connection.

·     Connection Name—Name of the sending connection.

·     Connection Status—Status of the sending connection.

Receiving Process

The Receiving Process area contains the following fields:

·     QCUName of the QCU to which the receiving process belongs.

·     Process ID—ID of the receiving process.

·     Process Status—Status of the receiving process.

·     Listening IP—IP address that the receiving process listens to.

·     Port Number—Port number of the receiving process.

·     Description Table ID—ID of the description table for the receiving process.

·     Process ID—ID of the receiving process.

·     Duration—Period of time that the receiving process operates.

·     Total Number—Total number of receiving processes.

Sending Process

The Sending Process area contains the following fields:

·     QCUName of the QCU to which the sending process belongs.

·     ID—ID of the sending process.

·     Process Status—Status of the sending process.

·     Description Table ID—ID of the description table for the sending process.

·     Process ID—ID of the process.

·     Sending Connections—Number of sending connections for the sending process.

·     Duration—Period of time that the sending process operates.

·     Total Number—Total number of sending processes.

JMS Broker

The JMS Broker area contains the following fields:

·     QCUName of the QCU to which the JMS broker belongs.

·     Monitor Status—Monitor status of the JMS broker.

·     Monitor ID—Monitor ID of the JMS broker.

·     Monitor Name—Monitor name of the JMS broker.

·     Monitor Start Time—Time when the JMS broker monitoring started.

·     Consumers—Number of consumers for the JMS broker.

·     Producers—Number of producers for the JMS broker.

·     Produced Messages—Number of produced messages for the JMS broker.

·     Consumed Messages—Number of consumed messages for the JMS broker.

JMS Broker Connection

The JMS Broker Connection area contains the following fields:

·     QCUName of the QCU to which the JMS broker that creates the connection belongs.

·     Total Number—Total number of JMS broker connections.

·     Monitor Status—Monitor status of the JMS broker connection.

·     Monitor ID—Monitor ID of the JMS broker connection.

·     Monitor Name—Monitor name of the JMS broker connection.

·     Monitor Start Time—Time when the JMS broker connection monitoring started.

·     Consumers—Number of consumers for the JMS broker connection.

·     Producers—Number of producers for the JMS broker connection.

·     Produced Messages—Number of produced messages for the JMS broker connection.

·     Consumed Messages—Number of consumed messages for the JMS broker connection.

JMS Broker Connection Session

The JMS Broker Connection Session area contains the following fields:

·     QCUName of the QCU to which the JMS broker connection that creates the session belongs.

·     Broker ID—Broker ID of the JMS broker connection session.

·     Connection ID—Connection ID of the JMS broker connection session.

·     Connection Name—Connection name of the JMS broker connection session.

·     Client IP—Client IP address of the JMS broker connection session. The client connects to the TongLINK/Q application through the JMS broker.

·     Login Name—Login name of the JMS broker connection session.

·     Client ID—Client ID of the JMS broker connection session.

·     Established at—Time when the JMS broker connection session was established.

·     Producers—Number of producers for the JMS broker connection session.

·     Consumers—Number of consumers for the JMS broker connection session.

·     Published Messages—Number of messages published by the JMS broker connection session.

·     Consumed Messages—Number of messages consumed by the JMS broker connection session.

·     Client Version—Client version of the JMS broker connection session.

·     Total Number—Total number of JMS broker connection sessions.

WebSphere MQ

WebSphere MQ is a message-oriented middleware launched by IBM to provide unified and reliable methods for communication between different applications. It is available on a large number of platforms, including Unix, Linux, Windows, OS/2, and AS/400.

APM can monitor WebSphere MQ 6.0. This section describes how to add and modify a WebSphere MQ application monitor, and helps you view the monitor report.

Adding a WebSphere MQ application monitor

APM monitors the WebSphere MQ application through the server channel of WebSphere MQ. When you add application monitors for WebSphere MQ, follow these guidelines:

·     Add WebSphere MQ hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     To view traffic statistics in the monitor report of the WebSphere MQ application, make sure at least one probe is configured in APM. After a WebSphere MQ application monitor is added, APM sends the IP address and service port of the monitored WebSphere MQ application to the probes for traffic collection.

To add a WebSphere MQ application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click WebSphere MQ of the Middleware/Portal Monitor class.

The page for adding a WebSphere MQ application monitor opens.

4.     Configure the following parameters for the application monitor:

¡     IP Address—Enter the IP address of the WebSphere MQ server to be monitored. APM automatically checks the IP address and associates the application monitor with the WebSphere MQ server if it is already managed in the IMC platform. To monitor a WebSphere MQ server that is already managed in the IMC platform, you can also click Select, and then select the WebSphere MQ server in the Select Devices dialog box. For information about selecting an WebSphere MQ server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the port on WebSphere MQ. This field is available only when you select Disable from the Use Template list.

¡     Traffic Collection Port—Enter the service port numbers for WebSphere MQ. This field is displayed only when at least one probe is configured for APM. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Server Channel—Enter the name of the server channel through which APM obtains performance index data of WebSphere MQ. This field is available only when you select Disable from the Use Template list.

¡     CCSIDEnter the coded character set ID of WebSphere MQ. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of WebSphere MQ applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the WebSphere MQ server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between the WebSphere MQ server and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the WebSphere MQ server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a WebSphere MQ application monitor

Authorized users can modify all parameters except the IP address and the APM server for a WebSphere MQ application monitor. When the IP address of a monitored WebSphere MQ host changes, operators must add a new application monitor for the host. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a WebSphere MQ application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The page displays all application types that can be monitored by APM.

3.     Click the Modify icon icon_modify_16x16.png for the WebSphere MQ application monitor you want to modify.

The page for modifying the WebSphere MQ application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a WebSphere MQ application monitor."

5.     Click OK.

Viewing the WebSphere MQ application monitor report

After a WebSphere MQ application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the WebSphere MQ application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a WebSphere MQ application monitor to display the report.

Figure 127 shows part of a WebSphere MQ application monitor report.

Figure 127 Part of a WebSphere MQ application monitor report

webspheremq.PNG

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the WebSphere MQ application.

·     IP Address—IP address of the WebSphere MQ host.

·     Application Type—Type of the monitored application, which is always WebSphere MQ.

·     Version—Version number of WebSphere MQ.

·     Last Polling Time—Time when APM last polled WebSphere MQ.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the WebSphere MQ application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the WebSphere MQ host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the WebSphere MQ application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the WebSphere MQ application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the WebSphere MQ application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the WebSphere MQ application in the last 30 days.

·     Available Time—Total amount of time that the WebSphere MQ application was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the WebSphere MQ application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the WebSphere MQ application was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the WebSphere MQ application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

Response Time

The Response Time area contains the following field:

·     Response Time—Round trip response time for the WebSphere MQ request.

¡     Click the Set Threshold icon  to set alarm thresholds for the response time.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the response time.

Application Traffic

APM collects WebSphere MQ application traffic based on the IP address of the host and the traffic collection port used by the application.

The Application Traffic area contains the following fields:

·     Last Hour's Traffic—Total traffic sent and received by the WebSphere MQ application over the last 1 hour.

·     Today's Traffic—Total traffic sent and received by the WebSphere MQ application since 00:00 today.

Queue Manager

The Queue Manager area contains the following fields:

·     Queue Manager Name—Name of the queue manager.

·     Queue Manager StatusCurrent status of queue manager.

·     Connection CountCurrent number of connections to the queue manager.

Channel Status Count

The Channel Status Count area contains the following fields:

·     Running Status CountNumber of channels in running state.

·     Stopped Status CountNumber of channels in stopped state.

·     Exception Status CountNumber of channels in exceptional state.

Queue

WebSphere MQ stores messages in queues until other applications process them.

The Queue area contains the following fields:

·     Name—Name of the queue managed by WebSphere MQ.

·     Current Queue DepthNumber of messages stored in the queue.

·     Open Input CountNumber of messages being added to the queue.

·     Open Output CountNumber of messages being taken from the queue.

·     Max. Queue DepthMaximum number of messages allowed to be stored in the queue.

·     Queue Message UsageCurrent queue depth to the maximum queue depth in percentage.

·     MoreClick More to view all queues.

Channel

The Channel area contains the following fields:

·     Name—Name of the channel managed by WebSphere MQ.

·     StateStatus of the channel when APM last polled WebSphere MQ.

·     Host ConnectedName of the host receiving messages from the channel.

·     Bytes SentNumber of bytes sent by the channel since channel startup.

·     Bytes ReceivedNumber of bytes received by the channel since the channel startup.

·     Sending BufferNumber of bytes sent by the channel.

·     Receiving BufferNumber of bytes received by the channel.

Listener

The Listener area contains the following fields:

·     Name—Name of the listener managed by WebSphere MQ.

·     StateStatus of the listener when APM last polled WebSphere MQ.

·     Session CountNumber of sessions between the listener and its clients when APM last polled WebSphere MQ.

·     Max. Concurrent ConnectionsMaximum number of concurrent connections supported by the listener. Connections exceeding the limit cannot be established.

·     PortTCP port on which the listener listens.


SAP monitor

APM provides the ability to monitor the availability and performance of SAP R/3 Release 4.6C (Red Hat version) to promptly detect bottlenecks in SAP applications.

Prerequisites

Before you can monitor SAP in APM, complete the tasks for IMC as described in this section.

If IMC is installed on a Windows server, complete the following provisioning task:

1.     Download SAP JavaConnector [sapjco-ntintel-2.1.8] from http://service.sap.com/connectors.

2.     Decompress the package, and copy and paste the file librfc32.dll to the C:\WINDOWS\system32 directory, and the files sapjco.jar and sapjcorfc.dll to the \apmserver\repository\sap\jars directory in the IMC installation path.

3.     Check whether files msvcr71.dll and msvcp71.dll exist in the C:\WINDOWS\system32 directory. If they do not exist, copy and paste them from another Windows operating system to this directory.

4.     Restart IMC.

If IMC is installed on a Linux server, complete the following provisioning task:

1.     Download SAP JavaConnector [sapjco-linuxintel-2.1.10] from http://service.sap.com/connectors.

2.     Decompress the package, and copy and paste files librfccm.so and libsapjcorfc.so to the /apmserver/jre/lib/i386/server directory in the IMC installation path, and the file sapjco.jar to the /apmserver/repository/sap/jars directory in the IMC installation path.

3.     Restart IMC.

Adding a SAP application monitor

APM monitors SAP through SAP Java Connector. When you add application monitors for SAP, follow these guidelines:

·     Add SAP hosts to the IMC platform so that APM can obtain and display network connections of the hosts and their access devices in the application topology. For more information about adding hosts to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Obtain the following information from the SAP system administrator:

¡     Username

¡     Password

¡     Client

¡     System instance

¡     Language

To add a SAP application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

The page displays all application types that can be monitored by APM.

¡     From the navigation tree, select Application Manager > Application Monitor, and then click Add on the application monitor list page.

3.     Click SAP of the SAP Monitor class.

The page for adding a SAP application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the SAP application to be monitored is installed. APM automatically checks the specified IP address and associates the application monitor with the host managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor to aid maintenance.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval provides more accurate realtime data, but consumes more system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password to access the SAP application to be monitored. The fields are available only when you select Disable from the Use Template list.

¡     Client—Enter the client ID of the SAP application to be monitored. This field is available only when you select Disable from the Use Template list.

¡     System Instance—Enter the instance number of SAP application to be monitored. This field is available only when you select Disable from the Use Template list.

¡     Language—Enter the language used by the SAP application to be monitored. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter user contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of SAP applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related ApplicationsClick Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that SAP depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology. APM automatically adds the dependencies between SAP and operating system applications by IP address and displays their dependencies in the application topology.

¡     Application GroupSpecify an application group for the SAP application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify connection to the application by using the previous parameter settings, and to determine whether to add the application monitor based on the verification result. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the connection.

5.     Click OK.

Modifying a SAP application monitor

Authorized users can modify all parameters except the IP address and the APM server for a SAP application monitor. When the IP address of a monitored SAP host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a SAP application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the SAP application monitor you want to modify.

The page for modifying the SAP application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a SAP application monitor."

5.     Click OK.

Viewing the SAP application monitor report

After a SAP application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the SAP application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a SAP application monitor to display the report.

Figure 128 shows part of a SAP application monitor report.

Figure 128 Part of a SAP application monitor report

SAP.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health StateHealth status of the monitored SAP application.

·     IP Address—IP address of the SAP host.

·     Application TypeType of the monitored application, which is always SAP.

·     ClientNumber of SAP client.

·     System InstanceInstance number of SAP application.

·     LanguageLanguage code of the SAP application.

·     Last Polling Time—Time when APM last polled the SAP application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the SAP application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarms—Latest five unrecovered alarms on the SAP host. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. If no alarm is generated by SAP, this field is not displayed.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the SAP application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the SAP application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the SAP application in the last 30 days.

·     Available Time—Total amount of time that the SAP application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the SAP application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the SAP application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the SAP application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed if its value is 0.

CPU Usage

The CPU Usage area contains the following field:

·     CPU Usage—CPU usage of the SAP application.

Spool Process Usage

The Spool Process Usage area contains the following field:

·     Spool Process Usage—Percentage of the operating spool processes to the total number of spool processes.

Background Processing Usage

The Background Processing Usage area contains the following field:

·     Background Processing Usage—Percentage of the active background processes to the total background processes. Click the History Record icon icon_history_16x16.png to view the history graph of the background processing usage.

Dialog Response Time

The Dialog Response Time area contains the following field:

·     Dialog Response Time—Response time of the dialog service for the SAP application. Click the History Record icon icon_history_16x16.png to view the history graph of the dialog response time.

Memory Page Dispatcher

The Memory Page Dispatcher area contains the following fields:

·     Swap Ins—Memory pages swapped in per second on the SAP host. Click the History Record icon icon_history_16x16.png to view the history graph of the swap Ins.

·     Swap Outs—Memory pages swapped out per second on the SAP host. Click the History Record icon icon_history_16x16.png to view the history graph of the swap outs.

Disk Space Usage

The Disk Space Usage area contains the following field:

·     Disk Space Usage—Percentage of used disk space on the SAP host.

Pending Background Processes

The Pending Background Processes area contains the following field:

·     Pending Background Processes—Number of pending background processes in the SAP application.

Background Processing Terminations

The Background Processing Terminations area contains the following fields:

·     Terminated Processes—Number of background processes that were terminated due to an error. Click the History Record icon icon_history_16x16.png to view the history graph of the terminated processes.

·     Total Processes—Total number of processes in SAP background processing. Click the History Record icon icon_history_16x16.png to view the history graph of the total processes.

Background Processing Errors

The Background Processing Errors area contains the following fields:

·     Errors per Minute—Average number of errors that occur in SAP background processing per minute. Click the History Record icon icon_history_16x16.png to view the history graph of the errors per minutes.

·     Total Errors—Total number of errors that have occurred in SAP background processing. Click the History Record icon icon_history_16x16.png to view the history graph of the total errors.

SAP System Work Queue

The SAP System Work Queue area contains the following fields:

·     SAP System Free Processes—Number of idle SAP processes. Click the History Record icon icon_history_16x16.png to view the history graph of the SAP system free processes.

·     SAP System Work Queue Length—Length of the SAP system work queue. Click the History Record icon icon_history_16x16.png to view the history graph of the SAP system work queue length.

Dialog Network Response Time

The Dialog Network Response Time area contains the following field:

·     Dialog Network Response Time—Response time of the network communication between the client and SAP. Click the History Record icon icon_history_16x16.png to view the history graph of the dialog network response time.

Standardization Response Time

The Standardization Response Time area contains the following field:

·     Standardization Response Time—Time that SAP uses to execute a standardization task. Click the History Record icon icon_history_16x16.png to view the history graph of the standardization response time.

Login User

The Login User area contains the following field:

·     Login User—Number of users who have logged in SAP when it was last polled by APM. Click the History Record icon icon_history_16x16.png to view the history graph of the login users.

Buffer

The Buffer area contains the following fields:

·     Buffer Name—Name of the buffer used by the SAP application. Click the History Record icon icon_history_16x16.png to view the history graph of the buffer name.

·     Directory UsagePercentage of the used directory in the buffer. Click the History Record icon icon_history_16x16.png to view the history graph of the directory usage.

·     Space UsagePercentage of the used storage space in the buffer. Click the History Record icon icon_history_16x16.png to view the history graph of the space usage.

·     Swap FrequencyNumber of swaps that occur in the buffer per minute due to full buffer. Click the History Record icon icon_history_16x16.png to view the history graph of the swap frequency.

·     Hit Ratio—Percentage of database queries that were found in the buffer instead of being sent to the database. Click the History Record icon icon_history_16x16.png to view the history graph of the hit ratio.

Dispatcher Queue Usage

The Dispatcher Queue Usage area contains the following field:

·     Dispatcher Queue Usage—Percentage of the used space in the spool dispatcher queue when APM last polled SAP. Click the History Record icon icon_history_16x16.png to view the history graph of the dispatcher queue usage.

Request Queue Usage

The Request Queue Usage area contains the following fields:

·     Request Queue Usage—Percentage of the used space in the spool request queue. Click the History Record icon icon_history_16x16.png to view the history graph of the request queue usage.

·     Request Queue Pages—Number of pages stored in the spool request queue. Click the History Record icon icon_history_16x16.png to view the history graph of the request queue pages.

·     Request Queue Sequence Usage—Percentage of the space used for sorting requests in the spool request queue. Click the History Record icon icon_history_16x16.png to view the history graph of the request queue sequence usage.

Spool Work Statistics

The Spool Work Statistics area contains the following fields:

·     Spool Errors per Minute—Average number of errors that occur in SAP background processing per minute. Click the History Record icon icon_history_16x16.png to view the history graph of the spool errors per minute.

·     Spool Errors—Total number of errors that have occurred in spool processes. Click the History Record icon icon_history_16x16.png to view the history graph of the spool errors.

·     Spool Terminations—Total number of spool processes that were terminated due to an error. Click the History Record icon icon_history_16x16.png to view the history graph of the spool terminations.

·     Spool Processes—Total number of spool processes. Click the History Record icon icon_history_16x16.png to view the history graph of the spool processes.

Device Cache

The Device Cache area contains the following fields:

·     Device Cache Usage—Used space in the device cache as a percentage. Click the History Record icon icon_history_16x16.png to view the history graph of the device cache usage.

·     Device Cache Fixed Ratio—Fixed device cache as a percentage. Click the History Record icon icon_history_16x16.png to view the history graph of the device cache fixed ratio.

Host Spool List

The Host Spool List area contains the following field:

·     Host Spool List—Percentage of used space in the host spool list when APM last polled SAP. Click the History Record icon icon_history_16x16.png to view the history graph of the host spool list.


Virtual device monitor

APM can monitor the following virtual devices:

·     Citrix XenServer

·     Hyper-V

·     KVM

·     CAS

·     PowerCenter

·     VMware ESX

·     VMware vCenter Server

·     HW FusionCompute

Citrix XenServer

XenServer is a computer virtualization product developed by Citrix. APM can monitor XenServer 6.1.0 and later versions through APIs that are provided by Citrix.

The following information describes how to add and modify a XenServer application monitor, and view the monitor report.

Adding a Citrix XenServer application monitor

When you add a XenServer application monitor, follow these guidelines:

·     Enable and configure SSH for XenServer. For more information, see the XenServer configuration guide.

·     Obtain the username and password of a user who has the XenServer administrator's privileges. The username and password are required for adding the application monitor.

To add a XenServer application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Citrix XenServer of the Virtual Device Monitor class.

The page for adding a XenServer application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the XenServer server to be monitored is deployed. APM automatically checks the IP address and associates the application monitor with the XenServer server if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a XenServer server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the XenServer administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Citrix XenServer applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the XenServer server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Citrix XenServer application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Citrix XenServer application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Citrix XenServer application monitor. When the IP address of a monitored Citrix XenServer server changes, operators must add a new application monitor for the XenServer server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a XenServer application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the XenServer application monitor you want to modify.

The page for modifying the XenServer application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Citrix XenServer application monitor."

5.     Click OK.

Viewing the Citrix XenServer application monitor report

After a Citrix XenServer application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the XenServer application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Citrix XenServer application monitor to display the report.

Figure 129 shows part of a Citrix XenServer application monitor report.

Figure 129 Part of a Citrix XenServer application monitor report

citrix.png

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health Status—Health status of the Citrix XenServer server.

·     IP Address—IP address of the Citrix XenServer server.

·     Application Type—Type of the monitored application, which is always Citrix XenServer for a Citrix XenServer application monitor.

·     Last Polling Time—Time when APM last polled the Citrix XenServer server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Citrix XenServer server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Citrix XenServer server. This field is not displayed if no alarm is generated by the Citrix XenServer server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Citrix XenServer server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Citrix XenServer in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Citrix XenServer in the last 30 days.

·     Available Time—Total amount of time that the Citrix XenServer server was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the Citrix XenServer server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Citrix XenServer server was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the Citrix XenServer server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Pool

The Pool area contains the following fields:

·     NameName of the pool.

·     DescriptionDescription of the pool.

·     MasterMaster server of the pool.

·     Default SRDefault storage repository of the pool.

·     HA EnabledWhether high availability is enabled for the pool.

·     WLB EnabledWhether load balancing is enabled for the pool.

Statistic

The Statistic area contains the following fields:

·     HostsTotal count of hosts in the pool.

·     SRsTotal count of storage repositories in the pool.

·     Shared SRsTotal count of shared storage repositories in the pool.

·     VMsTotal count of virtual machines in the pool.

·     Running VMsTotal count of running virtual machines in the pool.

·     SnapshotsTotal count of snapshots in the pool.

·     TemplatesTotal count of templates in the pool.

Host Information

The Host Information area contains the following fields:

·     Host Name—Name of the host where the Citrix XenServer server resides.

·     CPU Model—CPU model of the Citrix XenServer server.

·     CPU Frequency—CPU frequency of the Citrix XenServer server.

·     CPU Vendor—Vendor of the Citrix XenServer server.

·     Cores per CPU—Number of CPU cores on the Citrix XenServer server.

·     Major API Version—Major version number of Citrix XenServer API.

·     Minor API Version—Minor version number of Citrix XenServer API.

·     Description—Description of the Citrix XenServer server.

·     Enable New VMs—Whether new VMs can be started on the Citrix XenServer server.

·     Schedule Policy—Virtual CPU schedule policy used by the Citrix XenServer server.

·     License Expiration DateExpiration date of the license.

Memory Information

The Memory Information area contains the following fields:

·     Available XenServer Memory—Available memory space of the Citrix XenServer server. Click the History Record icon icon_history_16x16.png to view the history graph of the available Citrix XenServer memory.

·     Total XenServer Memory—Total memory space of the Citrix XenServer server. Click the History Record icon icon_history_16x16.png to view the history graph of the total Citrix XenServer memory.

·     Used XenServer Memory—Used memory space of the Citrix XenServer server. Click the History Record icon icon_history_16x16.png to view the history graph of the used Citrix XenServer memory.

·     XenServer Memory Usage—Memory usage ratio of the Citrix XenServer server. Click the History Record icon icon_history_16x16.png to view the history graph of the Citrix XenServer memory usage ratio.

·     Assigned XAPI MemoryMemory space assigned to XAPI after XAPI is started. Click the History Record icon icon_history_16x16.png to view the history graph of the assigned XAPI memory.

·     Active XAPI Memory—Memory space used by XAPI. Click the History Record icon icon_history_16x16.png to view the history graph of the active XAPI memory.

·     Total XAPI Memory—Total memory space for XAPI. Click the History Record icon icon_history_16x16.png to view the history graph of the total XAPI memory.

·     Available XAPI Memory—Available memory of XAPI. Click the History Record icon icon_history_16x16.png to view the history graph of the available XAPI memory.

Host CPU Information

The Host CPU Information area contains the following fields:

·     Core NameName of the CPU core.

·     ModelModel of the CPU.

·     UsageUsage ratio of the CPU core in the last polling period.

¡     Click the Set Threshold icon  to set alarm thresholds for the usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the usage.

·     FrequencyCPU frequency.

·     SeriesProduct series to which the CPU belongs.

·     Model No.Sequence number of CPU model.

·     SteppingStepping level of the CPU.

Storage Information

The Storage Information area contains the following fields:

·     Storage Name—Name of the storage.

·     DescriptionDescription of the storage.

·     Storage TypeType of the storage.

·     Content TypeType of the stored content.

·     Sharable—Whether the storage can be shared by hosts.

·     UsageUsage of the storage. Click the History Record icon icon_history_16x16.png to view the history graph of the usage.

·     Physical CapacityPhysical capacity of the storage.

·     Virtual CapacityCapacity of all virtual disk images in the storage.

Physical NIC Information

The Physical NIC Information area contains the following fields:

·     Name—Name of the NIC on the Citrix XenServer server.

·     IP Address—IP address of the NIC.

·     MAC Address—MAC address of the NIC.

·     Subnet Mask—Subnet mask of the NIC.

·     Gateway—IP address of the gateway.

·     Send Rate—Number of outbound bits per second on the NIC.

·     Receive Rate—Number of inbound bits per second on the NIC.

·     Send Errors—Number of outbound erroneous packets per second on the NIC.

·     Receive Errors—Number of inbound erroneous packets per second on the NIC.

·     Speed—Speed of the NIC.

·     Mode—Duplex mode of the NIC, Full or Half.

·     MTUMaximum transmission unit of the NIC. A packet whose size exceeds the MTU will be fragmented.

VM List

The VM List area contains the following fields:

·     VM Name—Name of the VM on the Citrix XenServer server.

·     Power Supply StatusStatus of the power supply on the VM.

·     CPU UsageCPU usage ratio of the VM.

·     Virtual CPUsNumber of virtual CPUs on the VM.

VM Memory Information

The VM Memory Information area contains the following fields:

·     VM NameName of the VM on the Citrix XenServer server.

·     Memory Cost—Memory cost that occurred when the Citrix XenServer server managed the VM.

·     Min. Dynamic Memory—Minimum dynamic memory space of the VM.

·     Max. Dynamic Memory—Maximum dynamic memory space of the VM.

·     Min. Static Memory—Minimum static memory space of the VM.

·     Max. Static Memory—Maximum static memory space of the VM.

Virtual Block Device Information

The Virtual Block Device Information area contains the following fields:

·     VM Name—Name of the VM to which the virtual block device belongs.

·     Block Device Name—Name of the virtual block device.

·     Startup Disk—Whether the virtual block device is the startup disk.

·     Attached—Whether the virtual block device is active.

·     Empty Device—Whether the virtual block device is used.

·     Mode—Operating mode of the virtual block device, RO (Read Only) or RW (Read Write).

·     Status Code—Status code of the virtual block device.

·     Storage Lock—Whether the virtual block device has obtained the storage level lock.

·     Type—Type of the virtual block device, DISK or CD.

·     Pluggable—Whether the virtual block device is hot swappable.

Virtual Disk Image Information

The Virtual Disk Image Information area contains the following fields:

·     VM Name—Name of the VM to which the virtual disk image belongs.

·     Image Name—Name of the virtual disk image.

·     Description—Description of the virtual disk image.

·     Manageable—Whether the virtual disk image can be managed.

·     Usage—Usage of the virtual disk image in the last polling period.

·     Virtual Disk Size—Size of the virtual disk image.

·     Read-Only—Whether the virtual disk image is read only.

·     Sharable—Whether the virtual disk image can be shared.

·     Storage—Name of the storage where the virtual disk image is located.

Virtual NIC Information

The Virtual NIC Information area contains the following fields:

·     VM Name—Name of the VM to which the virtual NIC belongs.

·     NIC Name—Name of the virtual NIC.

·     MAC Address—MAC address of the virtual NIC.

·     Virtual Network—Name of the network to which the virtual NIC is connected.

·     MTUMaximum transmission unit of the virtual NIC.

·     Attached—Whether the virtual NIC is active in the last polling period.

·     Send Rate—Number of outbound bits per second on the virtual NIC in the last polling period.

·     Receive Rate—Number of inbound bits per second on the virtual NIC in the last polling period.

·     Send Errors—Number of outbound erroneous packets per second on the virtual NIC in the last polling period.

·     Receive Errors—Number of inbound erroneous packets per second on the virtual NIC in the last polling period.

·     Read Rate—Number of bits the virtual NIC read per second in the last polling period.

·     Write Rate—Number of bits the virtual NIC wrote per second in the last polling period.

Hyper-V

Hyper-V is an enterprise-level computer virtualization product offered by Microsoft. APM can monitor Hyper-V servers running on Windows Server 2012.

The following information describes how to add and modify a Hyper-V application monitor, and view the monitor report.

Adding a Hyper-V application monitor

When you add a Hyper-V application monitor, follow these guidelines:

·     Configure and enable WMI on Windows.

·     Obtain the username and password of a user who has the Hyper-V administrator's privileges. The username and password are required for adding the application monitor.

To add a Hyper-V application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Hyper-V of the Virtual Device Monitor class.

The page for adding a Hyper-V application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the Hyper-V server to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the Hyper-V server if it is already managed in the IMC platform. To monitor a Hyper-V server that is already managed in the IMC platform, you can also click Select, and then select the Hyper-V server in the Select Devices dialog box. For information about selecting a Hyper-V server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the Hyper-V administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Hyper-V applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the Hyper-V server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Hyper-V application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Hyper-V application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Hyper-V server. When the IP address of a monitored Hyper-V server changes, operators must add a new application monitor for the Hyper-V server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a Hyper-V application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the Hyper-V application monitor you want to modify.

The page for modifying the Hyper-V application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Hyper-V application monitor."

5.     Click OK.

Viewing the Hyper-V application monitor report

After a Hyper-V application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Hyper-V application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a Hyper-V application monitor to display the report.

Figure 130 shows part of a Hyper-V application monitor report.

Figure 130 Part of a Hyper-V application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the Hyper-V server.

·     IP Address—IP address of the Hyper-V server.

·     Application Type—Type of the monitored application, which is always Hyper-V for a Hyper-V application monitor.

·     Version—Version of the Hyper-V server.

·     Last Polling Time—Time when APM last polled the Hyper-V server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the Hyper-V server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management"

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the Hyper-V server. This field is not displayed if no alarm is generated by the Hyper-V server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Hyper-V server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the Hyper-V in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the Hyper-V in the last 30 days.

·     Available Time—Total amount of time that the Hyper-V server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Hyper-V server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Hyper-V server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Hyper-V server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Hyper-V System

The Hyper-V System area contains the following fields:

·     VM CountNumber of VMs running on the Hyper-V server.

·     Logical Processor Count—Number of logical processors on the Hyper-V server.

·     VM Processor Count—Number of virtual processors on all VMs.

Hyper-V System Service

The Hyper-V System Service area contains the following fields:

·     Service Name—System service that the Hyper-V server depends on.

·     Running Status—Running status of the system service.

·     Service Status—Service status of the system service.

Logical Processor Usage

The Logical Processor Usage area contains the following fields:

·     Logical Processor Usage dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graphView the logical processor usage ratio of the Hyper-V server.

¡     Trend graph—View the changes of the logical processor usage ratio for the Hyper-V server in a line chart. Point to a spot on the curve to view the logical processor usage ratio at the specific time point.

·     Total Usage—Total usage of logical processors.

·     Guest Code—Percentage of the logical processors that process Guest Code.

·     Management System—Percentage of the logical processors occupied by the Hyper-V system.

·     Free—Percentage of the free logical processors.

Memory Usage

The Memory Usage area contains the following fields:

·     VM—Name of the VM running on the Hyper-V server.

·     Physical Memory Usage—Physical memory size assigned to the VM.

·     Current Pressure—VM memory usage. It is calculated by using the following formula: Current pressure = Memory size used by the VM/Memory size assigned to the VM x 100%.

Dynamic Memory Equalizer

The Dynamic Memory Equalizer area contains the following fields:

·     NameName of the dynamic memory equalizer.

·     Available Memory—Available memory size of the dynamic memory equalizer.

Memory Management Information

The Memory Management Information area contains the following fields:

·     VMName of the VM running on the Hyper-V server.

·     Assigned Physical Page Count—Number of physical pages assigned to the VM.

·     Remote Physical Page Count—Number of VM's physical pages on a remote node.

Root Partition Memory Usage

The Root Partition Memory Usage area contains the following fields:

·     NameName of the root partition.

·     Used Page Count—Number of pages used by the root partition.

·     Virtual TLB Page Count—Number of pages used by the root partition Translation Lookaside Buffer. TLB is a memory buffer used to improve the transition speed from a virtual address to a physical address.

VM Processor Usage

The VM Processor Usage area contains the following fields:

·     Virtual Processor NameName of the VM to which the virtual processor belongs and the ID of the virtual processor in the VM.

·     Usage—Usage of the virtual processor.

Virtual Switch Information

The Virtual Switch Information area contains the following fields:

·     NameName of the virtual switch.

·     Byte Processing RateRate that the virtual switch processes bytes.

·     Packet Processing Rate—Rate that the virtual switch processes packets.

Total Partition Memory Usage

The Total Partition Memory Usage area contains the following fields:

·     Page Count—Number of pages used by all partitions in the memory.

·     Address Space Count in Virtual TLB—Number of address spaces in virtual TLBs.

·     Page Count Used by Virtual TLB—Number of pages used by virtual TLBs in the memory.

·     GPA Space Modify CountNumber of guest physical address space modify operations.

·     Virtual TLB Refresh CountNumber of virtual TLB refresh operations.

Virtual Switch Port Information

The Virtual Switch Port Information area contains the following fields:

·     Port Name—Name of a port on the virtual switch.

·     Byte Received/Sec—Rate that the port receives bytes.

·     Byte Send/Sec—Rate that the port sends bytes.

·     MoreClick More to view port information for all virtual switches. By default, the report displays port information for only the first 10 virtual switches.

Host/VM Monitor

The Host/VM Monitor area contains the following fields:

·     Host/VM—Name of the host or VM.

·     GUIDIdentifier of the host or VM.

·     Monitor Type—Monitor type of the host or VM.

·     StatusStatus of the host or VM.

·     Health Status—Health state of the host or VM.

Options and their meanings are as follows:

¡     5—OK.

¡     20—Major failure.

¡     25—Critical failure.

Virtual Network Adapter

The Virtual Network Adapter area contains the following fields:

·     Adapter NameName of the virtual network adapter.

·     Bytes Processed/SecRate that the virtual network adapter processes data.

·     Bytes Received/SecRate that the virtual network adapter receives data.

·     Bytes Sent/SecRate that the virtual network adapter sends data.

·     Output Packet Losses/Sec—Packet loss rate when the virtual network adapter sends packets.

·     Packets Sent/SecRate that the virtual network adapter sends packets.

·     Packets Received/SecRate that the virtual network adapter receives packets.

Virtual Storage Information

The Virtual Storage Information area contains the following fields:

·     NameReal file name of the virtual storage on the disk.

·     Error Operation Count—Total number of error operations on the virtual storage.

·     Refresh Operation Count—Total number of refresh operations on the virtual storage.

·     Read Operation Count—Total number of read operations on the virtual storage.

·     Write Operation Count—Total number of write operations on the virtual storage.

·     Bytes Read/SecBytes read from the virtual storage per second.

·     Bytes Written/SecBytes written into the virtual storage per second.

KVM

KVM is a Linux-based computer virtualization product. APM can monitor KVM 0.9.3 and later versions through the CLI.

The following information describes how to add and modify a KVM application monitor, and view the monitor report.

Adding a KVM application monitor

When you add a KVM application monitor, follow these guidelines:

·     Enable and configure SSH on the Linux operating system that is hosting the KVM server. For more information, see the Linux operating system configuration guide.

·     Obtain the username and password of a user who has the KVM administrator's privileges. The username and password are required for adding the application monitor.

To add a KVM application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click KVM of the Virtual Device Monitor class.

The page for adding a KVM application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the KVM server to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the KVM server if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the KVM server in the Select Devices dialog box. For information about selecting a KVM server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the KVM administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of KVM applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the KVM server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the KVM application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a KVM application monitor

Authorized users can modify all parameters except the IP address and the APM server for a KVM application monitor. When the IP address of a monitored KVM server changes, operators must add a new application monitor for the KVM server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a KVM application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the KVM application monitor you want to modify.

The page for modifying the KVM application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a KVM application monitor."

5.     Click OK.

Viewing the KVM application monitor report

After a KVM application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the KVM application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a KVM application monitor to display the report.

Figure 131 shows part of a KVM application monitor report.

Figure 131 Part of a KVM application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health Status—Health status of the KVM server.

·     IP Address—IP address of the KVM server.

·     Application Type—Type of the monitored application, which is always KVM for a KVM application monitor.

·     Last Polling Time—Time when APM last polled the KVM server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the KVM server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the KVM server. This field is not displayed if no alarm is generated by the KVM server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the KVM server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the KVM in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the KVM in the last 30 days.

·     Available Time—Total amount of time that the KVM server was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the KVM server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the KVM server was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the KVM server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Server Information

The Basic Server Information area contains the following fields:

·     Host Name—Name of the host where the KVM server resides.

·     CPU Model—CPU model of the KVM server.

·     Logical CPUs—Number of logical CPUs on the KVM server. Number of logical CPUs = Number of CPU slots * Number of cores per slot * Number of threads per core.

·     CPU Frequency (MHz)—CPU frequency of the KVM server.

·     CPU Slots—Number of CPU slots on the KVM server.

·     Cores per Slot—Number of cores in each slot on the KVM server.

·     Threads per Core—Number of threads in each core on the KVM server.

·     NUMA Nodes—Number of NUMA nodes on the KVM server.

·     Memory Capacity—Memory size of the KVM server.

VM List

The VM List area contains the following fields:

·     VM ID—ID of the VM. Only VMs that are in running state have IDs.

·     NameName of the VM.

·     StatusStatus of the VM.

Server CPU Usage

The Server CPU Usage area contains the following fields:

·     Server CPU Usage dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graph—Shows the CPU usage of the KVM server in the last polling period.

¡     Trend graphShows the CPU usage trend of the KVM server over a specific time range in a line graph.

·     UsedCPU usage of the KVM server.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     User—Percentage of CPU resources used by the KVM server to process user requests. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of CPU resources used by the KVM server to process user requests.

·     System—Percentage of CPU resources used by the KVM management system. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of CPU resources used by the KVM management system.

·     Free—Percentage of free CPU resources on the KVM server. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of free CPU resources on the KVM server.

·     Waiting I/O—Percentage of CPU resources used by the KVM server to wait for I/O operations. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of CPU resources used by the KVM server to wait for I/O operations.

Server Memory Usage

The Server Memory Usage area contains the following fields:

·     Server Memory Usage dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graph—Shows the memory usage of the KVM server in the last polling period.

¡     Trend graph—Shows the memory usage trend of the KVM server over a specific time range in a line graph.

·     Total—Total memory size of the KVM server. Click the History Record icon icon_history_16x16.png to view the history graph of the total memory size.

·     Free—Free memory size of the KVM server. Click the History Record icon icon_history_16x16.png to view the history graph of the free memory size.

·     Buffer—Buffer memory size of the KVM server. Click the History Record icon icon_history_16x16.png to view the history graph of the buffer memory size.

·     Cache—Cache memory size of the KVM server. Click the History Record icon icon_history_16x16.png to view the history graph of the cache memory size.

·     Usage—Memory usage of the KVM server. Click the History Record icon icon_history_16x16.png to view the memory usage.

File System Usage Ratio

The File System Usage Ratio area contains the following fields:

·     Mount Point—Mount point of the file system in the operating system directory structure.

·     Usage—Space usage of the file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the space usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the space usage.

·     CapacityCapacity of the file system.

·     UsedUsed space of the file system.

·     AvailableFree space of the file system.

Network Interface Statistics

The Network Interface Statistics area contains the following fields:

·     Interface Name—Name of the network interface.

·     MTUMaximum transmission unit of the network interface. A packet whose size exceeds the MTU will be fragmented.

·     Metrics—Metric of the network interface.

·     Correct at Receiving—Number of inbound correct packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound correct packets per second.

·     Error at Receiving—Number of inbound erroneous packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound erroneous packets per second.

·     Discarded at Receiving—Number of inbound packets discarded per second on the network interface due to packet receiving rate limit. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound packets discarded per second.

·     Lost at Receiving—Number of lost inbound packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of lost inbound packets per second.

·     Correct at Sending—Number of outbound correct packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound correct packets per second.

·     Error at Sending—Number of outbound erroneous packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound erroneous packets per second.

·     Discarded at Sending—Number of outbound packets discarded per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets discarded per second.

·     Discarded due to Exceeded Sending Rate—Number of outbound packets discarded per second on the network interface due to packet sending rate limit. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets discarded due to packet sending rate limit per second.

·     Flag—Flags of the network interface.

¡     B—The broadcast address has been set.

¡     L—The network interface is a loopback interface.

¡     M—The network interface is operating in promiscuous mode. In this mode, the network interface can receive all packets.

¡     R—The network interface is running.

¡     U—The network interface is active.

Basic VM Information

The Basic VM Information area contains the following fields:

·     VM ID—ID of the VM.

·     VM Name—Name of the VM.

·     UUID—Universally unique identifier of the VM.

·     OS Type—Virtualization type of the VM. The hvm value represents full virtualization.

·     Status—Status of the VM.

·     CPUs—Number of virtual CPUs assigned to the VM.

·     CPU Processing Duration—Duration occupied by the VM to process data.

·     Max Memory—Maximum memory size of the VM.

·     Used Memory—Used memory space of the VM.

·     Persistent—Whether the VM is in persistent or temporary state.

·     Auto Start—Whether the VM automatically starts up.

·     Saving Status—Whether the VM is in saving state. A VM in saving state saves its current status and restores the most recently saved status at next startup.

·     Security Mode—Security mode of the VM.

·     Security DOI—Security domain of interpretation for the VM.

Virtual CPU Information

A virtual CPU is uniquely identified by VM name and CPU ID.

The Virtual CPU Information area contains the following fields:

·     VM Name—Name of the VM to which the virtual CPU belongs.

·     CPU ID—ID of the virtual CPU.

·     Usage—Virtual CPU usage of the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the virtual CPU usage.

·     Status—Status of the VM in the last polling period.

·     CPU Processing Duration—Duration occupied by the VM to process data.

·     CPU Affinity Mask—CPU affinity for the VM. The number of y indicates the number of logical CPUs for the VM.

VM Disk Image Files

A VM disk image file represents a disk for the VM. A VM disk is uniquely identified by VM name and target device.

The VM Disk Image Files area contains the following fields:

·     VM Name—Name of the VM to which the VM disk image file belongs.

·     Target—Target device mapped to the disk image file in the VM.

·     Source—Source file of the disk image file on the KVM server.

Image File Details

The Image File Details area contains the following fields:

·     VM Name—Name of the VM to which the VM disk image file belongs.

·     Capacity—Capacity of the VM disk.

·     Grant—Space assigned to the VM disk.

·     Used Physical Disk Space—Physical disk space occupied by the VM disk on the KVM server.

VM Network Interface List

Each VM network interface represents a NIC of the VM.

The VM Network Interface List area contains the following fields:

·     VM Name—Name of the VM to which the network interface belongs.

·     Interface Name—Name of the VM network interface.

·     Type—Type of the VM network interface.

·     Source Interface—vSwitch to which the network interface connects.

·     Mode—Operating mode of the VM network interface.

·     MAC Address—MAC address of the VM network interface.

VM Network Interface Statistics

The VM Network Interface Statistics area contains the following fields:

·     VM Name—Name of the VM to which the network interface belongs.

·     Byte Receive Rate—Number of inbound bytes per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound bytes per second.

·     Packet Receive Rate—Number of inbound packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound packets per second.

·     Error Packet Receive Rate—Number of inbound erroneous packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound erroneous packets per second.

·     Discarded Packet Receive Rate—Number of inbound packets discarded per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of packets discarded per second.

·     Byte Send Rate—Number of outbound bytes per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound bytes per second.

·     Packet Send Rate—Number of outbound packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets per second.

·     Discarded Packet Send Rate—Number of outbound packets discarded per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets discarded per second.

·     Error Packet Send Rate—Number of outbound erroneous packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound erroneous packets per second.

CAS

CAS is a computer virtualization product deployed by H3C. APM can monitor CAS 1.0 and CAS 2.0 through the CLI.

The following information describes how to add and modify a CAS application monitor, and view the monitor report.

Adding a CAS application monitor

Before you add a CAS application monitor, obtain the username and password of a user who has the CAS administrator's privileges. The username and password are required for adding the application monitor.

To add a CAS application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click CAS of the Virtual Device Monitor class.

The page for adding a CAS application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the CAS server to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the CAS server if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the CAS server in the Select Devices dialog box. For information about selecting a CAS server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the CAS administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of CAS applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the CAS server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the CAS application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a CAS application monitor

Authorized users can modify all parameters except the IP address and the APM server for a CAS application monitor. When the IP address of a monitored CAS server changes, operators must add a new application monitor for the CAS server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a CAS application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the CAS application monitor you want to modify.

The page for modifying the CAS application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a CAS application monitor."

5.     Click OK.

Viewing the CAS application monitor report

After a CAS application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the CAS application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a CAS application monitor to display the report.

Figure 132 shows part of a CAS application monitor report.

Figure 132 Part of a CAS application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     NameApplication monitor name.

·     Health Status—Health status of the CAS server.

·     IP Address—IP address of the CAS server.

·     Application Type—Type of the monitored application, which is always CAS for a CAS application monitor.

·     Last Polling TimeTime when APM last polled the CAS server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the CAS server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the CAS server. This field is not displayed if no alarm is generated by the CAS server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the CAS server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the CAS server in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the CAS server in the last 30 days.

·     Available Time—Total amount of time that the CAS server was available after 00:00 today.

·     Unavailable TimeTotal amount of time that the CAS server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the CAS server was inaccessible after 00:00 today.

·     Unmanaged TimeTotal amount of time that the CAS server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Server Information

The Basic Server Information area contains the following fields:

·     Host Name—Name of the host where the CAS server resides.

·     CPU Model—CPU model of the CAS server.

·     Logical CPUs—Number of logical CPUs on the CAS server. Number of logical CPUs = Number of CPU slots * Number of cores per slot * Number of threads per core.

·     CPU Frequency (MHz)—CPU frequency of the CAS server.

·     CPU Slots—Number of CPU slots on the CAS server.

·     Cores per Slot—Number of cores in each slot on the CAS server.

·     Threads per Core—Number of threads in each core on the CAS server.

·     NUMA Nodes—Number of NUMA nodes on the CAS server.

·     Memory Capacity—Memory size of the CAS server.

VM List

The VM List area contains the following fields:

·     VM ID—ID of the VM. Only VMs that are in running state have IDs.

·     NameName of the VM.

·     StatusStatus of the VM.

Server CPU Information

The Server CPU Information area contains the following fields:

·     Server CPU Information dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graph—Shows the CPU usage of the CAS server.

¡     Trend graphShows the CPU usage trend of the CAS server over a specific time range in a line graph.

·     In UseCPU usage of the CAS server.

¡     Click the Set Threshold icon  to set alarm thresholds for the CPU usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage.

·     User—Percentage of CPU resources used by the CAS server to process user requests. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of CPU resources used by the CAS server to process user requests.

·     OS—Percentage of CPU resources used by the CAS management system. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of CPU resources used by the CAS management system.

·     Free—Percentage of free CPU resources on the CAS server. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of free CPU resources on the CAS server.

·     Waiting I/O—Percentage of CPU resources used by the CAS server to wait for I/O operations. Click the History Record icon icon_history_16x16.png to view the history graph of the percentage of CPU resources used by the CAS server to wait for I/O operations.

Server Memory Information

The Server Memory Information area contains the following fields:

·     Server Memory Information dashboard or trend graphView the area in a dashboard or a trend graph. Click the Dashboard icon  or Trend icon  on the top right corner to switch between the graphs.

¡     Dashboard graph—Shows the memory usage of the CAS server.

¡     Trend graph—Shows the memory usage trend of the CAS server over a specific time range in a line graph.

·     Total—Total memory size of the CAS server. Click the History Record icon icon_history_16x16.png to view the history graph of the total memory size.

·     Free—Free memory size of the CAS server. Click the History Record icon icon_history_16x16.png to view the history graph of the free memory size.

·     Buffer—Buffer memory size of the CAS server. Click the History Record icon icon_history_16x16.png to view the history graph of the buffer memory size.

·     Cache—Cache memory size of the CAS server. Click the History Record icon icon_history_16x16.png to view the history graph of the cache memory size.

·     Usage—Memory usage of the CAS server. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

File System Usage

The File System Usage area contains the following fields:

·     Mount Point—Mount point of the file system in the operating system directory structure.

·     Usage—Space usage of the file system.

¡     Click the Set Threshold icon  to set alarm thresholds for the space usage.

¡     Click the History Record icon icon_history_16x16.png to view the history graph of the space usage.

·     CapacityCapacity of the file system.

·     In UseUsed space of the file system.

·     AvailableFree space of the file system.

Network Interface Statistics

The Network Interface Statistics area contains the following fields:

·     Interface—Name of the network interface.

·     MTUMaximum transmission unit of the network interface. A packet whose size exceeds the MTU will be fragmented.

·     Metric—Metric of the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the metric.

·     Correct at Receiving—Number of inbound correct packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound correct packets per second.

·     Error at Receiving—Number of inbound erroneous packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound erroneous packets per second.

·     Discarded at Receiving—Number of inbound packets discarded per second on the network interface due to packet receiving rate limit. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound packets discarded per second.

·     Lost at Receiving—Number of lost inbound packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of lost inbound packets per second.

·     Correct at Sending—Number of outbound correct packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound correct packets per second.

·     Error at Sending—Number of outbound erroneous packets per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound erroneous packets per second.

·     Discarded at Sending—Number of outbound packets discarded per second on the network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets discarded per second.

·     Discarded due to Exceeded Sending Rate—Number of outbound packets discarded per second on the network interface due to packet sending rate limit. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets discarded per second.

·     Flag—Flags of the network interface.

¡     B—The broadcast address has been set.

¡     L—The network interface is a loopback interface.

¡     M—The network interface is operating in promiscuous mode. In this mode, the network interface can receive all packets.

¡     R—The network interface is running.

¡     U—The network interface is active.

Basic VM Information

The Basic VM Information area contains the following fields:

·     VM ID—ID of the VM.

·     VM Name—Name of the VM.

·     UUID—Universally unique identifier of the VM.

·     OS Type—Virtualization type of the VM. The hvm value represents full virtualization.

·     Status—Status of the VM.

·     CPUs—Number of virtual CPUs assigned to the VM.

·     CPU Processing Duration—Duration occupied by the VM to process data.

·     Max. Memory—Maximum memory size of the VM.

·     Used Memory—Used memory space of the VM.

·     Persistent—Whether the VM is in persistent or temporary state.

·     Auto Start—Whether the VM automatically starts up.

·     Saving Status—Whether the VM is in saving state. A VM in saving state saves its current status and restores the most recently saved status at next startup.

·     Security Mode—Security mode of the VM.

·     Security DOI—Security domain of interpretation for the VM.

Virtual CPU Information

The Virtual CPU Information area contains the following fields:

·     VM Name—Name of the VM to which the virtual CPU belongs.

·     CPU ID—ID of the virtual CPU.

·     Usage—Virtual CPU usage of the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the virtual CPU usage.

·     Status—Status of the VM.

·     CPU Processing Duration—Duration occupied by the VM to process data.

·     CPU Affinity Mask—CPU affinity for the VM. The number of y indicates the number of logical CPUs for the VM.

VM Disk Image Files

A VM disk image file represents a disk for the VM. A VM disk is uniquely identified by VM name and target device.

The VM Disk Image Files area contains the following fields:

·     VM Name—Name of the VM to which the VM disk image file belongs.

·     Target—Target device mapped to the disk image file in the VM.

·     Source—Source file of the disk image file on the CAS server.

Image File Details

The Image File Details area contains the following fields:

·     VM Name—Name of the VM to which the VM disk image file belongs.

·     Capacity—Capacity of the VM disk.

·     Grant—Space assigned to the VM disk.

·     Physical Disk Information—Physical disk space occupied by the VM disk on the CAS server.

VM Network Interface List

Each VM network interface represents a NIC of the VM.

The VM Network Interface List area contains the following fields:

·     VM Name—Name of the VM to which the network interface belongs.

·     Interface Name—Name of the VM network interface.

·     Type—Type of the VM network interface.

·     Source Interface—vSwitch to which the network interface connects.

·     Mode—Operating mode of the VM network interface.

·     MAC Address—MAC address of the VM network interface.

VM Network Interface Statistics

The VM Network Interface Statistics area contains the following fields:

·     VM Name—Name of the VM to which the network interface belongs.

·     Byte Receive Rate—Number of inbound bytes per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound bytes per second.

·     Packet Receive Rate—Number of inbound packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound packets per second.

·     Error Packet Receive Rate—Number of inbound erroneous packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of inbound erroneous packets per second.

·     Lost Packet Receive Rate—Number of lost inbound packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of lost inbound packets per second.

·     Byte Send Rate—Number of outbound bytes per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound bytes per second.

·     Packet Send Rate—Number of outbound packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound packets per second.

·     Lost Packet Send Rate—Number of lost outbound packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of lost outbound packets per second.

·     Error Packet Send Rate—Number of outbound erroneous packets per second on the VM network interface. Click the History Record icon icon_history_16x16.png to view the history graph of the number of outbound erroneous packets per second.

PowerCenter

PowerCenter is a server management software that uses virtualization and cloud computation technologies.

APM supports monitoring PowerCenter through REST API.

Adding a PowerCenter application monitor

Before you add a PowerCenter application monitor, contact the PowerCenter administrator to obtain the following information:

·     The PowerCenter listening port number.

·     The username and password of a user who has the PowerCenter administrator's privileges.

To add a PowerCenter application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click PowerCenter of the Virtual Device Monitor class.

The page for adding a PowerCenter application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the PowerCenter application to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the host if the host is already managed in the IMC platform. If the host is already managed in the IMC platform, you can also click Select, and then select the host in the Select Devices window. For information about selecting a host, see "Selecting devices."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     Template—Click the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Enter the PowerCenter listening port number. The default port number is 8080.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Available options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username—Enter the username of a PowerCenter user who has the administrator's privileges.

¡     Password—Enter the password of the PowerCenter user.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of PowerCenter applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that PowerCenter depends on, and then click OK.

Operating system applications cannot be selected.

Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the PowerCenter application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. Application detection enables APM to verify the connectivity to the application by using the previous parameter settings. APM adds the application monitor only when it can connect to the application. When this parameter is not selected, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a PowerCenter application monitor

Authorized users can modify all parameters except the IP address and the APM server for a PowerCenter application monitor. When the IP address of a monitored PowerCenter host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a PowerCenter application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the PowerCenter application monitor you want to modify.

The page for modifying the PowerCenter application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a PowerCenter application monitor."

5.     Click OK.

Viewing the PowerCenter application monitor report

After a PowerCenter application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To access the PowerCenter application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a PowerCenter application monitor to display the report.

Figure 133 shows part of a PowerCenter application monitor report.

Figure 133 Part of a PowerCenter application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the PowerCenter application.

·     IP Address—IP address of the PowerCenter application.

·     Port—Listening port number of the PowerCenter application.

·     Application DescriptionDescription of the PowerCenter application.

·     Application Type—Type of the monitored application, which is Power Center.

·     Version—Version of the PowerCenter application.

·     Status—Running status of PowerCenter application.

·     Last Polling TimeTime when APM last polled the PowerCenter application.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between PowerCenter and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the PowerCenter application. The alarm level is identified by color: yellow for minor alarms, orange for major alarms, and red for critical alarms. This field is not displayed if no alarm is generated by the PowerCenter application.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the PowerCenter application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the PowerCenter application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the PowerCenter application in the last 30 days.

·     Available Time—Total amount of time that the PowerCenter application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the PowerCenter application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the PowerCenter application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the PowerCenter application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Cluster CPU Detail

The Cluster CPU Detail area contains the following fields:

·     Total CPU Cores—Total number of CPU cores of hosts managed by PowerCenter.

·     Free CPU Cores—Number of free CPU cores of hosts managed by PowerCenter.

·     Cluster CPU Usage Ratio—CPU usage ratio of the cluster.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Cluster Memory Detail

The Cluster Memory Detail area contains the following fields:

·     Total Memory Size—Total physical memory size of hosts managed by PowerCenter.

·     Free Memory Size—Free physical memory of hosts managed by PowerCenter.

·     Cluster Memory Usage Ratio—Memory usage ratio of the cluster.

You can click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Cluster Disk Detail

The Cluster Disk Detail area contains the following fields:

·     Total Disk Size—Total disk capacity of hosts managed by PowerCenter.

·     Free Disk Size—Free disk space of hosts managed by PowerCenter.

·     Cluster Disk Usage Ratio—Disk usage ratio of the cluster.

You can click the Set Threshold icon  to set alarm thresholds for a monitor index, and click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Memory Details

The Memory Details area contains the following fields:

·     Host Name—Name of the host.

·     Total Memory Size—Total physical memory size of the host.

·     Free Memory Size—Free physical memory size of the host.

·     Memory Usage Ratio—Memory usage ratio of the host.

You can click the Set Threshold icon  to set alarm thresholds for a monitor index, and click the History Record icon icon_history_16x16.png to view the history graph of a monitor index.

Disk Details

The Disk Details area contains the following fields:

·     Host NameName of the host.

·     Total Disk SizeTotal disk size of the host.

·     Free Disk SizeFree disk size of the host.

·     Disk Usage RatioDisk usage ratio of the host.

·     The Disk Details area contains the following fields:

VM List

The VM List area contains the following fields:

·     Host NameName of the host.

·     VM NameName of the VM.

CPU Details

The CPU Details area contains the following fields:

·     Host NameName of the host.

·     Total CPU CoresTotal number of CPU cores on the host.

·     Free CPU CoresNumber of free CPU cores on the host.

·     CPU Usage RatioCPU usage ratio of the host.

·     IPIP address of the host.

·     TypeType of the host.

·     StatusStatus of the host.

·     Run TimeRun time of the host.

Warn Details

The Warn Details area contains the following fields:

·     Warn ObjectName of the warning object, which can be a host or virtual machine.

·     Warn Log IdID of the warning log.

·     Begin TimeBegin time of the warning.

·     End TimeEnd time of the warning.

·     Warn ConditionCondition of the warning.

·     Warn LineLine of the warning.

·     TimeTime that the warning lasts for.

·     Warn LevelLevel of the warning.

VM Information

The VM Information area contains the following fields:

·     VM NameName of VM.

·     IPIP address of the VM.

·     OSOS of the VM.

·     StatusStatus of the VM.

·     Run TimeRun Time of the VM.

VM CPU Information

The VM CPU Information area contains the following fields:

·     VM NameName of the VM.

·     CPU CoresNumber of CPU cores on the VM.

·     Level 3 Cache SizeSize of level 3 cache on the VM.

·     RunTimeRun time of the CPU.

·     CPU Usage RatioCPU usage ratio of the VM.

VM Memory Information

The VM Memory Information area contains the following fields:

·     VM NameName of the VM.

·     Total Memory SizeTotal physical memory size of the VM.

·     Memory Band WidthMemory bandwidth of the VM.

·     Used Memory SizeUsed physical memory size of the VM.

·     Memory Usage RatioMemory usage ratio of the VM.

VM Disk Information

The VM Disk Information area contains the following fields:

·     VM NameName of the VM.

·     Disk NameName of the disk.

·     Total SizeTotal disk size of the VM.

·     Used SizeUsed disk size of the VM.

·     Disk Usage RatioDisk usage ratio of the VM.

·     Disk Total ppsTotal number of disk pps on the VM.

·     Disk Used ppsNumber of used disk pps on the VM.

·     Disk Free ppsNumber of free disk pps on the VM.

·     Disk VscsiDisk vscsi of the VM.

·     Slot NumberDisk slot number of the VM.

·     VGVG of the disk on the VM.

·     Number of lvNumber of logical volumes of the disk on the VM.

VM Disk IO Information

The VM Disk IO Information area contains the following fields:

·     VM NameName of the VM.

·     Disk NameName of disk.

·     Bytes Read/SecData read rate of the disk per second on the VM.

·     Bytes Write/SecData write rate of the disk per second on the VM.

·     Times Read/SecData read times of the disk per second on the VM.

·     Times Write/SecData write times of the disk per second on the VM.

·     Total Bytes ReadTotal bytes read from the disk on the VM since bootup.

·     Total Bytes WriteTotal bytes written to the disk on the VM since bootup.

VM NIC Information

The VM NIC Information area contains the following fields:

·     VM NameName of the VM.

·     NIC NameName of the NIC on the VM. The NIC name starts with en when the VM operating system is AIX. The NIC name starts with ent when the VM operating system is Linux.

·     IPIP address of the NIC on the VM.

·     Subnet MaskSubnet mask of the NIC on the VM.

·     GatewayGateway of the NIC on the VM.

·     MACMAC address of the NIC on the VM.

·     Slot NumberSlot Number of the NIC on the VM.

·     Physical NICPhysical NIC name of the NIC on the VM.

·     Virtual NICVirtual NIC name of the NIC on the VM.

·     NIC TypeType of the NIC on the VM.

·     VLAN InformationVLAN information of the NIC on the VM.

VM NIC Information

The VM Net Card Performance area contains the following fields:

·     VM NameName of the VM.

·     NIC NameName of the NIC. The NIC name starts with en when the VM operating system is AIX. The NIC name starts with ent when the VM operating system is Linux.

·     Bytes In/SecInbound data bytes of the NIC per second on the VM.

·     Bytes Out/SecOutbound data bytes of the NIC per second on the VM.

·     Total Bytes InTotal inbound data bytes of the NIC on the VM since bootup.

·     Total Bytes OutTotal outbound data bytes of the NIC on the VM since bootup.

·     Packages In/SecInbound packets of the NIC per second on the VM.

·     Packages Out/SecOutbound packets of the NIC per second on the VM.

·     Total Packages InTotal packages in of the NIC on the VM since bootup.

·     Total Packages OutTotal packages out of the NIC on the VM since bootup.

VMware ESX

VMware ESX is an enterprise-level computer virtualization product offered by VMware. APM can monitor VMware ESX 5.1 through APIs that are provided by VMware ESX.

The following information describes how to add and modify a VMware ESX application monitor, and how to view the monitor report.

Adding a VMware ESX application monitor

Before you add a VMware ESX application monitor, obtain the username and password of a user who has the VMware ESX administrator's privileges. The username and password are required for adding the application monitor.

To add a VMware ESX application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click VMware ESX of the Virtual Device Monitor class.

The page for adding a VMware ESX application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the VMware ESX server to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the VMware ESX server if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the VMware ESX server in the Select Devices dialog box. For information about selecting a VMware ESX server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Quick start." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the VMware ESX administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of VMware ESX applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the VMware ESX server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the VMware ESX application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a VMware ESX application monitor

Authorized users can modify all parameters except the IP address and the APM server for a VMware ESX server. When the IP address of a monitored VMware ESX server changes, operators must add a new application monitor for the VMware ESX server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a VMware ESX application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the VMware ESX application monitor you want to modify.

The page for modifying the VMware ESX application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a VMware ESX application monitor."

5.     Click OK.

Viewing the VMware ESX application monitor report

After a VMware ESX application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the VMware ESX application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a VMware ESX application monitor to display the report.

Figure 134 shows part of a VMware ESX application monitor report. The VMware ESX application monitor report contains the Summary, VM Detail, and Hardware tabs.

Figure 134 Part of a VMware ESX application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the VMware ESX server.

·     IP Address—IP address of the VMware ESX server.

·     Application Type—Type of the monitored application, which is always VMware ESX for a VMware ESX application monitor.

·     Version—Version of the VMware ESX server.

·     OS TypeOS type of the VMware ESX server. The OS can be one of the following types:

¡     win32-x86An x86-based version of Windows operating system.

¡     linux-x86An x86-based version of Linux operating system.

¡     vmnix-x86VMware ESX server based on x86.

·     Power Supply StatusStatus of the power supply for the VM.

·     Connection StatusWhether the VM is connected to the VMware ESX server.

·     Hardware ModelModel of the VMware ESX server.

·     Hardware VendorVendor of the VMware ESX server.

·     Startup TimeTime when the VM most recently started up.

·     Last Polling Time—Time when APM last polled the VMware ESX server.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the VMware ESX server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the VMware ESX server. This field is not displayed if no alarm is generated by the VMware ESX server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the VMware ESX server.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the VMware ESX application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the VMware ESX application in the last 30 days.

·     Available Time—Total amount of time that the VMware ESX server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the VMware ESX server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the VMware ESX server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the VMware ESX server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following fields:

·     CPU Usage Ratio dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graphView the processor usage ratio of the VMware ESX server.

¡     Trend graph—View the changes of the processor usage ratio for the VMware ESX server in a line chart.

·     CPU Usage Ratio—Processor usage ratio of the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage ratio.

·     CPU Idle Time—Duration for which the processor on the VMware ESX server is idle. Click the History Record icon icon_history_16x16.png to view the history graph of the processor idle duration.

·     CPU Usage MHzProcessor usage for the VMware ESX server.

·     CPU FrequencyProcessor frequency for the VMware ESX server.

·     CPU ModelProcessor model for the VMware ESX server.

·     CPU CountNumber of processor cores for the VMware ESX server.

·     CPU Package CountNumber of processor packages for the VMware ESX server.

·     CPU Threads CountNumber of processor threads for the VMware ESX server.

Memory Usage Ratio

The Memory Usage Ratio area contains the following fields:

·     Memory Usage Ratio dashboard or trend graphView the area in a dashboard or a trend graph.

¡     Dashboard graphView the memory usage ratio of the VMware ESX server.

¡     Trend graph—View the changes of the memory usage ratio for the VMware ESX server in a line chart.

·     Memory Usage Ratio—Memory usage ratio of the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio.

·     Memory Size—Total memory size. Click the History Record icon icon_history_16x16.png to view the history graph of the total memory size.

·     Consumed Memory—Size of the memory consumed by the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the consumed memory size.

·     Active Memory—Active memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the active memory size.

·     Overhead Memory—Overhead memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the overhead memory size.

·     Reserved Memory—Reserved memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the reserved memory size.

·     Shared Memory—Shared memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the shared memory size.

·     Granted Memory—Memory size assigned to the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the assigned memory size.

·     Swap Used Memory—Swap memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the swap memory size.

·     Heap Memory—Heap memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the heap memory size.

·     System Usage Memory—System usage memory size for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the system usage memory size.

Datastore Information

The Datastore Information area contains the following fields:

·     NameName of the data store for the VMware ESX server.

·     TypeType of the data store for the VMware ESX server.

·     URLPath of the data store for the VMware ESX server.

·     CapacityCapacity of the data store for the VMware ESX server.

·     Used SpaceUsed space of the data store for the VMware ESX server.

·     Free SpaceFree space of the data store for the VMware ESX server.

·     Usage Ratio—Usage of the data store for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the data store usage ratio.

·     Free Ratio—Ratio of the data store that is not used for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the free ratio.

CPU Detail

The CPU Detail area contains the following fields:

·     CPU IDID of the processor for the VMware ESX server.

·     CPU Usage Ratio—Processor usage ratio for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage ratio.

·     CPU Idle Time—Duration for which the processor on the VMware ESX server is idle. Click the History Record icon icon_history_16x16.png to view the history graph of the processor idle duration.

Net Card Performance

The Net Card Performance area contains the following fields:

·     NameName of the NIC for the VMware ESX server.

·     Receive RateReceive rate of the NIC for the VMware ESX server.

·     Send RateSend rate of the NIC for the VMware ESX server.

·     Packets Received—Number of packets received by the NIC on the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the packets received.

·     Packets Sent—Number of packets sent by the NIC on the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the packets sent.

Datastore Performance

The Datastore Performance area contains the following fields:

·     Datastore NameName of the data store for the VMware ESX server.

·     Read Rate—Read rate of the data store for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the data store read rate.

·     Write Rate—Write rate of the data store for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the data store write rate.

·     Read Latency—Read latency of the data store for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the data store read latency.

·     Write Latency—Write latency of the data store for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the data store write latency.

Disk I/O

The Disk I/O area contains the following fields:

·     LUNLogical unit number of the disk for the VMware ESX server.

·     Read Rate—Read rate of the disk for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read rate.

·     Write Rate—Write rate of the disk for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read rate.

·     Read Number—Number of disk reads for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read number.

·     Write Number—Number of disk writes for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the disk write number.

·     Read Latency—Read latency of the disk for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read latency.

·     Write Latency—Write latency of the disk for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the disk write latency.

·     Commands Aborted—Number of commands aborted by the disk for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the aborted commands.

·     Bus Resets—Number of bus resets performed by the disk for the VMware ESX server. Click the History Record icon icon_history_16x16.png to view the history graph of the bus resets.

VM Information

The VM Information area contains the following fields:

·     NameName of the VM.

·     Host NameName of the host on which the guest OS is located.

·     Startup TimeTime when the VM most recently started up.

·     Power Supply StatusStatus of the power supply for the VM. Options are poweredOn and poweredOff.

·     Host StatusStatus of the host on which the guest OS is located. Options are running and notRunning.

·     Heartbeat StatusHeartbeat status of the guest OS. Options are:

¡     GREENThe guest OS responds correctly.

¡     YELLOWThe guest OS sometimes does not respond. The guest OS might be overloaded.

¡     REDThe guest OS has no heartbeat. The guest OS might not respond.

¡     GRAYVMware ESX tools are not installed or stop running on the guest OS.

·     OSOS type of the VM. You can obtain the OS type when the host is running.

·     IP AddressIP address of the VM. You can obtain the IP address of the VM when the host is in running state.

·     Memory SizeMemory size of the VM.

·     CPU CountNumber of processors for the VM.

·     NIC CountNumber of NICs for the VM.

·     Disk CountNumber of disks for the VM.

VM Performance

The VM Performance area contains the following fields:

·     VM NameName of the VM.

·     CPU Usage MHzProcessor usage of the VM.

·     CPU Usage Ratio—Processor usage ratio of the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage ratio.

·     CPU Idle TimeDuration for which the processor for the VM is idle. Click the History Record icon icon_history_16x16.png to view the history graph of the processor idle time.

·     Memory Usage Ratio—Memory usage ratio of the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio.

·     Consumed Memory—Memory size consumed by the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the consumed memory.

·     Active Memory—Active memory size for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the active memory.

·     Overhead Memory—Overhead memory size for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the overhead memory.

·     Shared Memory—Shared memory size for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the shared memory.

·     Granted Memory—Assigned memory size to the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the assigned memory.

VM Disk Information

The VM Disk Information area contains the following fields:

·     VM NameName of the VM.

·     Disk NameName of the disk for the VM.

·     CapacityCapacity of the disk for the VM.

·     Used Space—Used space of the disk for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the used space.

·     Free SpaceFree space of the disk for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the free space.

·     Usage RatioDisk usage ratio for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the usage ratio.

·     Free RatioRatio of the disks that are not used for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the ratio of the disks that are not used.

VM Disk I/O

The VM Disk I/O area contains the following fields:

·     VM NameName of the VM.

·     Disk NameName of the disk for the VM.

·     Read RateRead rate of the disk for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read rate.

·     Write RateWrite rate of the disk for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the disk write rate.

·     Read NumberNumber of disk reads for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read number.

·     Write NumberNumber of disk writes for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the disk write number.

·     Commands AbortedNumber of commands aborted by the disk for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the aborted commands.

·     Bus ResetsNumber of bus resets performed by the disk for the VM. Click the History Record icon icon_history_16x16.png to view the history graph of the bus resets.

VM NIC Information

The VM NIC Information area contains the following fields:

·     VM NameName of the VM.

·     NIC NameName of the NIC for the VM.

·     IP AddressIP address of the NIC for the VM.

·     MAC AddressMAC address of the NIC for the VM.

·     NetworkNetwork on which the NIC for the VM is located.

VM NIC Performance

The VM NIC Performance area contains the following fields:

·     VM NameName of the VM.

·     NIC NameName of the NIC for the VM.

·     Receive RateReceive rate of the NIC for the VM.

·     Send RateSend rate of the NIC for the VM.

·     Packets ReceivedNumber of packets received by the NIC for the VM.

·     Packets SentNumber of packets sent by the NIC for the VM.

VM Physic NIC Performance

The VM Physic NIC Performance area contains the following fields:

·     VM NameName of the VM.

·     NIC NameName of the physical NIC for the VM.

·     Receive RateReceive rate of the physical NIC for the VM.

·     Send RateSend rate of the physical NIC for the VM.

·     Packets ReceivedNumber of packets received by the physical NIC for the VM.

·     Packets SentNumber of packets sent by the physical NIC for the VM.

Power Supply Information

The Power Supply Information area contains the following fields:

·     NameName of the power supply.

·     ValuePower of the power supply.

·     Health StatusHealth status of the power supply.

Fan Information

The Fan Information area contains the following fields:

·     NameName of the fan.

·     ValueUsage of the fan.

·     Health Status—Health status of the fan.

Processor Information

The Processor Information area contains the following fields:

·     NameName of the processor.

·     Health Status—Health status of the processor.

Memory Information

The Memory Information area contains the following fields:

·     NameName of the memory.

·     Health Status—Health status of the memory.

Sensor Temperature

The Sensor Temperature area contains the following fields:

·     NameName of the sensor.

·     ValueTemperature of the sensor. Click the History Record icon icon_history_16x16.png to view the history graph of the sensor temperature.

·     Health Status—Health status of the sensor.

Storage Information

The Storage Information area contains the following fields:

·     NameName of the storage.

·     Health Status—Health status of the storage.

Tasks Information

The Tasks Information area contains the following fields:

·     NameTask name of VMware ESX.

·     TargetTask entity of VMware ESX.

·     StateTask state of VMware ESX.

·     InitiatorTask initiator of VMware ESX.

·     Queue TimeQueue time of VMware ESX.

·     Start TimeStart time of VMware ESX.

·     Complete TimeComplete time of VMware ESX.

Events Information

The Events Information area contains the following fields:

·     DescriptionEvent description of VMware ESX.

·     Created TimeEvent creation time of VMware ESX.

·     TargetEvent entity of VMware ESX.

·     UserEvent user of VMware ESX.

VMware vCenter Server

VMware vCenter Server is a centralized platform offered by VMware to manage the VMware vSphere environment. APM can monitor VMware vCenter Server 5.5 through APIs that are provided by VMware vCenter Server.

The following information describes how to add and modify a VMware vCenter Server application monitor, and how to view the monitor report.

Adding a VMware vCenter Server application monitor

Before you add a VMware vCenter Server application monitor, obtain the username and password of a user who has the VMware vCenter Server administrator's privileges. The username and password are required for adding the application monitor.

To add a VMware vCenter Server application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click VMware vCenter Server of the Virtual Device Monitor class.

The page for adding a VMware vCenter Server application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the VMware vCenter Server to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the VMware vCenter Server if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the VMware vCenter Server in the Select Devices dialog box. For information about selecting a VMware vCenter Server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as Application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Quick start." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the VMware vCenter Server administrator. The fields are available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of VMware vCenter Server applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the VMware vCenter Server depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the VMware vCenter Server application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a VMware vCenter Server application monitor

Authorized users can modify all parameters except the IP address and the APM server for a VMware vCenter Server. When the IP address of a monitored VMware vCenter Server changes, operators must add a new application monitor for the VMware vCenter Server. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a VMware vCenter Server application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon  for the VMware vCenter Server application monitor you want to modify.

The page for modifying the VMware vCenter Server application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a VMware vCenter Server application monitor."

5.     Click OK.

Viewing the VMware vCenter Server application monitor report

After a VMware vCenter Server application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the VMware vCenter Server application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a VMware vCenter Server application monitor to display the report.

Figure 135shows part of a VMware vCenter Server application monitor report. The VMware vCenter Server application monitor report contains the Summary, Hosts and VMs, Tasks and Events, and Alarms tabs.

Figure 135 Part of a VMware vCenter Server application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the VMware vCenter Server.

·     IP Address—IP address of the VMware vCenter Server.

·     Application Description—Description of the VMware vCenter Server.

·     Application Type—Type of the monitored application, which is always VMware vCenter Server for a VMware vCenter Server application monitor.

·     Version—Version of the VMware vCenter Server.

·     OS TypeOS type of the VMware vCenter Server.

·     Last Polling Time—Time when APM last polled the VMware vCenter Server.

·     Relationship—Click the Relationship icon  to view dependencies between the VMware vCenter Server and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the VMware vCenter Server. This field is not displayed if no alarm is generated by the VMware vCenter Server.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the VMware vCenter Server.

¡     Click the Weekly History icon  to view the availability of the VMware vCenter Server application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the VMware vCenter Server application in the last 30 days.

·     Available Time—Total amount of time that the VMware vCenter Server was available after 00:00 today.

·     Unavailable Time—Total amount of time that the VMware vCenter Server was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the VMware vCenter Server was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the VMware vCenter Server was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

VCenter Server Inventory

The VCenter Server Inventory area contains the following fields:

·     Datacenter Name—Name of the data center for the VMware vCenter Server.

·     Cluster Name—Name of the cluster in the data center.

·     Host—IP address of the host in the cluster.

Datacenter Summary

The Datacenter Summary area contains the following fields:

·     Datacenter Name—Name of the data center for the VMware vCenter Server.

·     Host Number—Number of hosts managed by the data center.

·     VirtualMachine Number—Number of virtual machines managed by the data center.

·     Cluster Number—Number of clusters managed by the data center.

·     Network Number—Number of networks managed by the data center.

·     Datastore Number—Number of data stores managed by the data center.

Cluster CPU Usage Ratio

The Cluster CPU Usage Ratio area contains the following fields:

·     Datacenter Name—Name of the data center for the VMware vCenter Server.

·     Cluster Name—Name of the cluster in the data center.

·     Cluster CPU Usage RatioProcessor usage ratio of the cluster. Click the History Record icon icon_history_16x16.png to view the history graph of the cluster processor usage ratio.

·     Cluster CPU Usage MHzProcessor usage of the cluster in MHz. Click the History Record icon icon_history_16x16.png to view the history graph of the cluster processor usage.

Cluster Memory Usage Ratio

The Cluster Memory Usage Ratio area contains the following fields:

·     Datacenter Name—Name of the data center for the VMware vCenter Server.

·     Cluster Name—Name of the cluster in the data center.

·     Cluster Memory Usage Ratio—Memory usage ratio of the cluster. Click the History Record icon icon_history_16x16.png to view the history graph of the cluster memory usage ratio.

·     Cluster Consumed Memory—Size of the memory consumed by the cluster. Click the History Record icon icon_history_16x16.png to view the history graph of the consumed cluster memory size.

Datastore Information

The Datastore Information area contains the following fields:

·     NameName of the data store for the VMware vCenter Server.

·     TypeType of the data store.

·     URLPath of the data store.

·     CapacityCapacity of the data store.

·     Used SpaceUsed space of the data store.

·     Free SpaceFree space of the data store.

·     Usage Ratio—Usage of the data store. Click the History Record icon icon_history_16x16.png to view the history graph of the data store usage ratio.

·     Free Ratio—Ratio of the data store that is not used. Click the History Record icon icon_history_16x16.png to view the history graph of the free ratio.

Network Information

The Network Information area contains the following fields:

·     Datacenter Name—Name of the data center for the VMware vCenter Server.

·     Network—Network name of the data center.

·     Alarm Status—Network status:

¡     GreenThe network responds correctly.

¡     YellowThe network sometimes does not respond. The network might be overloaded.

¡     RedThe network has no heartbeat. The network might not respond.

¡     GrayThe network is not monitored.

·     Alarm Actions—Alarm action status of the network:

¡     TrueAlarm actions are enabled.

¡     FalseAlarm actions are disabled.

·     Host Number—Number of hosts using the network.

·     VirtualMachine Number—Number of virtual machines using the network.

CPU Detail

The CPU Detail area contains the following fields:

·     HostName of the host managed by the VMware vCenter Server.

·     CPU ID—ID of the processor for the host.

·     CPU Usage RatioUsage ratio of a single processor for the host. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage ratio.

·     CPU Idle Time—Duration for which a single processor on the host is idle. Click the History Record icon icon_history_16x16.png to view the history graph of the processor idle duration.

Net Card Performance

The Net Card Performance area contains the following fields:

·     HostName of the host managed by the VMware vCenter Server.

·     NameName of the NIC for the host.

·     Receive RateReceive rate of the NIC. Click the History Record icon icon_history_16x16.png to view the history graph of the receive rate.

·     Send RateSend rate of the NIC. Click the History Record icon icon_history_16x16.png to view the history graph of the send rate.

·     Packets Received—Number of packets received by the NIC. Click the History Record icon icon_history_16x16.png to view the history graph of the packets received.

·     Packets Sent—Number of packets sent by the NIC. Click the History Record icon icon_history_16x16.png to view the history graph of the packets sent.

Datastore Performance

The Datastore Performance area contains the following fields:

·     HostName of the host managed by the VMware vCenter Server.

·     Datastore NameName of the data store for the host.

·     Read Rate—Read rate of the data store. Click the History Record icon icon_history_16x16.png to view the history graph of the data store read rate.

·     Write Rate—Write rate of the data store. Click the History Record icon icon_history_16x16.png to view the history graph of the data store write rate.

·     Read Latency—Read latency of the data store. Click the History Record icon icon_history_16x16.png to view the history graph of the data store read latency.

·     Write Latency—Write latency of the data store. Click the History Record icon icon_history_16x16.png to view the history graph of the data store write latency.

Disk I/O

The Disk I/O area contains the following fields:

·     HostName of the host managed by the VMware vCenter Server.

·     LUNLogical unit number of the disk for the host.

·     Read Rate—Read rate of the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read rate.

·     Write Rate—Write rate of the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read rate.

·     Read Number—Number of disk reads. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read number.

·     Write Number—Number of disk writes. Click the History Record icon icon_history_16x16.png to view the history graph of the disk write number.

·     Read Latency—Read latency of the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the disk read latency.

·     Write Latency—Write latency of the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the disk write latency.

·     Commands Aborted—Number of commands aborted by the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the aborted commands.

·     Bus Resets—Number of bus resets performed by the disk. Click the History Record icon icon_history_16x16.png to view the history graph of the bus resets.

Host Information

The Host Information area contains the following fields:

·     Host Name—Name of the host managed by the VMware vCenter Server.

·     Connection State—Connection state of the host:

¡     ConnectedThe host is connected correctly.

¡     DisconnectedThe host is disconnected.

¡     NotrespondingThe host does not respond.

·     Alarm Status—Alarm status for the host:

¡     GreenThe host responds correctly.

¡     YellowThe host sometimes does not respond. The host might be overloaded.

¡     RedThe host has no heartbeat. The host might not respond.

¡     GrayThe host is not monitored.

·     CPU Usage RatioProcessor usage ratio for the host. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage ratio.

·     Memory Usage RatioMemory usage ratio for the host. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage ratio.

·     Memory SizeActual memory size for the host.

·     CPU NumberNumber of processors for the host.

·     NIC NumberNumber of NICs for the host.

·     Uptime—Normal operation time of the host.

·     Alarm Actions—Alarm action status of the host:

¡     TrueAlarm actions are enabled.

¡     FalseAlarm actions are disabled.

VirtualMachine Information

The VirtualMachine Information area contains the following fields:

·     Host—Name of the host managed by the VMware vCenter Server.

·     VirtualMachine NameName of the virtual machine managed by the host.

·     Power StateState of the power supply for the virtual machine. Options are poweredOn and poweredOff.

·     Alarm Status—Heartbeat status of the virtual machine OS. Options are:

¡     GreenThe virtual machine OS responds correctly.

¡     YellowThe virtual machine OS sometimes does not respond. The virtual machine OS might be overloaded.

¡     RedThe virtual machine OS has no heartbeat. The virtual machine OS might not respond.

¡     GrayThe virtual machine OS is not monitored.

·     Provisioned SpaceSpace that is provisioned by VMware vCenter Server for the virtual machine.

·     Used SpaceSpace that is used by the virtual machine.

·     Host CPU Usage MHzProcessor usage for the ESX host to run the virtual machine. Click the History Record icon icon_history_16x16.png to view the history graph of the processor usage.

·     Host Memory Used SpaceMemory used by the ESX host to run the virtual machine. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     Guest Memory UsageMemory used by the virtual machine. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage.

·     AnnotationAnnotation for the virtual machine.

·     Alarm Actions—Alarm action status of the virtual machine:

¡     TrueAlarm actions are enabled.

¡     FalseAlarm actions are disabled.

Recent Tasks Information

The Recent Tasks Information area contains the following fields:

·     NameName of the task for the VMware vCenter Server.

·     TargetEntity that executes the task.

·     StateExecution state of the task:

¡     SuccessThe task is completed.

¡     RunningThe task is in progress.

¡     QueuedThe task is being queued.

¡     ErrorAn error has occurred during the task operation.

·     InitiatorUser that initiates the task.

·     Queue TimeStart time of the task request.

·     Start TimeTime when the task started to be executed.

·     Complete TimeTime when the task was completed.

History Tasks Information

The History Tasks Information area contains the following fields:

·     NameName of the task for the VMware vCenter Server.

·     TargetEntity that executes the task.

·     StateExecution state of the task:

¡     SuccessThe task is completed.

¡     RunningThe task is in progress.

¡     QueuedThe task is being queued.

¡     ErrorAn error has occurred during the task operation.

·     InitiatorUser that initiates the task.

·     Queue TimeStart time of the task request.

·     Start TimeTime when the task started to be executed.

·     Complete TimeTime when the task was completed.

Events Information

The Events Information area contains the following fields:

·     DescriptionDescription of the event for the VMware vCenter Server.

·     Created TimeTime when the event occurred.

·     TargetEntity that triggered the event.

·     UserUser that triggered the event.

Triggered Alarm

The Triggered Alarm area contains the following fields:

·     ObjectObject that triggered the alarm.

·     Alarm Status—Severity level of the alarm:

¡     GreenNormal.

¡     YellowWarning.

¡     RedAlert.

·     Alarm NameName of the alarm.

·     Triggered TimeTime when the alarm was triggered.

·     Acknowledged TimeTime when the alarm was acknowledged.

·     Acknowledged UserUser who acknowledged the alarm.

Defined Alarm

The Defined Alarm area contains the following fields:

·     Alarm NameName of the alarm defined in the VMware vCenter Server.

·     DescriptionDescription of the alarm.

HW FusionCompute

HW FusionCompute is a server virtualization product of Huawei. APM can monitor HW FusionCompute through REST APIs that are provided by HW FusionCompute.

The following information describes how to add and modify an HW FusionCompute application monitor, and how to view the monitor report.

Adding an HW FusionCompute application monitor

Before you add an HW FusionCompute application monitor, obtain the following information:

·     Obtain the username, password, password encryption type, and authentication type of a user who has the HW FusionCompute administrator's privileges and the access rights to HTTP/HTTPS. The username, password, password encryption type, and authentication type are required for adding the application monitor.

·     Contact the HW FusionCompute administrator to obtain the version and language information for the HW FusionCompute.

To add an HW FusionCompute application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click HW FusionCompute of the Virtual Device Monitor class.

The page for adding an HW FusionCompute application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the HW FusionCompute server. APM automatically checks the IP address and associates the application monitor with the HW FusionCompute server if it is already managed in the IMC platform. If the HW FusionCompute server is already added to the IMC platform, you can also click Select, and then select the HW FusionCompute server in the Select Devices dialog box. For information about selecting an HW FusionCompute server, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as Application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Quick start." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 7070 for HTTP and 7443 for HTTPS. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the HW FusionCompute administrator. The fields are available only when you select Disable from the Use Template list.

¡     SchemeSelect the protocol used to access the application. Options are HTTP and HTTPS. This field is available only when you select Disable from the Use Template list.

¡     Authentication TypeSelect the user authentication type. This field is available only when you select Disable from the Use Template list.

¡     User TypeSelect the user account type. This field is available only when you select Disable from the Use Template list.

¡     Encryption TypeSelect the user password encryption type. This field is available only when you select Disable from the Use Template list.

¡     VersionSelect the version number for HW FusionCompute. This field is available only when you select Disable from the Use Template list.

¡     LanguageSelect the language for HW FusionCompute. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of HW FusionCompute applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the HW FusionCompute depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the HW FusionCompute application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an HW FusionCompute application monitor

Authorized users can modify all parameters except the IP address and the APM server for an HW FusionCompute. When the IP address of a monitored HW FusionCompute changes, operators must add a new application monitor for the HW FusionCompute. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an HW FusionCompute application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon  for the HW FusionCompute application monitor you want to modify.

The page for modifying the HW FusionCompute application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an HW FusionCompute application monitor."

5.     Click OK.

Viewing the HW FusionCompute application monitor report

After an HW FusionCompute application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the HW FusionCompute application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an HW FusionCompute application monitor to display the report.

Figure 136shows part of an HW FusionCompute application monitor report. The HW FusionCompute application monitor report contains the Summary and Performance tabs.

Figure 136 Part of an HW FusionCompute application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the HW FusionCompute.

·     IP Address—IP address of the HW FusionCompute.

·     Application Description—Description of the HW FusionCompute.

·     Application Type—Type of the monitored application, which is always HW FusionCompute for an HW FusionCompute application monitor.

·     Last Polling Time—Time when APM last polled the HW FusionCompute.

·     Relationship—Click the Relationship icon  to view dependencies between the HW FusionCompute and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the HW FusionCompute. This field is not displayed if no alarm is generated by the HW FusionCompute.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the HW FusionCompute.

¡     Click the Weekly History icon  to view the availability of the HW FusionCompute application in the last 7 days.

¡     Click the Monthly History icon  to view the availability of the HW FusionCompute application in the last 30 days.

·     Available Time—Total amount of time that the HW FusionCompute was available after 00:00 today.

·     Unavailable Time—Total amount of time that the HW FusionCompute was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the HW FusionCompute was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the HW FusionCompute was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Users

The Users area contains the following fields:

·     User NameName of the HW FusionCompute user.

·     User TypeType of user.

·     Management StatusCurrent status of the user.

·     E-MailE-mail address of the user.

·     Telephone No.Telephone number of the user.

·     Maximum Connection NumberMaximum number of connections allowed per user.

·     Creation TimeTime when user was created.

·     RolesRole of the user. The management right on HW FusionCompute varies by user role.

·     Account Security TypeSecurity type of account.

Sites

The Sites area contains the following fields:

·     NameName of the site. A site refers to the management scope for a VRM environment.

·     IDUnique identifier of the site.

·     IPIP address of the site, which is the management IP address of the VRM node.

·     VRM StatusCurrent status of the virtual machine.

·     SelfWhether the site is currently connected to APM.

·     Domain ControllerWhether the site is the domain controller.

·     Time ZoneTime zone of the location where the host is located.

·     NTP CycleNTP synchronization interval of the site.

·     NTP ServerIP address or domain name of the NTP server.

·     NTPBridge ServerIP address or domain name of the NTP bridge server.

Clusters

The Clusters area contains the following fields:

·     NameName of the cluster.

·     IDUnique identifier of the cluster.

·     TagTag of the cluster.

·     Parent File NameName of the file where the cluster is located.

·     Resource Allocation StrategyResource allocation strategy of the cluster:

¡     loadBalanceLoad balancing.

¡     randomRandom.

·     Baseline Setting(IMC ONLY)Baseline setting in IMC mode.

·     Maximum CPU QuantityMaximum number of CPUs of the hosts in the cluster.

Cluster Resource

The Cluster Resource area contains the following fields:

·     NameName of the cluster.

·     Total CPUTotal CPU capacity of the cluster.

·     Allocated CPUAllocated CPU capacity of the cluster.

·     Total MemoryTotal memory capacity of the cluster.

·     Allocated MemoryAllocated memory capacity of the cluster.

Cluster Enabled

The Cluster Enabled area contains the following fields:

·     NameName of the cluster.

·     Memory Overcommit EnabledWhether memory overcommit is enabled for the cluster.

·     HA EnabledWhether the HA function is enabled for the cluster.

·     DRS EnabledWhether DRS is enabled for the cluster.

·     IMC EnabledWhether the IMC mode is enabled for the cluster.

·     NUMA EnabledWhether NUMA is enabled for the cluster.

·     Local RAM Disk EnabledWhether the local RAM disk is enabled for the cluster.

·     HostNumaDrs EnabledWhether Host NUMA DRS is enabled for the cluster.

Cluster HA Real-Time Information

The Cluster HA Real-Time Information area contains the following fields:

·     ClusterName of the cluster.

·     Current Cpu ReservationCurrent CPU failover capacity. This parameter is valid only when the Control Policy is set to 0.

·     Current Memory ReservationCurrent memory failover capacity. This parameter is valid only when the Control Policy is set to 0.

·     MasterSite identification for the master host.

·     Abnormal Hosts ConnectedSite identification for the hosts connected to the master abnormally.

·     Normal Host ConnectedSite identification for the hosts connected to the master normally.

·     Available HostsNumber of available hosts in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     Total HostsTotal number of hosts in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     Virtual Machines RunningTotal number of virtual machines running in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     Control PolicyControl policy used when a host failure occurs in the cluster:

¡     0Reserves resources.

¡     1Specifies a number of failed hosts that can trigger an alarm.

¡     2Uses dedicated failover hosts.

·     Auto Migrate Virtual MachinesWhether the cluster automatically migrates virtual machines.

·     FailOver HostsList of selected failover hosts. This parameter is valid only when the Control Policy is set to 2.

Cluster HA Real-Time Info – Slot

The Cluster HA Real-Time Info – Slot area contains the following fields:

·     ClusterName of the cluster.

·     Total Slots QuantityTotal number of slots in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     Available Slots QuantityTotal number of available slots in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     Used Slots QuantityNumber of used slots in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     FailOver SlotsNumber of slots used for failover in the cluster. This parameter is valid only when the Control Policy is set to 1.

·     CPU Slot SizeReserved CPU size on all running virtual machines. This parameter is valid only when the Control Policy is set to 1.

·     Memory Slot SizeReserved memory size on all running virtual machines. This parameter is valid only when the Control Policy is set to 1.

Host Statistical Information

The Host Statistical Information area contains the following fields:

·     SiteName of the cluster.

·     TotalTotal number of hosts in the site.

·     InitializingNumber of hosts that are initializing.

·     BootingNumber of hosts that are booting.

·     Shutting DownNumber of hosts that are shutting down.

·     RebootingNumber of hosts that are rebooting.

·     Power OffNumber of hosts that are offline.

·     FaultNumber of faulty hosts.

·     UnknownNumber of hosts that are in unknown state.

·     NormalNumber of hosts that are running correctly.

Host

The Host area contains the following fields:

·     Host NameName of the host.

·     IPIP address of the host.

·     StatusStatus of the host.

·     Cluster NameName of the cluster to which the host belongs.

·     Failed OverWhether the host is specified as a failover host.

·     MaintainingWhether the host is in maintaining state.

·     VendorVendor of the physical server.

·     ModelModel of the physical server.

·     HypervisorVirtualization software installed on the host.

·     CPU FrequencyCPU frequency of the host.

·     Physical CPU QuantityNumber of physical CPUs of the host.

·     Memory QuantityTotal memory capacity of the host.

·     Network Card QuantityNumber of network cards of the host.

Resource

The Resource area contains the following fields:

·     Host NameName of the host.

·     Total CPUsTotal CPU capacity of the host.

·     Allocated CPUsAllocated CPU capacity for the host.

·     Total MemoryTotal memory capacity of the host.

·     Allocated MemoryAllocated memory capacity for the host.

Resource Shared

The Resource Shared area contains the following fields:

·     Host NameName of the host.

·     Shared Memory Sent From GDVMSize of GDV's shared memory for sending.

·     Shared Memory Sent After RebootSize of GDV's shared memory for sending after host reboot.

·     Shared Memory Received By GDVMSize of GDV's shared memory for receiving.

·     Shared Memory Received By GDVM After RebootSize of GDV's shared memory for receiving after host reboot.

·     VM Capacity Shared By GPUNumber of virtual machines shared by GPU. 0 means not shared.

·     VM Capacity Shared By GPU After RebootNumber of virtual machines shared by GPU after host reboot. 0 means not shared.

Statistical Information

The Statistical Information area contains the following fields:

·     SiteName of the site.

·     TotalTotal number of virtual machines in the site.

·     RunningNumber of running virtual machines in the site.

·     StoppedNumber of stopped virtual machines in the site.

·     HibernatedNumber of hibernated virtual machines in the site.

·     FaultNumber of faulty virtual machines in the site.

Virtual Machines

The Virtual Machines area contains the following fields:

·     Virtual MachineName of the virtual machine.

·     IdleWhether the virtual machine is idle.

·     CPU Hot PlugWhether the virtual machine supports hot plugging the CPU.

·     CPU QuantityNumber of CPUs of the virtual machine.

·     Is High Precision ClockWhether the high-precision clock is enabled.

·     Host IPVNC access information of the virtual machine.

·     StatusCurrent status of the virtual machine.

Tasks

The Tasks area contains the following fields:

·     Start TimeStart time of the task.

·     ProgressProgress of the task.

·     Finish TimeFinish time of the task.

·     Reason DescriptionFailure reason description for the task.

·     CancelableWhether the task can be canceled. true means the task can be canceled. false means the task cannot be canceled.

·     Cancellation InstructionWhether a cancellation instruction is received. true means the instruction is received.

Alarms

The Alarms area contains the following fields:

·     Item Alarm LevelAlarm level. Options are Emergency, Important, Minor, and Prompt.

·     Item Alarm CategoryAlarm category.

·     Event TypeEvent type of the alarm.

·     Alarm CauseReason for the alarm.

Cluster Monitor

The Cluster Monitor area contains the following fields:

·     CPU UsageCPU usage of the cluster.

·     Cpu NumberNumber of physical CPUs of the cluster.

·     CPU CoresNumber of CPU cores of the cluster.

·     CPU Speed TotalTotal CPU frequency of the cluster.

·     domU Cpu UsageCPU usage of DomU of the cluster.

·     Memory UsageMemory usage of the cluster.

·     Memory SizeMemory size of the cluster.

·     DomU Memory UsageMemory usage of DomU of the cluster.

·     DomU Memory SizeMemory size of DomU of the cluster.

·     Disk IO InDisk write rate of the cluster.

·     Disk IO OutDisk read rate of the cluster.

·     Disk UsageDisk utilization.

·     NIC In UsageNetwork interface card inbound flow utilization.

·     NIC Out UsageNetwork interface card outbound flow utilization.

·     NIC Out SpeedNetwork Interface card outbound flow speed.

CPU

The CPU Info area contains the following fields:

·     VersionCPU version number.

·     FamilyFamily name to which the CPU belongs.

·     Max SpeedCPU's frequency.

·     ManufacturerCPU's manufacturer.

·     Sequence NumberCPU's sequence number.

·     Core CountCount of CPU cores.

Memory Info

The Memory Info area contains the following fields:

·     LocationPlace where the memory locates.

·     SizeTotal memory volume.

·     ManufacturerMemory manufacturer.

Host Dynamic Performance

The Host Dynamic Performance area contains the following fields:

·     CPU UsageUtilization rate of CPU.

·     Dom0 Cpu UsageUtilization rate of dom0's CPU.

·     CPU CoresCount of CPU cores.

·     domU Cpu CoresCount of domU's CPU cores.

·     CPU Speed TotalCPU's total frequency.

·     domU Cpu Speed TotaldomU CPU's total frequency.

·     Memory UsageUtilization rate of memory.

·     VM Memory UsageUtilization rate of memory in the virtual machine.

·     VM Memory TotalVirtual machines' total memory size.

·     VM Memory FreeVirtual machines' free memory size.

·     VM Running NumNumber of virtual machines that are running.

·     DomU Cpu UsageUtilization rate of DomU's CPU.

·     DomU Memory UsageUtilization rate of DomU's memory.

·     VM I/O InSpeed of virtual machine's disk writes.

·     VM I/O OutSpeed of virtual machine's disk reads.

·     VM Byte InInbound flow speed of virtual machine.

·     VM Byte OutOutbound flow speed of virtual machine.

·     Reboot TimeTime when the host reboots.

Net Dynamic Info

The Net Dynamic Info area contains the following fields:

·     NameName of network.

·     StatusCurrent status of network.

·     Byte Out SpeedOutbound flow speed of network.

·     Byte In Speed Inbound flow speed of network.

·     Package ReceivePackage receiving rate in the network.

·     Package SendPackage sending rate in the network.

·     Current SpeedCurrent speed of network flows.

NIC Dynamic Info

The Net Dynamic Info area contains the following fields:

·     NameName of the NIC.

·     StatusCurrent status of NIC.

·     Current SpeedCurrent speed of NIC flows.

·     Package Send SpeedPackage sending rate.

·     Package Receive SpeedPackage receiving rate.

·     Byte In SpeedInbound flow speed of the NIC.

·     Byte Out SpeedOutbound flow speed of the NIC.

·     Send Drop PacketDrop rate of packets sent.

·     Receive Drop PacketDrop rate of packets received.

Host Static Performance

The Host Static Performance area contains the following fields:

·     Board ManufacturerMasterboard manufacturer.

·     Board ProductMasterboard product number.

·     Board Serial NumMasterboard serial number.

·     Board VersionMasterboard version number.

·     Product ManufacturerServer manufacturer.

·     Product NameProduct name.

·     Product Serial NumProduct serial number.

·     Product VersionProduct version.

·     Product UUIDProduct UUID.

·     Product FamilyFamily that product belongs to.

·     Product Wakeup TypeWay in which the product was waken up.

·     Product SKU NumberProduct sKU number.

·     CPU TotalCPU's total frequency in GHz.

·     CPU NumberCount of CPUs.

·     Locator NumberNumber of slots that can hold memory devices.

·     Memory TotalTotal size of memory.

·     BIOS Release DateRelease date of BIOS.

·     BIOS VersionVersion number of BIOS.

·     ROM SizeSize of read-only memory.

·     BIOS VendorBIOS vendor.

·     NIC NumberNumber of network interface cards.

·     UVP InfoUVP information.

NIC Info

The NIC Info area contains the following fields:

·     NameName of the NIC.

·     MACNIC's MAC address.

·     Work ModeWhether the NIC supports duplex mode.

·     Port NameName of NIC's port.

·     SpeedSpeed of NIC.

NIC Original Info

The NIC Original Info area contains the following fields:

·     NameNetwork interface name.

·     Send PackagesNumber of packets sent by the NIC.

·     Receive PackagesNumber of packets received by the NIC.

·     Send VolumeOutbound flow volume of the NIC.

·     Receive VolumeInbound flow volume of the NIC.

·     Receive Drop PacketsNumber of dropped received packets.

·     Send Drop PacketsNumber of dropped sent packets.

·     SpeedCurrent Speed of the NIC.

·     SpecificationMaximum size of the NIC.

Logic Disk

The Logic Disk area contains the following fields:

·     NameLogic disk Name.

·     VolumeLogic disk volume.

·     Used VolumeLogic disk volume that has been used.

·     UsageUtilization rate of the logic disk.


Storage device monitor

The following information describes how to add and modify monitors for storage devices, and how to view the monitor reports.

APM supports common storage device monitors and HP MSA P2000-specific application monitors. An HP MSA P2000 application monitor supports more monitoring functions than a common storage device application monitor.

Common storage device application monitor

APM use common storage device application monitors to monitor the storage devices that support the SMI-S standard.

The SMI-S implementation varies by storage device vendor. APM might not be able to obtain some information of a monitored storage device due to SMI-S implementation differences.

Adding a common storage device application monitor

When you add a common storage device application monitor, follow these guidelines:

·     Add the storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Contact the storage device administrator to obtain the username and password of a user with the administrator privileges and the access rights to HTTPS/HTTP and SMI-S. The username and password are required for adding the application monitor.

To add a common storage device application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Common Storage Device of the Storage Device Monitor class.

The page for adding a common storage device application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the storage device to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the storage device in the Select Devices dialog box. For information about selecting a storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 5989. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the storage device. The fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list. If you select Enable, APM accesses the storage device through HTTPS. If you select Disable, APM accesses the storage device through HTTP.

¡     NamespaceEnter the namespace for the SMI-S interface of the storage device. The default value is /root/hpq. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of common storage device applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the common storage device application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a common storage device application monitor

Authorized users can modify all parameters except the IP address and the APM server for a storage device. When the IP address of a monitored storage device changes, operators must add a new application monitor for the storage device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a common storage device application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the common storage device application monitor you want to modify.

The page for modifying the common storage device application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a common storage device application monitor."

5.     Click OK.

Viewing the common storage device application monitor report

After a common storage device application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the common storage device application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a common storage device application monitor to display the report.

Figure 137 shows part of a common storage device application monitor report.

Figure 137 Part of a common storage device application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of the storage device.

·     IP Address—IP address of the storage device.

·     Application Type—Type of the monitored application, which is always Common Storage Device for a common storage device application monitor.

·     PortPort used for monitoring the storage device.

·     NamespaceNamespace of the SMI-S interface of the storage device.

·     Last Polling Time—Time when APM last polled the storage device.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the storage device. This field is not displayed if no alarm is generated by the storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the storage device.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the common storage device in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the common storage device in the last 30 days.

·     Available Time—Total amount of time that the storage device was available after 00:00 today.

·     Unavailable Time—Total amount of time that the storage device was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the storage device was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the storage device was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Information

The Basic Information area contains the following fields:

·     NameName of the storage device.

·     DescriptionDescription of the storage device.

·     VendorVendor of the storage device.

·     VersionVersion of the storage device management controller codes.

Storage Pool/Virtual Disk

The Storage Pool/Virtual Disk area contains the following fields:

·     IDID of the storage pool or virtual disk. The value of PRIMORDIAL indicates that the storage pool is the original storage pool.

·     Health StatusHealth status of the storage pool or virtual disk. Click the Set Threshold icon  to set alarm thresholds for the health status of a virtual disk.

·     Free SpaceFree space of the storage pool or virtual disk. The free space of a virtual disk is a part of its total space.

·     Total SpaceTotal space of the storage pool or of virtual disk.

·     UsageUsage of the storage pool or virtual disk.

Power Supply Information

The Power Supply Information area contains the following fields:

·     IDID of the power supply module.

·     NameName of the power supply module.

·     Health StatusHealth status of the power supply module. Click the Set Threshold icon  to set alarm thresholds for the health status of the power supply module.

Fan Information

The Fan Information area contains the following fields:

·     IDID of the fan module.

·     NameName of the fan module.

·     Health StatusHealth status of the fan module. Click the Set Threshold icon  to set alarm thresholds for the health status of the fan module.

Disk Information

The Disk Information area contains the following fields:

·     IDID of the disk.

·     Health StatusHealth status of the disk. Click the Set Threshold icon  to set alarm thresholds for the health status of the disk.

·     Disk CapacityCapacity of the disk.

·     Free SpaceFree space of the disk.

·     Used SpaceUsed space of the disk.

·     Disk UsageUsage of the disk in the last polling period. Click the History Record icon icon_history_16x16.png to view the disk usage statistics in a line graph.

·     More—Click More to view disk information of all disks. By default, the report displays disk information of only the first 10 disks when the storage device has more than 10 disks.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     IDID of the storage volume.

·     Health StatusHealth status of the storage volume in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the storage volume.

·     TypeType of the storage volume:

¡     StandardStandard volume.

¡     MastervolMaster volume.

¡     Snap-poolSnap-pool volume.

·     CapacityCapacity of the disk.

·     Free SpaceFree space of the storage volume.

·     Used SpaceUsed space of the storage volume.

·     UsageUsage of the storage volume. Click the History Record icon icon_history_16x16.png to view the history graph of the usage of the storage volume.

·     InitializedWhether the storage volume was being initialized.

·     OwnerStorage controller that managed the storage volume.

·     Preferred Controller—Optimal controller for managing the storage volume.

·     More—Click More to view storage volume information of all storage volumes. By default, the report displays storage volume information of only the first 10 storage volumes when the common storage device has more than 10 storage volumes.

Controller Information

The Controller Information area contains the following fields:

·     NameName of the storage controller.

·     Health StatusHealth status of the storage controller. Click the Set Threshold icon  to set alarm thresholds for the health status of the storage controller.

·     ManufactureManufacturer of the storage controller.

·     ModeOperating mode of the storage controller.

·     Serial NumberSerial number of storage controller.

Sensor Information

The Interface Information area contains the following fields:

·     IDID of the sensor.

·     NameName of the sensor.

·     TypeType of the sensor. The value of Temperature indicates that the sensor is a temperature sensor.

·     Health StatusHealth status of the sensor. Click the Set Threshold icon  to set alarm thresholds for the health status of the sensor.

·     Description—Description of the sensor.

Interface Information

The Interface Information area contains the following fields:

·     NameName of the interface on the storage controller. The value of mgmtportX indicates that the interface is the management interface of a controller.

·     Health StatusHealth status of the interface in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the interface.

·     Current Rate—Transmission rate of the interface.

·     Max. Rate—Maximum transmission rate that the interface supports.

·     Interface Type—Type of the interface.

·     Target ID—Target ID of the interface. A hyphen (-) indicates that the interface target ID is not configured or not available.

·     Network Configuration—Network configuration of the interface, including the IP address, gateway address, subnet mask, and MAC address. A hyphen (-) indicates that the interface network configuration is not configured or not available.

Performance

The Interface Information area contains the following fields:

·     NameName of the storage device component.

·     TypeType of the storage device component.

·     IO Rate—I/O rate of the storage device component.

·     IO Read Rate—I/O read rate of the storage device component.

·     IO Write Rate—I/O write rate of the storage device component.

·     Data Read Rate—Data read rate of the storage device component.

·     Data Write Rate—Data write rate of the storage device component.

·     Data Transfer Rate—Data transfer rate of the storage device component.

·     More—Click More to view performance information of all storage device components. By default, the report displays performance information of only the first 10 storage device components when the storage device has more than 10 components.

EMC CLARiiON application monitor

EMC CLARiiON (EMC) is a midrange storage system developed by the EMC corporation. Available EMC models include CX3, CX4, and AX4.

Adding an EMC CLARiiON application monitor

APM monitors EMC storage devices through the built-in SMI-S provider of the devices. When you add an EMC application monitor, contact the EMC administrator to perform the following tasks:

·     Obtain the IP address and namespace of the SMI-S provider.

·     Obtain the username and password of a user with the administrator privileges and the access rights to HTTPS and SMI-S.

·     Check whether SSL is enabled on the SMI-S provider.

To add an EMC application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click EMC CLARiiON of the Storage Device Monitor class.

The page for adding an EMC application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the SMI-S provider of the EMC storage device. APM automatically checks the IP address and associates the application monitor with the EMC storage device if it is already managed in the IMC platform. If the EMC storage device is already added to the IMC platform, you can also click Select, and then select the EMC storage device in the Select Devices dialog box. For information about selecting an EMC storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. If SSL is enabled, the port number is 5988. If SSL is disabled, the port number is 5989. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the SMI-S provider. These fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list according the SSL setting on the SMI-S provider.

¡     NamespaceEnter the namespace for the SMI-S provider. The default value is /root/emc. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of EMC applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the EMC storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the EMC application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an EMC application monitor

Authorized users can modify all parameters except the IP address and the APM server for an EMC storage device. When the IP address of a monitored EMC storage device changes, operators must add a new application monitor for the EMC storage device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an EMC application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the EMC application monitor you want to modify.

The page for modifying the EMC application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an EMC CLARiiON application monitor."

5.     Click OK.

Viewing the EMC application monitor report

After an EMC application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the EMC application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an EMC application monitor to display the report.

Figure 138 shows part of an EMC application monitor report.

Figure 138 Part of an EMC application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Current health status of the EMC storage device.

·     IP Address—IP address of the SMI-S provider.

·     Application Description—Description of the EMC application.

·     Application Type—Type of the monitored application, which is always EMC CLARiiON.

·     Port—Listening port number of the SMI-S provider.

·     NamespaceNamespace of the SMI-S provider.

·     Last Polling Time—Time when APM last polled the SMI-S provider.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the EMC storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the EMC storage device. This field is not displayed if no alarm is generated by the EMC storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the EMC storage device.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the EMC storage device in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the EMC storage device in the last 30 days.

·     Available Time—Total amount of time that the EMC storage device was available after 00:00 today.

·     Unavailable Time—Total amount of time that the EMC storage device was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the EMC storage device was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the EMC storage device was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Information

The Basic Information area contains the following fields:

·     NameName of the EMC storage device.

·     Disk Count—Number of disks on the EMC storage device.

·     System CapacitySystem capacity of the EMC storage device.

·     VendorVendor of the EMC storage device.

·     ManufactureManufacturer of the EMC storage device.

·     Chassis ModelChassis model of EMC storage device.

·     Serial NumberSerial number of the EMC storage device.

·     VersionVersion of the EMC management controller codes.

Storage Pool/Virtual Disk

The Storage Pool/Virtual Disk area contains the following fields:

·     IDID of the storage pool/virtual disk.

·     Operational StatusOperating status of the storage pool/virtual disk.

·     Free SpaceAvailable space size of the storage pool/virtual disk.

·     Total SpaceTotal space size of the storage pool/virtual disk. The total space size equals the free space size plus the used space size.

·     Used SpaceUsed space size of the storage pool/virtual disk.

·     UsageRatio of the used space size to the total space size of the storage pool/virtual disk.

Power Supply Information

The Power Supply Information area contains the following fields:

·     IDID of the power supply module.

·     Health StatusHealth status of the power supply module. Options are:

¡     UnknownThe health status of the power supply module is unknown.

¡     OKThe power supply module is working correctly.

¡     DegradedThe power supply module is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the power supply module are available. However, some of the functions are degraded.

¡     Major failureThe power supply module is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe power supply module cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe power supply module is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the power supply module.

·     ManufacturerManufacturer of the power supply module.

·     ModelModel of the power supply module.

·     Serial NumberSerial number of the power supply module.

Disk Information

The Disk Information area contains the following fields:

·     NameName of the disk.

·     Health StatusHealth status of the disk. Options are:

¡     UnknownThe health status of the disk is unknown.

¡     OKThe disk is working correctly.

¡     DegradedThe disk is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the disk are available. However, some of the functions are degraded.

¡     Major failureThe disk is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe disk cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe disk is invalid and cannot be recovered. All functions are unavailable.

·     Disk CapacityTotal space size of the disk.

·     Disk Consumable SpaceAssigned available space size of the disk.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     IDID of the storage volume.

·     NameName of the storage volume.

·     Health StatusHealth status of the storage volume. Options are:

¡     UnknownThe health status of the storage volume is unknown.

¡     OKThe storage volume is working correctly.

¡     DegradedThe storage volume is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage volume are available. However, some of the functions are degraded.

¡     Major failureThe storage volume is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage volume cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage volume is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the storage volume.

·     CapacityTotal space size of the storage volume.

·     Consumable SizeAssigned available space size of the storage volume.

·     InitializedWhether the storage volume was initialized.

·     RAID TypeRAID type of the storage volume.

Controller Information

The Controller Information area contains the following fields:

·     IDID of the storage controller.

·     NameName of the storage controller.

·     Health StatusHealth status of the storage controller. Options are:

¡     UnknownThe health status of the storage controller is unknown.

¡     OKThe storage controller is working correctly.

¡     DegradedThe storage controller is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage controller are available. However, some of the functions are degraded.

¡     Major failureThe storage controller is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage controller cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage controller is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the storage controller.

·     Max Units ControlledMaximum number of units that can be controlled by the storage controller.

Interface Information

The Interface Information area contains the following fields:

·     NameName of the interface.

·     Health StatusHealth status of the interface. Options are:

¡     UnknownThe health status of the interface is unknown.

¡     OKThe interface is working correctly.

¡     DegradedThe interface is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the interface are available. However, some of the functions are degraded.

¡     Major failureThe interface is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe interface cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe interface is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the interface.

·     Current RateCurrent rate of the interface.

·     Interface CountNumber of the interfaces.

·     Interface TypeType of the interface.

Battery Information

The Battery Information area contains the following fields:

·     IDID of the battery.

·     Health StatusHealth status of the battery. Options are:

¡     UnknownThe health status of the battery is unknown.

¡     OKThe battery is working correctly.

¡     DegradedThe battery is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the battery are available. However, some of the functions are degraded.

¡     Major failureThe battery is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe battery cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe battery is invalid and cannot be recovered. All functions are unavailable.

·     ManufacturerManufacturer of the battery.

·     ModelModel of the battery.

Card Information

The Card Information area display information about the following types of cards: IOCardm, LinkControlCard, and SpCard.

The Card Information area contains the following fields:

·     IDID of the card.

·     Operational StatusOperating status of the card.

·     ManufacturerManufacturer of the card.

·     ModelModel of the card.

Performance

The Performance area contains the following fields:

·     Instance IDID of the performance instance.

·     NameName of the performance index.

·     TypeType of the performance index.

·     IO Rate—I/O rate of the disk array.

·     IO Read Rate—I/O read rate of the disk array.

·     IO Write Rate—I/O write rate of the disk array.

·     Data Read Rate—Data read rate of the disk array.

·     Data Write Rate—Data write rate of the disk array.

·     Data Transfer Rate—Data transfer rate of the disk array.

HP 3PAR application monitor

HP 3PAR StoreServ is an all-flash, solid-state array data storage system developed by H3C.

Adding an HP 3PAR application monitor

APM monitors HP 3PAR storage devices through the built-in SMI-S interface of the devices. When you add an HP 3PAR application monitor, follow these guidelines:

·     Add the HP 3PAR storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Contact the HP 3PAR administrator to obtain the username and password of a user with the administrator privileges and the access rights to HTTPS/HTTP and SMI-S. The username and password are required for adding the application monitor.

To add an HP 3PAR application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click HP 3PAR of the Storage Device Monitor class.

The page for adding an HP 3PAR application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the HP 3PAR storage device to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the HP 3PAR storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the HP 3PAR storage device in the Select Devices dialog box. For information about selecting an HP 3PAR, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 5989. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the HP 3PAR. These fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list. If you select Enable, APM accesses the HP 3PAR storage device through HTTPS. If you select Disable, APM accesses the HP 3PAR storage device through HTTP.

¡     NamespaceEnter the namespace for the SMI-S interface of the HP 3PAR storage device. The default value is /root/tpd. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of HP 3PAR applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the HP 3PAR storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the HP 3PAR application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an HP 3PAR application monitor

Authorized users can modify all parameters except the IP address and the APM server for an HP 3PAR storage device. When the IP address of a monitored HP 3PAR storage device changes, operators must add a new application monitor for the HP 3PAR storage device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an HP 3PAR application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the HP 3PAR application monitor you want to modify.

The page for modifying the HP 3PAR application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an HP 3PAR application monitor."

5.     Click OK.

Viewing the HP 3PAR application monitor report

After an HP 3PAR application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the HP 3PAR application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an HP 3PAR application monitor to display the report.

Figure 139 shows part of an HP 3PAR application monitor report.

Figure 139 Part of an HP 3PAR application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the HP 3PAR storage device.

·     IP Address—IP address of the HP 3PAR storage device.

·     Application Description—Description of the HP 3PAR application.

·     Application Type—Type of the monitored application, which is always HP 3PAR.

·     NamespaceNamespace of the SMI-S interface of the HP 3PAR storage device.

·     Last Polling Time—Time when APM last polled the HP 3PAR storage device.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the HP 3PAR storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the HP 3PAR storage device. This field is not displayed if no alarm is generated by the HP 3PAR storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the HP 3PAR storage device.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the HP 3PAR storage device in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the HP 3PAR storage device in the last 30 days.

·     Available Time—Total amount of time that the HP 3PAR storage device was available after 00:00 today.

·     Unavailable Time—Total amount of time that the HP 3PAR storage device was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the HP 3PAR storage device was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the HP 3PAR storage device was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Information

The Basic Information area contains the following fields:

·     NameName of the HP 3PAR storage device.

·     ModelModel of the HP 3PAR storage device.

·     Primary OwnerOwner of the HP 3PAR storage device.

·     ContactContact of the owner of the HP 3PAR storage device.

·     Time ZoneTime Zone configured for the HP 3PAR storage device.

·     Operational StatusOperating status of the HP 3PAR storage device.

Disk Information

The Disk Information area contains the following fields:

·     Disk IDID of the virtual disk.

·     Disk Health StatusHealth status of the virtual disk. Options are:

¡     UnknownThe health status of the virtual disk is unknown.

¡     OKThe virtual disk is working correctly.

¡     DegradedThe virtual disk is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the virtual disk are available. However, some of the functions are degraded.

¡     Major failureThe virtual disk is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe virtual disk cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe virtual disk is invalid and cannot be recovered. All functions are unavailable.

·     Disk Operational StatusOperating status of the virtual disk.

·     Disk SizeTotal size of the virtual disk.

·     Disk Consumable SizeAssigned available space size of the virtual disk.

·     Block Size—Block size of the virtual disk.

Controller Information

The Controller Information area contains the following fields:

·     Controller IDID of the storage controller.

·     Controller NameName of the storage controller.

·     Controller Health StatusHealth status of the storage controller. Options are:

¡     UnknownThe health status of the storage controller is unknown.

¡     OKThe storage controller is working correctly.

¡     DegradedThe storage controller is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage controller are available. However, some of the functions are degraded.

¡     Major failureThe storage controller is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage controller cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage controller is invalid and cannot be recovered. All functions are unavailable.

·     Controller Operational StatusOperating status of the storage controller.

Fan Information

The Fan Information area contains the following fields:

·     Fan NameName of the fan module.

·     Fan Health StatusHealth status of the fan module. Options are:

¡     UnknownThe health status of the fan module is unknown.

¡     OKThe fan module is working correctly.

¡     DegradedThe fan module is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the fan module are available. However, some of the functions are degraded.

¡     Major failureThe fan module is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe fan module cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe fan module is invalid and cannot be recovered. All functions are unavailable.

·     Fan Operational StatusOperating status of the fan module.

·     SpeedSpeed of the fan module.

Storage Pool Information

The Storage Pool Information area contains the following fields:

·     Pool NameName of the storage pool.

·     Pool Health StatusHealth status of the storage pool. Options are:

¡     UnknownThe health status of the storage pool is unknown.

¡     OKThe storage pool is working correctly.

¡     DegradedThe storage pool is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage pool are available. However, some of the functions are degraded.

¡     Major failureThe storage pool is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage pool cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage pool is invalid and cannot be recovered. All functions are unavailable.

·     Pool Operational StatusOperating status of the storage pool.

·     Remain Managed SpaceAvailable space size of the storage pool.

·     Total Managed SpaceTotal space size of the storage pool.

·     Used CapacityUsed space size of the storage pool.

·     Usage RatioUsage ratio of the storage pool.

·     Space LimitSpace limit of the storage pool.

·     PrimordialWhether the storage pool is the original storage pool.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     Volume NameName of the storage volume.

·     Volume Health StatusHealth status of the storage volume. Options are:

¡     UnknownThe health status of the storage volume is unknown.

¡     OKThe storage volume is working correctly.

¡     DegradedThe storage volume is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage volume are available. However, some of the functions are degraded.

¡     Major failureThe storage volume is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage volume cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage volume is invalid and cannot be recovered. All functions are unavailable.

·     Volume Operational StatusOperating status of the storage volume.

·     Volume SizeSpace size of the storage volume.

·     Volume Consumable SizeAssigned available space size of the storage volume.

·     Block SizeBlock size of the storage volume.

·     Volume Raw SizeSpace size of the storage volume in the initial state.

·     PrimordialWhether the storage volume is the original storage volume.

·     RAID TypeRAID type of the storage volume.

FC Port Information

The FC Port Information area contains the following fields:

·     FC Port NameName of the FC interface.

·     FC Port Health StatusHealth status of the FC interface. Options are:

¡     UnknownThe health status of the FC interface is unknown.

¡     OKThe FC interface is working correctly.

¡     DegradedThe FC interface is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the FC interface are available. However, some of the functions are degraded.

¡     Major failureThe FC interface is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe FC interface cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe FC interface is invalid and cannot be recovered. All functions are unavailable.

·     FC Port Operational StatusOperating status of the FC interface.

·     FC Port TypeLink technology of the FC interface.

·     FC Port BandwidthBandwidth of the FC interface.

·     FC Port Max. BandwidthMaximum bandwidth of the FC interface.

·     FC Port NumberNumber of the FC interface.

·     FC Port MTUMaximum transmission unit (MTU) of the FC interface.

·     FC Port Permanent AddressPermanent address of the FC interface.

Ethernet Port Information

The Ethernet Port Information area contains the following fields:

·     Ethernet Port NameName of the Ethernet interface.

·     Ethernet Port Health StatusStatus of the Ethernet interface. Options are:

¡     UnknownThe health status of the Ethernet interface is unknown.

¡     OKThe Ethernet interface is working correctly.

¡     DegradedThe Ethernet interface is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the Ethernet interface are available. However, some of the functions are degraded.

¡     Major failureThe Ethernet interface is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe Ethernet interface cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe Ethernet interface is invalid and cannot be recovered. All functions are unavailable.

·     Ethernet Port Operational StatusOperating status of the Ethernet interface.

·     Ethernet Port BandwidthBandwidth of the Ethernet interface.

·     Ethernet Port Max. BandwidthMaximum bandwidth of the Ethernet interface.

·     Ethernet Port NumberNumber of the Ethernet interface.

·     Ethernet Port MTUMaximum transmission unit of the Ethernet interface.

·     Ethernet Port Permanent AddressPermanent address of the Ethernet interface.

Power Supply Information

The Power Supply Information area contains the following fields:

·     Power Supply NameName of the power supply module.

·     Power Supply Health StatusHealth status of the power supply module. Options are:

¡     UnknownThe health status of the power supply module is unknown.

¡     OKThe power supply module is working correctly.

¡     DegradedThe power supply module is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the power supply module are available. However, some of the functions are degraded.

¡     Major failureThe power supply module is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe power supply module cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe power supply module is invalid and cannot be recovered. All functions are unavailable.

·     Power Supply Operational StatusOperating status of the power supply module.

·     ManufacturerManufacturer of the power supply module.

·     ModelModel of the power supply module.

·     Model NameModel name of the power supply module.

·     Serial NumberSerial number of the power supply module.

·     PositionPosition of the power supply module.

Battery Information

The Battery Information area contains the following fields:

·     Battery NameName of the battery.

·     Battery Health StatusHealth status of the battery. Options are:

¡     UnknownThe health status of the battery is unknown.

¡     OKThe battery is working correctly.

¡     DegradedThe battery is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the battery are available. However, some of the functions are degraded.

¡     Major failureThe battery is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe battery cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe battery is invalid and cannot be recovered. All functions are unavailable.

·     Battery Operational StatusOperating status of the battery.

·     Charging StatusCharging status of the battery.

·     Max LifeMaximum lifetime of the battery.

·     ManufacturerManufacturer of the battery.

·     ModelModel of the battery.

·     Model NameModel name of the battery.

·     Serial NumberSerial number of the battery.

HP MSA P2000 application monitor

HP MSA P2000 series storage devices include HP P2000 FC MSA and HP P2000 iSCSI MSA. APM monitors HP MSA P2000 storage devices through the built-in SMI-S interface of the devices. For HP MSA P2000 storage devices, you can add HP MSA P2000-specific application monitors in addition to common storage device monitors.

Adding an HP MSA P2000 application monitor

When you add an HP MSA P2000 application monitor, follow these guidelines:

·     Add the HP MSA P2000 storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Contact the HP MSA P2000 administrator to obtain the username and password of a user with the administrator privileges and the access rights to HTTPS/HTTP and SMI-S. The username and password are required for adding the application monitor.

To add an HP MSA P2000 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click HP MSA P2000 of the Storage Device Monitor class.

The page for adding an HP MSA P2000 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the HP MSA P2000 storage device to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the HP MSA P2000 storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the HP MSA P2000 storage device in the Select Devices dialog box. For information about selecting an HP MSA P2000, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 5989. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the HP MSA P2000. The fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list. If you select Enable, APM accesses the HP MSA P2000 storage device through HTTPS. If you select Disable, APM accesses the HP MSA P2000 storage device through HTTP.

¡     NamespaceEnter the namespace for the SMI-S interface of the HP MSA P2000 storage device. The default value is /root/hpq. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of HP MSA P2000 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the HP MSA P2000 storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the HP MSA P2000 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an HP MSA P2000 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an HP MSA P2000 storage device. When the IP address of a monitored HP MSA P2000 storage device changes, operators must add a new application monitor for the HP MSA P2000 storage device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an HP MSA P2000 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the HP MSA P2000 application monitor you want to modify.

The page for modifying the HP MSA P2000 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an HP MSA P2000 application monitor."

5.     Click OK.

Viewing the HP MSA P2000 application monitor report

After an HP MSA P2000 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the HP MSA P2000 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an HP MSA P2000 application monitor to display the report.

Figure 140 shows part of an HP MSA P2000 application monitor report.

Figure 140 Part of an HP MSA P2000 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health State—Health status of HP MSA P2000.

·     IP Address—IP address of HP MSA P2000.

·     Application Type—Type of the monitored application, which is always HP MSA P2000 for an HP MSA P2000 application monitor.

·     PortPort used for monitoring HP MSA P2000.

·     NamespaceNamespace of the SMI-S interface of HP MSA P2000.

·     Last Polling Time—Time when APM last polled HP MSA P2000.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between HP MSA P2000 and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on HP MSA P2000. This field is not displayed if no alarm is generated by HP MSA P2000.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of HP MSA P2000.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the HP MSA P2000 in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the HP MSA P2000 in the last 30 days.

·     Available Time—Total amount of time that HP MSA P2000 was available after 00:00 today.

·     Unavailable Time—Total amount of time that HP MSA P2000 was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that HP MSA P2000 was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that HP MSA P2000 was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Information

The Basic Information area contains the following fields:

·     NameName of HP MSA P2000.

·     DescriptionDescription of HP MSA P2000.

·     RAID LevelRAID level of HP MSA P2000.

·     Drive Count—Number of drivers on HP MSA P2000.

·     System CapacityTotal physical disk capacity used by HP MSA P2000.

·     VendorVendor of HP MSA P2000.

·     ManufactureManufacturer of HP MSA P2000.

·     Case ModelCase model of HP MSA P2000.

·     Serial NumberSerial number of HP MSA P2000.

·     VersionVersion of the HP MSA P2000 management controller codes.

Storage Pool/Virtual Disk

The Storage Pool/Virtual Disk area contains the following fields:

·     IDID of the storage pool or virtual disk. The value of SAS PRIMORDIAL POOL is the ID of the storage pool. The other ID values are the IDs of virtual disks.

·     Health StatusHealth status of the storage pool or virtual disk in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of a virtual disk.

·     Free SpaceFree space of the storage pool or virtual disk. The free space of a virtual disk is a part of its total space.

·     Total SpaceTotal space of the storage pool or virtual disk.

Power Supply Information

The Power Supply Information area contains the following fields:

·     IDID of the power supply module.

·     NameName of the power supply module.

·     Health StatusHealth status of the power supply module in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the power supply module.

Fan Information

The Fan Information area contains the following fields:

·     IDID of the fan module.

·     NameName of the fan module.

·     Health StatusHealth status of the fan module in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the fan module.

Disk Information

The Disk Information area contains the following fields:

·     IDID of the disk.

·     Health StatusHealth status of the disk. Click the Set Threshold icon  to set alarm thresholds for the health status of the disk.

·     Disk CapacityCapacity of the disk.

·     Free SpaceFree space of the disk.

·     Used SpaceUsed space of the disk.

·     Disk UsageUsage of the disk in the last polling period. Click the History Record icon icon_history_16x16.png to view the history graph of the disk usage.

·     More—Click More to view disk information of all disks. By default, the report displays disk information of only the first 10 disks when the HP MSA P2000 has more than 10 disks.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     IDID of the storage volume.

·     Health StatusHealth status of the storage volume in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the storage volume.

·     TypeType of the storage volume:

¡     Standard—Standard volume.

¡     Mastervol—Master volume.

¡     Snap-pool—Snap-pool volume.

·     CapacityCapacity of the disk.

·     Free SpaceFree space of the storage volume.

·     Used SpaceUsed space of the storage volume.

·     UsageUsage of the storage volume. Click the History Record icon icon_history_16x16.png to view the history graph of the volume usage.

·     InitializedWhether the storage volume was being initialized.

·     OwnerStorage controller that managed the storage volume.

·     Preferred Controller—Optimal controller for managing the storage volume.

·     More—Click More to view storage volume information of all storage volumes. By default, the report displays storage volume information of only the first 10 storage volumes when the HP MSA P2000 has more than 10 storage volumes.

Controller Information

The Controller Information area contains the following fields:

·     NameName of the storage controller.

·     Health StatusHealth status of the storage controller in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the storage controller.

·     ManufactureManufacturer of the storage controller.

·     ModeOperating mode of the storage controller.

·     Serial NumberSerial number of storage controller.

Interface Information

The Interface Information area contains the following fields:

·     NameName of the interface on the storage controller. The value of mgmtportX indicates that the interface is the management interface of a controller.

·     Health StatusHealth status of the interface in the last polling period. Click the Set Threshold icon  to set alarm thresholds for the health status of the interface.

·     Current Rate—Transmission rate of the interface.

·     Max. Rate—Maximum transmission rate that the interface supports.

·     Interface Type—Type of the interface.

·     Target ID—Target ID of the interface. A hyphen (-) indicates that the interface target ID is not configured or not available.

·     Network Configuration—Network configuration of the interface, including the IP address, gateway address, subnet mask, and MAC address. A hyphen (-) indicates that the interface network configuration is not configured or not available.

HW OceanStor 18500 V3 application monitor

HW OceanStor 18500 V3 (18500 V3) is a high-end storage system developed by Huawei.

Adding an HW OceanStor 18500 V3 application monitor

APM monitors 18500 V3 storage devices through the built-in SMI-S provider of the devices. When you add an 18500 V3 application monitor, contact the 18500 V3 administrator to perform the following tasks:

·     Obtain the IP address and namespace of the SMI-S provider.

·     Obtain the username and password of a user with the administrator privileges and the access rights to HTTPS and SMI-S.

·     Check whether SSL is enabled on the SMI-S provider.

To add an 18500 V3 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click HW OceanStor 18500 V3 of the Storage Device Monitor class.

The page for adding an 18500 V3 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the SMI-S provider of the 18500 V3 storage device. APM automatically checks the IP address and associates the application monitor with the 18500 V3 storage device if it is already managed in the IMC platform. If the 18500 V3 storage device is already added to the IMC platform, you can also click Select, and then select the 18500 V3 storage device in the Select Devices dialog box. For information about selecting an 18500 V3 storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. If SSL is enabled, the port number is 5988. If SSL is disabled, the port number is 5989. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the SMI-S provider. These fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list according the SSL setting on the SMI-S provider.

¡     NamespaceEnter the namespace for the SMI-S provider. The default value is /root/huawei. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of 18500 V3 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the 18500 V3 storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the 18500 V3 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an 18500 V3 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an 18500 V3 storage device. When the IP address of a monitored 18500 V3 storage device changes, operators must add a new application monitor for the 18500 V3 storage device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an 18500 V3 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the 18500 V3 application monitor you want to modify.

The page for modifying the 18500 V3 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an HW OceanStor 18500 V3 application monitor."

5.     Click OK.

Viewing the 18500 V3 application monitor report

After an 18500 V3 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the 18500 V3 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an 18500 V3 application monitor to display the report.

Figure 141 shows part of an 18500 V3 application monitor report.

Figure 141 Part of an 18500 V3 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Current health status of the 18500 V3 storage device.

·     IP Address—IP address of the SMI-S provider.

·     Application Description—Description of the 18500 V3 application.

·     Application Type—Type of the monitored application, which is always HW OceanStor 18500 V3.

·     Port—Listening port number of the SMI-S provider.

·     NamespaceNamespace of the SMI-S provider.

·     Last Polling Time—Time when APM last polled the SMI-S provider.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the 18500 V3 storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the 18500 V3 storage device. This field is not displayed if no alarm is generated by the 18500 V3 storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the 18500 V3 storage device.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the 18500 V3 storage device in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the 18500 V3 storage device in the last 30 days.

·     Available Time—Total amount of time that the 18500 V3 storage device was available after 00:00 today.

·     Unavailable Time—Total amount of time that the 18500 V3 storage device was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the 18500 V3 storage device was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the 18500 V3 storage device was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Information

The Basic Information area contains the following fields:

·     IDID of the 18500 V3 storage device.

·     NameName of the 18500 V3 storage device.

·     VendorVendor of the 18500 V3 storage device.

·     VersionVersion of the 18500 V3 management controller codes.

·     Serial NumberSerial number of the 18500 V3 storage device.

Controller Information

The Controller Information area contains the following fields:

·     IDID of the 18500 V3 storage device.

·     NameName of the storage controller.

·     Health StatusHealth status of the storage controller. Options are:

¡     UnknownThe health status of the storage controller is unknown.

¡     OKThe storage controller is working correctly.

¡     DegradedThe storage controller is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage controller are available. However, some of the functions are degraded.

¡     Major failureThe storage controller is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage controller cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage controller is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the storage controller.

·     Controller IDID of the storage controller.

Storage Pool/Virtual Disk

The Storage Pool/Virtual Disk area contains the following fields:

·     IDID of the storage pool/virtual disk.

·     NameName of the storage pool/virtual disk.

·     Health StatusHealth status of the storage pool/virtual disk. Options are:

¡     UnknownThe health status of the storage pool/virtual disk is unknown.

¡     OKThe storage pool/virtual disk is working correctly.

¡     DegradedThe storage pool/virtual disk is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage pool/virtual disk are available. However, some of the functions are degraded.

¡     Major failureThe storage pool/virtual disk is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage pool/virtual disk cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage pool/virtual disk is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the storage pool/virtual disk.

·     PrimordialWhether the storage pool/virtual disk is the original storage pool/virtual disk.

·     Total Space LimitSpace size limit of the storage pool/virtual disk.

·     Total SpaceTotal space size of the storage pool/virtual disk. The total space size equals the free space size plus the used space size.

·     Free SpaceAvailable space size of the storage pool/virtual disk.

·     Used SpaceUsed space size of the storage pool/virtual disk.

·     UsageRatio of the used space size to the total space size of the storage pool/virtual disk.

Disk Information

The Disk Information area contains the following fields:

·     IDID of the disk.

·     NameName of the disk.

·     Operational StatusOperating status of the disk.

·     PrimordialWhether the disk is the original disk.

·     Disk CapacityTotal space size of the disk.

·     Disk Consumable SpaceAssigned available space size of the disk.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     IDID of the storage volume.

·     NameName of the storage volume.

·     Operational StatusOperating status of the storage volume.

·     PrimordialWhether the storage volume is the original storage volume.

·     CapacityTotal space size of the storage volume.

·     Consumable SpaceAssigned available space size of the storage volume.

·     Delta ReservationDelta space reserved for the buffer by the storage volume when a replication operation is performed.

·     Is Based On Underlying RedundancyWhether the storage volume is based on underlying redundancy.

·     No Single Point Of FailureWhether the storage volume is not a single point of failure.

·     Data RedundancyData redundancies of the storage volume.

·     Package RedundancyPackage redundancies of the storage volume.

Interface Information

The Interface Information area contains the following fields:

·     IDID of the interface.

·     NameName of the interface.

·     Permanent AddressPermanent address of the interface.

·     Interface TypeType of the interface.

·     Current RateCurrent rate of the interface.

·     Max. RateMaximum rate of the interface.

·     Link TechnologyLink technology of the interface.

·     Max. Transmission UnitMaximum transmission unit of the interface.

Ethernet Port Information

The Ethernet Port Information area contains the following fields:

·     IDID of the Ethernet interface.

·     NameName of the Ethernet interface.

·     Operational StatusOperating status of the Ethernet interface.

·     Permanent AddressPermanent address of the Ethernet interface.

·     Network AddressMAC address of the Ethernet interface.

·     Max. Transmission UnitMaximum transmission unit of the Ethernet interface.

·     Current RateCurrent rate of the Ethernet interface.

·     Requested SpeedRequested speed of the Ethernet interface.

Chassis Information

The Chassis Information area contains the following fields:

·     IDID of the chassis.

·     NameName of the chassis.

·     Health StatusHealth status of the chassis. Options are:

¡     UnknownThe health status of the chassis is unknown.

¡     OKThe chassis is working correctly.

¡     DegradedThe chassis is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the chassis are available. However, some of the functions are degraded.

¡     Major failureThe chassis is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe chassis cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe chassis is invalid and cannot be recovered. All functions are unavailable.

·     Operational StatusOperating status of the chassis.

·     ManufacturerManufacturer of the chassis.

·     ModelModel of the chassis.

·     Serial NumberSerial number of the chassis.

Performance

The Performance area contains the following fields:

·     Instance IDID of the performance instance.

·     NameName of the performance index.

·     TypeType of the performance index.

·     IO Rate—I/O rate of the disk array.

·     IO Read Rate—I/O read rate of the disk array.

·     IO Write Rate—I/O write rate of the disk array.

·     Data Read Rate—Data read rate of the disk array.

·     Data Write Rate—Data write rate of the disk array.

·     Data Transfer Rate—Data transfer rate of the disk array.

HW OceanStor S3900 application monitor

HW OceanStor S3900 series are M2000 data storage devices produced by Huawei.

Adding an HW OceanStor S3900 application monitor

APM monitors HW OceanStor S3900 storage devices through built-in SMI-S interfaces. When you add an HW OceanStor S3900 application monitor, follow these guidelines:

·     Add the HW OceanStor S3900 storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Contact the storage device administrator to obtain the username and password of a user with the administrator privileges and the access rights to HTTPS and SMI-S. The username and password are required for adding the application monitor.

To add an HW OceanStor S3900 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click HW OceanStor S3900 of the Storage Device Monitor class.

The page for adding an HW OceanStor S3900 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host on which the HW OceanStor S3900 storage device to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the storage device in the Select Devices dialog box. For information about selecting a storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 5989. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the storage device. The fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list. If you select Enable, APM accesses the storage device through HTTPS. If you select Disable, APM accesses the storage device through HTTP. This field is available only when you select Disable from the Use Template list.

¡     NamespaceEnter the namespace for the SMI-S interface of the storage device. The default value is /root/huaweisymantec. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of HW OceanStor S3900 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the HW OceanStor S3900 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an HW OceanStor S3900 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an HW OceanStor S3900 storage device. When the IP address of a monitored HW OceanStor S3900 storage device changes, operators must add a new application monitor for the device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an HW OceanStor S3900 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the HW OceanStor S3900 application monitor you want to modify.

The page for modifying the HW OceanStor S3900 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an HW OceanStor S3900 application monitor."

5.     Click OK.

Viewing the HW OceanStor S3900 application monitor report

After an HW OceanStor S3900 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the HW OceanStor S3900 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an HW OceanStor S3900 application monitor to display the report.

Figure 142 shows part of an HW OceanStor S3900 application monitor report.

Figure 142 Part of an HW OceanStor S3900 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the application monitor.

·     Health Status—Health status of the storage device.

·     IP Address—IP address of the storage device.

·     Application Type—Type of the monitored application, which is always HW OceanStor S3900.

·     PortPort used for monitoring the HW OceanStor S3900 storage device.

·     NamespaceNamespace of the SMI-S interface of the HW OceanStor S3900 storage device.

·     Last Polling Time—Time when APM last polled the HW OceanStor S3900 storage device.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the HW OceanStor S3900 storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the storage device. This field is not displayed if no alarm is generated by the HW OceanStor S3900 storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the HW OceanStor S3900 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the HW OceanStor S3900 application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the HW OceanStor S3900 application in the last 30 days.

·     Available Time—Total amount of time that the HW OceanStor S3900 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the HW OceanStor S3900 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the HW OceanStor S3900 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the HW OceanStor S3900 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic Information

The Basic Information area contains the following fields:

·     ModelModel of the storage device.

·     VendorVendor of the device.

·     VersionVersion of the controller code for the device.

·     Array NameArray name of the device.

·     Array SNArray sequence number of the device.

·     Array Health StatusArray health status of the device. Options are:

¡     UnknownThe health status of the array is unknown.

¡     OKThe array is working correctly.

¡     DegradedThe array is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the array are available. However, some of the functions are degraded.

¡     Major failureThe array is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe array cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe array is invalid and cannot be recovered. All functions are unavailable.

·     Disk Array Running StatusOperating status of the array.

Disk Information

The Disk Information area contains the following fields:

·     Disk NameName of the virtual disk.

·     Disk Operational StatusOperating status of the virtual disk. Options are:

¡     UnknownThe health status of the virtual disk is unknown.

¡     OKThe virtual disk is working correctly.

¡     DegradedThe virtual disk is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the virtual disk are available. However, some of the functions are degraded.

¡     Major failureThe virtual disk is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe virtual disk cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe virtual disk is invalid and cannot be recovered. All functions are unavailable.

·     Disk SizeSize of the virtual disk.

·     Disk Consumable SizeAssigned available space size of the virtual disk.

·     Block SizeBlock size of the virtual disk.

Power Supply Information

The Power Supply Information area contains the following fields:

·     Power NameName of the power supply.

·     Power Health StatusHealth status of the power supply. Options are:

¡     UnknownThe health status of the power supply is unknown.

¡     OKThe power supply is working correctly.

¡     DegradedThe power supply is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the power supply are available. However, some of the functions are degraded.

¡     Major failureThe power supply is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe power supply cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe power supply is invalid and cannot be recovered. All functions are unavailable.

·     Power Operational StatusOperating status of the power supply.

·     Total Output PowerOutput power of the power supply.

Fan Information

The Fan Information area contains the following fields:

·     Fan NameName of the fan.

·     Fan Health StatusHealth status of the fan. Click the Set Threshold icon  to set alarm thresholds for the health status of the fan. Options are:

¡     UnknownThe health status of the fan is unknown.

¡     OKThe fan is working correctly.

¡     DegradedThe fan is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the fan are available. However, some of the functions are degraded.

¡     Major failureThe fan is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe fan cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe fan is invalid and cannot be recovered. All functions are unavailable.

·     Fan Operational StatusOperating status of the fan.

Storage Pool Information

The Storage Pool Information area contains the following fields:

·     Pool IDID of the storage pool.

·     Pool NameName of the storage pool.

·     PrimordialWhether the storage pool is initialized.

·     Pool Health StatusHealth status of the storage pool. Options are:

¡     UnknownThe health status of the storage pool is unknown.

¡     OKThe storage pool is working correctly.

¡     DegradedThe storage pool is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage pool are available. However, some of the functions are degraded.

¡     Major failureThe storage pool is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage pool cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage pool is invalid and cannot be recovered. All functions are unavailable.

·     Pool Operational StatusOperating status of the storage pool.

·     Total Managed SpaceTotal space size of the storage pool.

·     Remain Managed SpaceAvailable space size of the storage pool.

·     Used SpaceUsed space size of the storage pool.

·     Usage RatioUsage ratio of the storage pool.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     Volume IDID of the storage volume.

·     WWN—World Wide Name of the storage volume.

·     Volume Operational StatusOperating status of the storage volume.

·     Volume SizeSpace size of the storage volume.

·     Volume Consumable SizeAssigned available space size of the storage volume.

·     Block SizeBlock space size of the storage volume.

·     Data RedundancyData redundancies of the storage volume.

Controller Information

The Controller Information area contains the following fields:

·     Controller NameName of the storage controller.

·     Controller Health StatusHealth status of the storage controller. Options are:

¡     UnknownThe health status of the storage controller is unknown.

¡     OKThe storage controller is working correctly.

¡     DegradedThe storage controller is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage pool are available. However, some of the functions are degraded.

¡     Major failureThe storage controller is becoming invalid. Some or all functions are degraded and even become unavailable.

¡     Critical failureThe storage controller cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage controller is invalid and cannot be recovered. All functions are unavailable.

·     Controller Operational StatusOperating status of the storage controller.

·     Is MasterWhether the storage controller is a master controller.

·     IP AddressIP address of the storage controller.

FC Port Information

The FC Port Information area contains the following fields:

·     FC Port NameName of the FC interface.

·     FC Port Operational StatusOperating status of the FC interface.

·     FC Port TypeLink technology of the FC interface.

·     FC Port NumberFC interface number.

Chassis Information

The Chassis Information area contains the following fields:

·     Chassis NameName of the chassis.

·     Chassis SNSequence number of the chassis.

·     Chassis ModelModel of the chassis.

·     Chassis Health StatusHealth status of the chassis. Options are:

¡     UnknownThe health status of the chassis is unknown.

¡     OKThe chassis is working correctly.

¡     DegradedThe chassis is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the chassis are available. However, some of the functions are degraded.

¡     Major failureThe chassis is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe chassis cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe chassis is invalid and cannot be recovered. All functions are unavailable.

·     Chassis Operational StatusOperating status of the chassis.

·     Chassis TypeType of the chassis.

·     Chassis ManufacturerManufacturer of the chassis.

IBM Storwize V5000 application monitor

IBM Storwize V5000 is a storage device developed by IBM.

Adding an IBM Storwize V5000 application monitor

APM monitors IBM Storwize V5000 storage devices through built-in SMI-S interfaces. When you add an IBM Storwize V5000 application monitor, follow these guidelines:

·     Add the IBM Storwize V5000 storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Contact the storage device administrator to obtain the username and password of a user with the administrator privileges and the access rights to SMI-S. The username and password are required for adding the application monitor.

To add an IBM Storwize V5000 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click IBM Storwize V5000 of the Storage Device Monitor class.

The page for adding an IBM Storwize V5000 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host where the IBM Storwize V5000 storage device to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the storage device in the Select Devices dialog box. For information about selecting a storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the storage device. The fields are available only when you select Disable from the Use Template list.

¡     NamespaceEnter the namespace for the SMI-S interface of the storage device. The default value is /root/ibm. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of IBM Storwize V5000 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the IBM Storwize V5000 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an IBM Storwize V5000 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an IBM Storwize V5000 storage device. When the IP address of a monitored IBM Storwize V5000 storage device changes, operators must add a new application monitor for the device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an IBM Storwize V5000 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the IBM Storwize V5000 application monitor you want to modify.

The page for modifying the IBM Storwize V5000 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an IBM Storwize V5000 application monitor."

5.     Click OK.

Viewing the IBM Storwize V5000 application monitor report

After an IBM Storwize V5000 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the IBM Storwize V5000 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an IBM Storwize V5000 application monitor to display the report.

Figure 143 shows part of an IBM Storwize V5000 application monitor report.

Figure 143 Part of an IBM Storwize V5000 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the application monitor.

·     Health Status—Health status of the storage device.

·     IP Address—IP address of the storage device.

·     Application Type—Type of the monitored application, which is always IBM Storwize V5000.

·     NamespaceNamespace of the SMI-S interface for the IBM Storwize V5000 storage device.

·     Last Polling Time—Time when APM last polled the IBM Storwize V5000 storage device.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the IBM Storwize V5000 storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the storage device. This field is not displayed if no alarm is generated by the IBM Storwize V5000 storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the IBM Storwize V5000 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the IBM Storwize V5000 application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the IBM Storwize V5000 application in the last 30 days.

·     Available Time—Total amount of time that the IBM Storwize V5000 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the IBM Storwize V5000 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the IBM Storwize V5000 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the IBM Storwize V5000 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic information

The Basic Information area contains the following fields:

·     ModelModel of the storage device.

·     VendorVendor of the storage device.

·     VersionVersion of the controller code for the storage device.

·     NameName of the storage device.

·     StatusStatus of the storage device.

·     Array NameArray name for the storage device.

·     RAID LevelRAID level of the storage device.

·     Allocated CapacityAllocated capacity of the storage device.

·     Available CapacityAvailable capacity of the storage device.

·     Backend CapacityBackend capacity of the storage device.

·     Pool CapacityPool capacity of the storage device.

·     Total Used CapacityTotal used capacity of the storage device.

·     Total VDisk CapacityTotal virtual disk capacity of the storage device.

Disk Information

The Disk Information area contains the following fields:

·     Disk IDID of the virtual disk.

·     Disk NameName of the virtual disk.

·     Health StatusHealth status of the virtual disk. Options are:

¡     UnknownThe health status of the virtual disk is unknown.

¡     OKThe virtual disk is working correctly.

¡     DegradedThe virtual disk is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the virtual disk are available. However, some of the functions are degraded.

¡     Major failureThe virtual disk is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe virtual disk cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe virtual disk is invalid and cannot be recovered. All functions are unavailable.

·     Disk SizeSize of the virtual disk.

·     Disk Consumable SizeAssigned available space size of the virtual disk.

·     Block Size—Block size of the virtual disk.

Storage Pool Information

The Storage Pool Information area contains the following fields:

·     Pool IDID of the storage pool.

·     Pool NameName of the storage pool.

·     Pool Caption—Caption of the storage pool.

·     Pool StatusHealth status of the storage pool. Options are:

¡     UnknownThe health status of the storage pool is unknown.

¡     OKThe storage pool is working correctly.

¡     DegradedThe storage pool is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage pool are available. However, some of the functions are degraded.

¡     Major failureThe storage pool is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage pool cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage pool is invalid and cannot be recovered. All functions are unavailable.

·     Backend Volume Num.Number of backend volumes in the storage pool.

·     Storage Volume Num.Number of storage volumes in the storage pool.

·     Total Managed SpaceTotal managed space of the storage pool.

·     Remain Managed SpaceRemaining managed space of the storage pool.

·     Used CapacityUsed capacity of the storage pool.

·     Usage RatioUsage of the storage pool.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     Volume IDID of the storage volume.

·     Volume CaptionCaption of the storage volume.

·     Volume StatusHealth status of the storage volume. Options are:

¡     UnknownThe health status of the storage volume is unknown.

¡     OKThe storage volume is working correctly.

¡     DegradedThe storage volume is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage volume are available. However, some of the functions are degraded.

¡     Major failureThe storage volume is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage volume cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage volume is invalid and cannot be recovered. All functions are unavailable.

·     Volume SizeSize of the storage volume.

·     Volume Consumable SizeAssigned available space size of the storage volume.

·     Block SizeBlock size of the storage volume.

·     Group IDID of the group to which the storage volume belongs.

·     Group NameName of the group to which the storage volume belongs.

·     Pool IDID of the storage pool to which the storage volume belongs.

·     Pool NameName of the storage pool to which the storage volume belongs.

FC Port Information

The FC Port Information area contains the following fields:

·     Device IDDevice ID of the FC interface.

·     FC Port StatusStatus of the FC interface.

·     FC Port IDID of the FC interface.

·     FC Port Node NameName of the node where the FC interface is located.

·     FC Port TypeLink technology of the FC interface.

·     FC Port BandwidthBandwidth of the FC interface.

·     Max. BandwidthMaximum bandwidth of the FC interface.

·     FC Port NumberFC interface number.

·     FC Port MTUMaximum transmission unit of the FC interface.

Ethernet Port Information

The Ethernet Port Information area contains the following fields:

·     Device IDDevice ID of the Ethernet interface.

·     Ethernet Port StatusStatus of the Ethernet interface.

·     Ethernet Port BandwidthBandwidth of the Ethernet interface.

·     Ethernet Port NumberEthernet interface number.

·     Ethernet Port MTUMaximum transmission unit of the Ethernet interface.

·     Ethernet Port Active MTUActive maximum transmission unit of the Ethernet interface.

IBM Storwize V7000 application monitor

IBM Storwize V7000 is a storage device developed by IBM.

Adding an IBM Storwize V7000 application monitor

APM monitors IBM Storwize V7000 storage devices through built-in SMI-S interfaces. When you add an IBM Storwize V7000 application monitor, follow these guidelines:

·     Add the IBM Storwize V7000 storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

·     Contact the storage device administrator to obtain the username and password of a user with the administrator privileges and the access rights to SMI-S. The username and password are required for adding the application monitor.

To add an IBM Storwize V7000 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click IBM Storwize V7000 of the Storage Device Monitor class.

The page for adding an IBM Storwize V7000 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the host where the IBM Storwize V7000 storage device to be monitored is installed. APM automatically checks the IP address and associates the application monitor with the storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the storage device in the Select Devices dialog box. For information about selecting a storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the storage device. The fields are available only when you select Disable from the Use Template list.

¡     NamespaceEnter the namespace for the SMI-S interface of the storage device. The default value is /root/ibm. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of IBM Storwize V7000 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the IBM Storwize V7000 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an IBM Storwize V7000 application monitor

Authorized users can modify all parameters except the IP address and the APM server for an IBM Storwize V7000 storage device. When the IP address of a monitored IBM Storwize V7000 storage device changes, operators must add a new application monitor for the device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify an IBM Storwize V7000 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the IBM Storwize V7000 application monitor you want to modify.

The page for modifying the IBM Storwize V7000 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an IBM Storwize V7000 application monitor."

5.     Click OK.

Viewing the IBM Storwize V7000 application monitor report

After an IBM Storwize V7000 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the IBM Storwize V7000 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an IBM Storwize V7000 application monitor to display the report.

Figure 144 shows part of an IBM Storwize V7000 application monitor report.

Figure 144 Part of an IBM Storwize V7000 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the application monitor.

·     Health Status—Current health status of the storage device.

·     IP Address—IP address of the storage device.

·     Application Description—Description of the IBM Storwize V7000 application.

·     Application Type—Type of the monitored application, which is always IBM Storwize V7000.

·     NamespaceNamespace of the SMI-S interface for the IBM Storwize V7000 storage device.

·     Last Polling Time—Time when APM last polled the IBM Storwize V7000 storage device.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the IBM Storwize V7000 storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the storage device. This field is not displayed if no alarm is generated by the IBM Storwize V7000 storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the IBM Storwize V7000 application.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the IBM Storwize V7000 application in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the IBM Storwize V7000 application in the last 30 days.

·     Available Time—Total amount of time that the IBM Storwize V7000 application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the IBM Storwize V7000 application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the IBM Storwize V7000 application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the IBM Storwize V7000 application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Basic information

The Basic Information area contains the following fields:

·     ModelModel of the storage device.

·     VendorVendor of the storage device.

·     VersionVersion of the controller codes for the storage device.

·     NameName of the storage device.

·     StatusStatus of the storage device.

·     Array NameArray name for the storage device.

·     RAID LevelRAID level of the storage device.

·     Allocated CapacityAllocated capacity of the storage device.

·     Available CapacityAvailable capacity of the storage device.

·     Backend CapacityBackend capacity of the storage device.

·     Pool CapacityPool capacity of the storage device.

·     Total Used CapacityTotal used capacity of the storage device.

·     Total VDisk CapacityTotal virtual disk capacity of the storage device.

Disk Information

The Disk Information area contains the following fields:

·     Disk IDID of the virtual disk.

·     Disk NameName of the virtual disk.

·     Health StatusHealth status of the virtual disk. Options are:

¡     UnknownThe health status of the virtual disk is unknown.

¡     OKThe virtual disk is working correctly.

¡     DegradedThe virtual disk is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the virtual disk are available. However, some of the functions are degraded.

¡     Major failureThe virtual disk is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe virtual disk cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe virtual disk is invalid and cannot be recovered. All functions are unavailable.

·     Disk SizeSize of the virtual disk.

·     Disk Consumable SizeAssigned available space size of the virtual disk.

·     Block Size—Block size of the virtual disk.

Storage Pool Information

The Storage Pool Information area contains the following fields:

·     Pool IDID of the storage pool.

·     Pool NameName of the storage pool.

·     Pool Caption—Caption of the storage pool.

·     Pool StatusHealth status of the storage pool. Options are:

¡     UnknownThe health status of the storage pool is unknown.

¡     OKThe storage pool is working correctly.

¡     DegradedThe storage pool is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage pool are available. However, some of the functions are degraded.

¡     Major failureThe storage pool is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage pool cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage pool is invalid and cannot be recovered. All functions are unavailable.

·     Backend Volume Num.Number of backend volumes in the storage pool.

·     Storage Volume Num.Number of storage volumes in the storage pool.

·     Total Managed SpaceTotal space size of the storage pool.

·     Remain Managed SpaceAvailable space size of the storage pool.

·     Used CapacityUsed capacity of the storage pool.

·     Usage RatioUsage of the storage pool.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     Volume IDID of the storage volume.

·     Volume CaptionCaption of the storage volume.

·     Volume StatusHealth status of the storage volume. Options are:

¡     UnknownThe health status of the storage volume is unknown.

¡     OKThe storage volume is working correctly.

¡     DegradedThe storage volume is working correctly, but the health status is not optimal or recoverable errors exist.

¡     Minor failureAll functions of the storage volume are available. However, some of the functions are degraded.

¡     Major failureThe storage volume is becoming invalid. Some or all functions are degraded or becoming unavailable.

¡     Critical failureThe storage volume cannot work correctly and might be unrecoverable.

¡     Non-recoverable errorThe storage volume is invalid and cannot be recovered. All functions are unavailable.

·     Volume SizeSize of the storage volume.

·     Volume Consumable SizeAssigned available space size of the storage volume.

·     Block SizeBlock size of the storage volume.

·     Group IDID of the group to which the storage volume belongs.

·     Group NameName of the group to which the storage volume belongs.

·     Pool IDID of the storage pool to which the storage volume belongs.

·     Pool NameName of the storage pool to which the storage volume belongs.

FC Port Information

The FC Port Information area contains the following fields:

·     Device IDDevice ID of the FC interface.

·     FC Port StatusStatus of the FC interface.

·     FC Port IDID of the FC interface.

·     FC Port Node NameName of the node where the FC interface is located.

·     FC Port TypeLink technology of the FC interface.

·     FC Port BandwidthBandwidth of the FC interface.

·     Max. BandwidthMaximum bandwidth of the FC interface.

·     FC Port NumberFC interface number.

·     FC Port MTUMaximum transmission unit of the FC interface.

Ethernet Port Information

The Ethernet Port Information area contains the following fields:

·     Device IDDevice ID of the Ethernet interface.

·     Ethernet Port StatusStatus of the Ethernet interface.

·     Ethernet Port BandwidthBandwidth of the Ethernet interface.

·     Ethernet Port NumberEthernet interface number.

·     Ethernet Port MTUMaximum transmission unit of the Ethernet interface.

·     Ethernet Port Active MTUActive maximum transmission unit of the Ethernet interface.

H3C P5730 application monitor

H3C FlexStorage P5730 (P5730) is a storage device developed by H3C to meet various virtual environment demands.

Adding a P5730 application monitor

APM monitors P5730 applications through agents or REST interfaces. When you add a P5730 application monitor, follow these guidelines:

·     To monitor a P5730 application through an agent, deploy the agent on the host where the P5730 application is installed. For more information about agents, see "APM agent management."

·     Make sure the SSH and REST services have been enabled on the P5730 device.

·     Contact the P5730 administrator to obtain the username and password of a user with the administrator privileges and the access rights to the SSH and REST services.

·     Contact the P5730 administrator to obtain the port number of the REST service. The default is 8081.

·     Add the P5730 storage device to be monitored to the IMC platform.

For a storage device managed in the IMC platform, APM obtains and displays network connection information of the storage device and its access devices in the application topology. For more information about adding storage devices to the IMC platform, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

To add a P5730 application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click H3C P5730 of the Storage Device Monitor class.

The page for adding a P5730 application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the P5730 storage device. APM automatically checks the IP address and associates the application monitor with the P5730 storage device if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the P5730 storage device in the Select Devices dialog box. For information about selecting a P5730, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 16022. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the P5730. These fields are available only when you select Disable from the Use Template list.

¡     REST PortEnter the REST port number of the P5730 storage device. The default value is 8081. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of P5730 applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the P5730 storage device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the P5730 application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a P5730 application monitor

Authorized users can modify all parameters except the IP address and the APM server for a P5730 storage device. When the IP address of a monitored P5730 storage device changes, operators must add a new application monitor for the P5730 storage device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a P5730 application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the P5730 application monitor you want to modify.

The page for modifying the P5730 application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a P5730 application monitor."

5.     Click OK.

Viewing the P5730 application monitor report

After a P5730 application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the P5730 application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of a P5730 application monitor to display the report.

Figure 145 shows part of a P5730 application monitor report.

Figure 145 Part of a P5730 application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Health status of the P5730 storage device.

·     IP Address—IP address of the P5730 storage device.

·     Application Description—Description of the P5730 application.

·     Application Type—Type of the monitored application, which is always H3C P5730.

·     Last Polling Time—Time when APM last polled the P5730 storage device.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the P5730 storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the P5730 storage device. This field is not displayed if no alarm is generated by the P5730 storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the P5730 device.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the P5730 storage device in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the P5730 storage device in the last 30 days.

·     Available Time—Total amount of time that the P5730 storage device was available after 00:00 today.

·     Unavailable Time—Total amount of time that the P5730 storage device was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the P5730 storage device was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the P5730 storage device was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

CPU Usage Ratio

The CPU Usage Ratio area contains the following field:

·     CPU Usage RatioCPU usage ratio of the P5730 storage device. Click the History Record icon icon_history_16x16.png to view the history graph of the CPU usage ratio.

Memory Usage Ratio

The Memory Usage Ratio area contains the following field:

·     Memory Usage RatioMemory usage ratio of the P5730 storage device. Click the History Record icon icon_history_16x16.png to view the history graph of the memory usage ratio.

Cluster

The Cluster area contains the following fields:

·     NameName of the cluster.

·     Module CountNumber of storage modules in the cluster.

·     Storage Module IPIP address of each storage module in the cluster.

·     Virtual IP EnabledWhether the virtual IP address of the cluster is enabled.

·     Available SpaceAvailable space size of the cluster.

·     Total SpaceTotal space size of the cluster.

·     Supported FeaturesList of features supported by the cluster.

·     Adaptive Optimization SupportedWhether the cluster supports adaptive optimization.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Cluster Performance

The Cluster Performance area contains the following fields:

·     Cluster Performance UnitName of the cluster.

·     I/O ReadsNumber of read operations per second on the cluster.

·     I/O WritesNumber of write operations per second on the cluster.

·     I/O TotalTotal number of transfer operations per second on the cluster.

·     I/O Read RateRead rate in Mbps of the cluster.

·     I/O Write RateWrite rate in Mbps of the cluster.

·     I/O Transfer RateTransfer rate in Mbps of the cluster.

·     Read Queue DepthDepth of the read queue in the cluster.

·     Write Queue DepthDepth of the write queue in the cluster.

·     Total Queue DepthTotal depth of the read and write queues in the cluster.

·     Read LatencyRead operation latency of the cluster.

·     Write LatencyWrite operation latency of the cluster.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Cluster Virtual IP

The Storage Virtual IP area contains the following fields:

·     NameName of the cluster.

·     IPVirtual IP address of the cluster.

·     MaskMask of the virtual IP address of the cluster.

Cluster Space

The Cluster Space area contains the following fields:

·     NameName of the cluster.

·     Replication LevelReplication level of the cluster.

·     Available SpaceAvailable space of each replication level in the cluster. Click the History Record icon icon_history_16x16.png to view the history graph of the available space.

Volume

The Volume area contains the following fields:

·     NameName of the storage volume.

·     Created AtTime when the storage volume was created.

·     Alternate NameAlternative name of the storage volume.

·     SizeTotal size of the storage volume.

·     Provisioned SpaceSize configured for the storage volume.

·     Replica CountNumber of replications of the storage volume.

·     iSCSI Qualified NameiSCSI qualified name of the storage volume.

·     Bytes Written—Number of bytes written in the storage volume.

·     AvailabilityWhether the storage volume is online.

·     Cluster—Name of the cluster to which the storage volume belongs.

·     Transport Server ID—ID of the server that provides transfer service for the storage volume.

·     Date Protection Level—Data protection level of the storage volume. Options are:

¡     0—Network RAID-0 (None).

¡     1—Network RAID-5 (Single Parity).

¡     2—Network RAID-10 (2-Way Mirror).

¡     3—Network RAID-10 (3-Way Mirror).

¡     4—Network RAID-10 (4-Way Mirror).

¡     5—Network RAID-6 (Dual Parity).

·     Transport TypeDate transfer type of the storage volume. Options are:

¡     0—iSCSI.

¡     1—Fiber channel.

Click the History Record icon icon_history_16x16.png for an index to view the history graph of the corresponding index data.

Volume Performance

The Volume Performance area contains the following fields:

·     Volume Performance Unit—Name of the storage volume.

·     I/O ReadsNumber of read operations per second on the storage volume.

·     I/O WritesNumber of write operations per second on the storage volume.

·     I/O TotalTotal number of transfer operations per second on the storage volume.

·     I/O Read RateRead rate in Mbps of the storage volume.

·     I/O Write RateWrite rate in Mbps of the storage volume.

·     I/O Transfer RateTransfer rate in Mbps of the storage volume.

·     Read Queue DepthDepth of the read queue in the storage volume.

·     Write Queue DepthDepth of the write queue in the storage volume.

·     Total Queue DepthTotal depth of the read and write queues in the storage volume.

·     Read LatencyRead operation latency of the storage volume.

·     Write LatencyWrite operation latency of the storage volume.

Click the History Record icon icon_history_16x16.png to view the history graph of the corresponding index data.

Volume Status

The Volume Status area contains the following fields:

·     Name—Name of the storage volume.

·     Thinly ProvisionedWhether the storage volume is thinly provisioned.

·     In DeletionWhether the volume is being deleted.

·     VIP RebalancingWhether VIP rebalancing is being performed for the storage volume.

·     Enabled for Adaptive OptimizationWhether adaptive optimization is enabled for the storage volume.

·     In MigrationWhether the storage volume is migrating to another cluster.

·     SCSI LUN Status—SCSI LUN status of the storage volume.

·     Unrecoverable I/O ErrorsWhether the storage volume has unrecoverable I/O errors.

·     Restripe Pending StatusRestripe pending status of the storage volume.

·     Replication StatusReplication status of the storage volume.

·     Resynchronization StatusResynchronization status of the storage volume.

·     Migration StatusMigration status of the storage volume.

·     LicensedWhether the storage volume is licensed.

·     Fiber Channel Transport Status—Fiber channel transport status of the storage volume. Options are:

¡     0—None.

¡     1—Transitioning.

¡     2—ActiveNonOptimized.

¡     3—ActiveOptimized.

¡     4—Network RAID-10 (4-Way Mirror).

¡     5—Network RAID-6 (Dual Parity).

Volume iSCSI Session

The Volume iSCSI Session area contains the following fields:

·     Volume—Name of the storage volume.

·     Server—Name of the server accessing the storage volume.

·     Gateway IP—IP address of the gateway connected to the server.

·     Initiator IP—IP address of the iSCSI initiator of the server.

·     Initiator Port—IP port of the iSCSI initiator.

·     IQNQualified name of the iSCSI initiator.

·     Session IDID of the iSCSI session.

·     Session ResettingWhether the iSCSI session is reset.

·     Status—Status of the iSCSI session.

·     Target IPTarget IP address of the iSCSI session.

·     Target PortTarget IP port of the iSCSI session.

·     Target Portal Group TagTarget portal group tag of the iSCSI session.

Volume ACL

The Volume ACL area contains the following fields:

·     Volume—Name of the storage volume.

·     Server—Name of the server accessing the storage volume.

·     Exclusive Access RightWhether the server has exclusive access right to the storage volume.

·     Read Access RightWhether the server has read access right to the storage volume.

·     Write Access RightWhether the server has write access right to the storage volume.

·     LUNPermissions assigned to the storage volume by the LUN. This field is applicable only when the transport type is fiber channel.

Snapshot

The Snapshot area contains the following fields:

·     Name—Name of the snapshot.

·     Created AtTime when the snapshot was created.

·     Alternate name—Alternative name of the snapshot.

·     Transport Type—SCSI transport type for the snapshot. Options are:

¡     0—iSCSI.

¡     1—Fiber channel.

·     Size—Size of the snapshot.

·     Provisioned SpaceSpace size configured for the snapshot.

·     iSCSI IQN—iSCSI qualified name of the snapshot.

·     Primary SnapshotWhether the snapshot is a primary snapshot. The value of false indicates that the snapshot is a remote snapshot.

·     Bytes Written—Number of bytes written in the snapshot.

·     AvailabilityWhether the snapshot is online.

·     Cluster—Name of the cluster to which the snapshot belongs.

·     Cluster IDID of the cluster to which the snapshot belongs.

·     Used Writable Space—Amount of data written to the snapshot, which is the sum of data written to the snapshot and all parent snapshots.

·     Management Identifier—Identifier of the application managing the snapshot. Options are:

¡     0—Not managed.

¡     1—VSS.

¡     2—VMware.

·     Transport Server IDID of the transport server. This field is applicable only when the transport type is fiber channel.

Snapshot Status

The Snapshot Status area contains the following fields:

·     Name—Name of the snapshot.

·     In DeletionWhether the snapshot is being deleted.

·     Thinly ProvisionedWhether the snapshot is thinly provisioned.

·     Scheduled GenerationWhether the snapshot was generated by a schedule.

·     In MigrationWhether the snapshot is migrating.

·     SCSI LUN Status—SCSI LUN status of the snapshot.

·     Unrecoverable I/O ErrorsWhether the snapshot has unrecoverable I/O errors.

·     Restripe Pending Status—Restripe pending status of the snapshot.

·     Replication Status—Replication status of the snapshot.

·     Resynchronization Status—Resynchronization status of the snapshot.

·     Migration Status—Migration status of the snapshot.

·     LicensedWhether the snapshot is licensed.

·     Fiber Channel Transport StatusFiber channel transport status of the snapshot. Options are:

¡     0—None.

¡     1—Transitioning.

¡     2—ActiveNonOptimized.

¡     3—ActiveOptimized.

Snapshot iSCSI Session

The Snapshot iSCSI Session area contains the following fields:

·     Snapshot—Name of the snapshot.

·     Server—Name of the server to which the snapshot belongs.

·     Gateway IP—IP address of the gateway connected to the server.

·     Initiator IP—IP address of the iSCSI initiator.

·     Initiator PortPort number of the iSCSI initiator.

·     IQNQualified name of the iSCSI initiator.

·     Session IDID of the iSCSI session.

·     Session ResettingWhether the session is reset.

·     Status—Status of the iSCSI connection.

·     Target IP—IP address of the iSCSI target.

·     Target PortPort number of the iSCSI target.

·     Target Portal Group Tag—iSCSI target portal group tag.

Snapshot ACL

The Snapshot ACL area contains the following fields:

·     Snapshot—Name of the snapshot.

·     Server—Name of the server accessing the snapshot.

·     Exclusive Access RightWhether the server has exclusive access right to the snapshot.

·     Read Access RightWhether the server has read access right to the snapshot.

·     Write Access RightWhether the server has write access right to the snapshot.

·     LUNPermissions assigned to the snapshot by the LUN. This field is applicable only when the transport type is fiber channel.

Server

The Server area contains the following fields:

·     Name—Name of the server.

·     Boot Volume IDID of the fiber channel boot volume on the server.

·     Boot Volume LUNID of the LUN of the fiber channel boot volume on the server.

·     CHAP AuthenticationWhether CHAP authentication is required by the server.

·     CHAP Initiator Secret—CHAP initiator secret of the server.

·     CHAP Name—CHAP name of the server.

·     CHAP Target Secret—CHAP target secret of the server.

·     Controlling Server NameName or IP address of the controlling server.

·     Fiber Channel AvailableWhether fiber channel is enabled.

·     In Server ClusterWhether the server belongs to a server cluster.

·     iSCSI Enabled—Indicates whether iSCSI of the server is enabled.

·     iSCSI IQN—iSCSI qualified name of the server.

·     iSCSI LoadBalancing EnabledWhether iSCSI load balancing of the server is enabled.

Hitachi VSP application monitor

The Hitachi Vitual Storage Platform (VSP) is the new-generation enterprise-level storage platform of Hitachi Data Systems. The VSP GX00 series consists of the mid-range product G200, enterprise entry-level G400/G600, and enterprise-level G800. These products and the high-end G1000 of the industry form the complete product series.

Adding a Hitachi VSP application monitor

APM uses the SMI-S protocol to obtain index data for the Hitachi VSP application that is collected through the installed Hitachi Command Suite software. When you add a Hitachi VSP application monitor, contact the Hitachi VSP administrator to perform the following tasks:

·     Obtain the IP address and namespace of the Hitachi Command Suite.

·     Obtain the username and password of a user with the administrator privileges and the access rights to HTTPS and SMI-S.

·     Check whether SSL is enabled for Hitachi Command Suite.

To add a Hitachi VSP application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click Hitachi VSP of the Storage Device Monitor class.

The page for adding a Hitachi VSP application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the Hitachi Command Suite. APM automatically checks the IP address and associates the application monitor with the Hitachi VSP if it is already managed in the IMC platform. If the host is already added to the IMC platform, you can also click Select, and then select the Hitachi VSP in the Select Devices dialog box. For information about selecting a Hitachi VSP, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. The default value is 5988. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the user who has the administrator privileges on the Hitachi VSP. These fields are available only when you select Disable from the Use Template list.

¡     SSLSelect whether or not to implement connection encryption using SSL. This field is available only when you select Disable from the Use Template list.

¡     NamespaceEnter the namespace for the SMI-S interface. The default value is root/smis/current. This field is available only when you select Disable from the Use Template list.

¡     Storage System NameEnter the storage system name. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of Hitachi VSP applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the Hitachi VSP depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the Hitachi VSP application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying a Hitachi VSP application monitor

Authorized users can modify all parameters except the IP address and the APM server for a Hitachi VSP application monitor. When the IP address of a monitored Hitachi VSP host changes, operators must add a new application monitor for the host. However, the new application monitor cannot inherit the history data from the previous application monitor.

To modify a Hitachi VSP application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page opens.

3.     Click the Modify icon icon_modify_16x16.png for the Hitachi VSP application monitor you want to modify.

The page for modifying the Hitachi VSP application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding a Hitachi VSP application monitor."

5.     Click OK.

Viewing the Hitachi VSP application monitor report

After a Hitachi VSP application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the Hitachi VSP application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of the Hitachi VSP application monitor to display the report.

Figure 146 shows part of a Hitachi VSP application monitor report.

Figure 146 Part of a Hitachi VSP application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Name of the Hitachi VSP application monitor.

·     Health Status—Health status of the Hitachi VSP application.

·     IP Address—IP address of the Hitachi Command Suite software.

·     Application Description—Description of the Hitachi VSP application.

·     Application Type—Type of the monitored application, which is always Hitachi VSP.

·     Vendor—Vendor of the storage device.

·     Port—Listening port number of the Hitachi Command Suite.

·     Namespace—Namespace of the Hitachi Command Suite.

·     Last Polling Time—Time when APM last polled the Hitachi Command Suite.

·     Relationship—Click the Related Applications icon icon_dep_topo_16x16.png to view dependencies between the Hitachi VSP application and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the Hitachi VSP application.

¡     Click the Weekly History icon icon_history_last_7_day_16x16.png to view the availability of the Hitachi VSP application in the last 7 days.

¡     Click the Monthly History icon icon_history_last_30_day_16x16.png to view the availability of the Hitachi VSP application in the last 30 days.

·     Available Time—Total amount of time that the Hitachi VSP application was available after 00:00 today.

·     Unavailable Time—Total amount of time that the Hitachi VSP application was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the Hitachi VSP application was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the Hitachi VSP application was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Storage System Information

The Storage System Information area contains the following fields:

·     NameName of the storage system.

·     DescriptionDescription of the storage system.

·     Operational StatusOperational status of the storage system.

·     Health StatusHealth state of the storage system.

ArrayGroup Information

The ArrayGroup Information area contains the following fields:

·     ArrayGroup IDID of the ArrayGroup.

·     Owning Storage SystemStorage system to which the ArrayGroup belongs.

·     Block SizeBlock size of the ArrayGroup.

·     Total SizeTotal size of the ArrayGroup.

·     Operational StatusOperational status of the ArrayGroup.

·     Health StatusHealth state of the ArrayGroup.

Disk Information

The Disk Information area contains the following fields:

·     Device IDID of the disk.

·     Owning Storage SystemStorage system to which the disk belongs.

·     DescriptionDescription of the disk size.

·     Operational StatusOperational status of the disk.

·     Health StatusHealth state of the disk.

·     Block SizeBlock size of the disk.

·     Total SizeTotal size of the disk.

Port Information

The Port Information area contains the following fields:

·     Port IDID of the port.

·     Owning Storage SystemStorage system to which the port belongs.

·     Port TypeType of the port.

·     Port NumberPort number.

·     Link TechnologyLink technology of the port.

·     Operational Status—Operational status of the port.

·     Health StatusHealth state of the port.

·     WWNWWN information of the port.

Pool Information

The Pool Information area contains the following fields:

·     Pool IDID of the storage pool.

·     Owning Storage SystemStorage system to which the storage pool belongs.

·     CompositionIndicates what the storage pool consists of.

·     Total SizeTotal space of the storage pool.

·     Remaining SizeRemaining space of the storage pool.

·     Used SizeUsed space of the storage pool.

·     UtilizationUtilization of the storage pool.

·     Operational StatusOperational status of the storage pool.

·     Health StatusHealth state of the storage pool.

Volume Information

The Volume Information area contains the following fields:

·     Volume IDID of the volume.

·     Owning Storage SystemStorage system to which the volume belongs.

·     CompositionIndicates what the volume consists of.

·     Block SizeBlock size of the volume.

·     Total SizeTotal size of the volume.

·     Operational StatusOperational status of the volume.

·     Health StatusHealth state of the volume.

·     CompositeWhether the volume is composite type.

EMC VMAX 100K application monitor

EMC VMAX 100K is a high-end storage system developed by EMC. Typically models include 100K, 200K, and 400K.

Adding an EMC VMAX 100K application monitor

APM monitors EMC VMAX storage devices through the built-in SMI-S provider of the devices. When you add an EMC VMAX application monitor, contact the EMC VMAX administrator to perform the following tasks:

·     Obtain the IP address and namespace of the SMI-S provider.

·     Obtain the username and password of a user with the administrator privileges and the access rights to HTTPS and SMI-S.

·     Check whether SSL is enabled on the SMI-S provider.

To add an EMC VMAX 100K application monitor:

1.     Click the Resource tab.

2.     Open the Add Application page by using one of the following methods:

¡     From the navigation tree, select Application Manager > Add Application.

¡     From the navigation tree, select Application Manager > Application Monitor. In the application monitor list, click Add.

The Add Application page displays all application types that can be monitored by APM.

3.     Click EMC VMAX 100K of the Storage Device Monitor class.

The page for adding an EMC VMAX 100K application monitor opens.

4.     Configure the following parameters:

¡     IP Address—Enter the IP address of the SMI-S provider of the EMC VMAX 100K. APM automatically checks the IP address and associates the application monitor with the EMC VMAX 100K storage device if it is already managed in the IMC platform. If the EMC VMAX 100K storage device is already added to the IMC platform, you can also click Select, and then select the EMC VMAX 100K storage device in the Select Devices dialog box. For information about selecting an EMC VMAX 100K storage device, see "Quick start."

¡     NameEnter a unique application monitor name. As a best practice, name the application monitor as application type_host IP address.

¡     Use TemplateSelect Enable or Disable from the list.

¡     TemplateClick the Configure icon  next to the Template field to select an existing template. The Template field is automatically populated with the name of the selected template. For more information about configuring application templates, see "Configuration management." This field is displayed only when you select Enable from the Use Template list.

¡     Description—Enter a description for the application monitor.

¡     Application Monitor Port—Port used to monitor the application. If SSL is enabled, the port number is 5989. If SSL is disabled, the port number is 5988. This field is available only when you select Disable from the Use Template list.

¡     Polling Interval (min)—Select a polling interval for the application monitor. Options are 1, 2, 3, 4, 5, 10, 20, and 30. The default polling interval is 5 minutes. A shorter polling interval improves real-time data accuracy at the expense of system resources. This field is available only when you select Disable from the Use Template list.

¡     Username/Password—Enter the username and password of the SMI-S provider. These fields are available only when you select Disable from the Use Template list.

¡     SSLSelect Enable or Disable from the list according the SSL setting on the SMI-S provider.

¡     NamespaceEnter the namespace for the SMI-S provider. The default value is root/emc. This field is available only when you select Disable from the Use Template list.

¡     Contact—Enter the contact information, such as the name, email address, and telephone number. The default is the username of the operator who created the application monitor. This field is available only when you select Disable from the Use Template list.

¡     APM Server—Select an APM server to monitor the application. The options are in server-address (application-type:n/N) format. The letter n indicates the number of EMC VMAX 100K applications monitored on the APM server. The letter N indicates the total number of applications monitored on the APM server. Server address 127.0.0.1 indicates that APM and the IMC platform are deployed on the same server.

¡     Related Applications—Click Add next to this field. On the Select Application window, enter a partial or complete name to filter applications, select the applications that the VMAX 100K device depends on, and then click OK.

Operating system applications cannot be selected. Operators can view all dependencies of the application in the dependency topology.

¡     Application GroupSpecify an application group for the VMAX 100K application.

-     To specify an existing application group, click Add, select an application group, and then click OK.

-     To specify a new application group, click Add Application Group, configure the application group settings, and then click OK.

¡     Detect Application—Select this parameter if you want to enable application detection. APM verifies the application connectivity by using the previous parameter settings, and adds the application monitor only when it can connect to the application. If you do not select this parameter, APM adds the application monitor without verifying the application connectivity.

5.     Click OK.

Modifying an EMC VMAX 100K application monitor

Authorized users can modify all parameters except the IP address and the APM server for an EMC VMAX 100K device. When the IP address of a monitored VMAX 100K device changes, operators must add a new application monitor for the VMAX 100K device. The new application monitor cannot inherit the history data from the previous application monitor.

To modify a VMAX 100K application monitor:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the Modify icon icon_modify_16x16.png for the VMAX 100K application monitor you want to modify.

The page for modifying the VMAX 100K application monitor opens.

4.     Modify the parameters as needed, except the IP address and the APM server.

For more information about parameter settings, see "Adding an EMC VMAX 100K application monitor."

5.     Click OK.

Viewing the EMC VMAX 100K application monitor report

After an EMC VMAX 100K application monitor is added, APM collects index data of the application, evaluates the availability and health status, and updates the monitor report. The report shows the index values obtained from the most recent polling of the application.

To view the EMC VMAX 100K application monitor report:

1.     Click the Resource tab.

2.     From the navigation tree, select Application Manager > Application Monitor.

The application monitor list page displays all application monitors.

3.     Click the name of an EMC VMAX 100K application monitor to display the report.

Figure 147 shows part of an EMC VMAX 100K application monitor report.

Figure 147 Part of an EMC VMAX 100K application monitor report

 

Monitor Information

The Monitor Information area contains the following fields:

·     Name—Application monitor name.

·     Health Status—Current health status of the EMC VMAX 100K.

·     IP Address—IP address of the SMI-S provider.

·     Application Description—Description of the EMC VMAX 100K application.

·     Application Type—Type of the monitored application, which is always EMC VMAX 100K.

·     Port—Listening port number of the SMI-S provider.

·     NamespaceNamespace of the SMI-S provider.

·     Last Polling Time—Time when APM last polled the SMI-S provider.

·     Relationship—Click the Relationship icon icon_dep_topo_16x16.png to view dependencies between the EMC VMAX 100K storage device and other applications in a dependency topology view. For more information about dependency topologies, see "Topology and application group management."

·     Top5 Unrecovered Alarm—Latest five unrecovered alarms on the EMC VMAX 100K storage device. This field is not displayed if no alarm is generated by the EMC VMAX 100K storage device.

Availability Today

The Availability Today area contains the following fields:

·     Current Availability—Availability of the EMC VMAX 100K storage device.

¡     Click the Weekly History iconicon_history_last_7_day_16x16.png to view the availability of the EMC VMAX 100K storage device in the last 7 days.

¡     Click the Monthly History iconicon_history_last_30_day_16x16.png to view the availability of the EMC VMAX 100K storage device in the last 30 days.

·     Available Time—Total amount of time that the EMC VMAX 100K storage device was available after 00:00 today.

·     Unavailable Time—Total amount of time that the EMC VMAX 100K storage device was unavailable after 00:00 today.

·     Inaccessible Time—Total amount of time that the EMC VMAX 100K storage device was inaccessible after 00:00 today.

·     Unmanaged Time—Total amount of time that the EMC VMAX 100K storage device was unmanaged after 00:00 today.

The statistics collection started when the application monitor was added. An availability time field is not displayed when its value is 0.

Battery Information

The Battery Information area contains the following fields:

·     Device IDID of the battery.

·     Operational StatusOperational status of the battery.

·     Health StatusHealth state of the battery.

Fan Information

The Fan Information area contains the following fields:

·     Device IDID of the fan.

·     Operational StatusOperational status of the fan.

·     Health StatusHealth state of the fan.

Storage Pool Information

The Storage Pool Information area contains the following fields:

·     Pool IDID of the storage pool.

·     NameName of the storage pool.

·     Disk RPMRPM of the disk in the storage pool.

·     Disk Driver TypeType of the disk in the storage pool.

·     UtilizationUtilization of the storage pool.

·     Total SizeTotal space of the storage pool.

·     Remaining SizeRemianting space of the storage pool.

·     Operational StatusOperational status of the storage pool.

Virtual Storage Pool Information

The Virtual Storage Pool Information area contains the following fields:

·     Pool IDID of the virtual storage pool.

·     NameName of the virtual storage pool.

·     Disk Driver TypeType of the disk in the virtual storage pool.

·     Raid LevelRAID level of the virtual storage pool.

·     Disk RPMRPM of the disk in the virtual storage pool.

·     UtilizationUtilization of the virtual storage pool.

·     Total SizeTotal space of the virtual storage pool.

·     Remaining SizeRemaining space of the virtual storage pool.

·     Operational StatusOperational status of the virtual storage pool.

·     Health StatusHealth state of the virtual storage pool.

Storage Volume Information

The Storage Volume Information area contains the following fields:

·     Device IDID of the storage volume.

·     Block SizeBlock size of the storage volume.

·     Total SizeTotal space of the storage volume.

·     Comsumable SizeAvailable space of the storage volume.

·     Raid LevelRAID level of the virtual storage volume.

·     Operational StatusOperational status of the storage volume.

·     Health StatusHealth state of the storage volume.

FCPort Information

The FCPort Information area contains the following fields:

·     Device IDDevice ID of the port.

·     Port NumberPort number.

·     Port TypeType of the port.

·     Link TechnologyLink technology of the port.

·     WWNWWN information of the port.

·     BandwidthBandwidth of the port.

·     Operational StatusOperational status of the port.

·     Health StatusHealth state of the port.


APM service report

The APM service report function is implemented through the report function of the IMC platform. The IMC platform generates realtime reports and scheduled reports based on report templates. Operators can use iAR to customize report templates or use report templates provided by IMC.

You can view all reports on the Report tab of the IMC platform. For information about using the report function, see H3C Intelligent Management Center v7.3 Enterprise and Standard Platform Administrator Guide.

This section describes realtime reports and scheduled reports generated through APM service report templates.

Table 14 APM report templates

Name

Realtime report

Scheduled report

Application health report

Available

Available

Application available report

Available

Available

 

Realtime reports

Operators can quickly visit APM realtime reports by clicking the Report tab of the IMC platform and specifying report-related parameters. Realtime reports can be exported to the RPT, PDF, XLS, RTF, or CSV format or printed in hard copy for archiving.

All APM report templates can generate realtime reports.

Application health reports

An application health report displays the Healthy state percentage of applications in a specific time range.

To view the application health report of an application:

1.     Click the Report tab.

2.     In the My Real Time Reports area, click Application Health Report.

The window for setting parameters opens.

3.     Set the time range for the report:

¡     Begin timeClick the Begin time box and then select the start time in the YYYY-MM-DD hh:mm format in the calendar that opens.

¡     End time—Click the End time box and then select the end time in the YYYY-MM-DD hh:mm format in the calendar that opens.

4.     Click OK.

Figure 148 shows the application health report of the application.

Figure 148 Application health report

 

Application Health Report area fields:

·     Query time—Time range of data statistics in the report.

·     Name—Application monitor name. One application monitor corresponds to one application.

·     HealthyHealthy state time percentage of the application in the specified time range.

·     Unknown (--)Unknown state time percentage of the application in the specified time range.

·     MinorMinor state time percentage of the application in the specified time range.

·     MajorMajor state time percentage of the application in the specified time range.

·     CriticalCritical state time percentage of the application in the specified time range.

Application available reports

An application available report displays the Available state percentage of applications in the specified time range.

To view the application available report:

1.     Click the Report tab.

2.     In the My Real Time Reports area, click Application Health Report.

The window for setting parameters opens.

3.     Set the time range for the report:

¡     Begin time—Click the Begin time box and then select the start time in the YYYY-MM-DD hh:mm format in the calendar that opens.

¡     End time—Click the End time box and then select the end time in the YYYY-MM-DD hh:mm format in the calendar that opens. You can also enter the end time in the YYYY-MM-DD hh:mm format.

4.     Click OK.

Figure 149 shows the application available report of the application.

Figure 149 Application available report

 

Application Available Report area fields:

·     Query time—Time range of data statistics in the report.

·     Name—Application monitor name. One application monitor corresponds to one application.

·     AvailableAvailable state time percentage of the application in the specified time range.

·     InaccessibleInaccessible state time percentage of the application in the specified time range.

·     UnavailableUnavailable state time percentage of the application in the specified time range.

Scheduled reports

The IMC platform can generate the following scheduled reports:

·     Daily reports

·     Weekly reports

·     Monthly reports

·     Quarterly reports

·     Half yearly reports

·     Yearly reports

Operators can export the generated reports in the PDF, CSV, or XLS format and send them to the specified email boxes.

All APM report templates can generate scheduled reports. You can perform the same operations to add scheduled reports in different templates.

For information about contents in a scheduled report, see "Realtime reports."

Adding a scheduled report

1.     Click the Report tab.

2.     Open the Add Scheduled Report page by using one of the following methods:

¡     From the navigation tree, select Reports > Add Scheduled Report.

The page for adding scheduled reports is displayed.

¡     From the navigation tree, select Scheduled Reports > All Scheduled Reports, and then click Add on the All Scheduled Reports page.

The page for adding scheduled reports is displayed.

3.     Select a report template:

a.     Click Select on the right of the Template Name field.

The Query Template page opens.

b.     Enter the complete or part of the template name in the template name field.

APM supports fuzzy searching for this field.

c.     In the template query area, select Applications Manager Report for Type.

d.     Click Query.

e.     Select a template.

If the template is provided by APM, see Table 14.

f.     Click OK.

The template name populates the template name area.

4.     Enter the scheduled report name in the Scheduled Report Name field.

The default scheduled report name is the name of the used template.

5.     Select the operator group authorized to view scheduled reports:

All operators in this group can view the scheduled report.

To view which operators are included in an operator group:

a.     Click the Operator Group Information icon .

The window that displays operator group information opens.

b.     Select the target operator group from the Operator Group List area.

All operators included in the group are displayed in the Operators in Selected Groups area.

c.     Click OK.

6.     Specify the following parameters:

¡     Schedule Type—Select the schedule type. Options are Daily, Weekly, Monthly, Quarterly, Half yearly, and Yearly.

¡     Report Start DateClick the Report Start Date box and then select the start date in the YYYY-MM-DD format in the calendar that opens.

The IMC platform generates a scheduled report at 04:00 the day next to the start day. The scheduled report contains data between the start day and 00:00 the day next to the start day.

¡     If you select the Daily schedule type, reports of the previous day are generated every day. For example, if you set the report start date to 2011-08-10, the first daily report is generated at 04:00 on 08, 11, 2011, and the data in the report is the data collected till 00:00 on the day that the report was generated.

¡     If you select the Weekly schedule type, reports of the previous seven days are generated every seven days. For example, if you set the report start date to 2011-08-10, the first weekly report is generated at 04:00 on 08, 17, 2011, and the data from 08, 10, 2011 to 08, 16, 2011 is displayed in the report.

¡     If you select the Monthly schedule type, reports of the previous month are generated every month. For example, if you set the report start date to 2011-08-10, the first monthly report is generated at 04:00 on 09, 10, 2011, and the data collected till 00:00 on the day that the report was generated is displayed in the report.

¡     If you select the Quarterly schedule type, reports of the previous three months are generated every three months. For example, if you set the report start date to 2011-08-10, the first quarterly report is generated at 04:00 on 11, 10, 2011, and the data collected till 00:00 on the day that the report was generated is displayed in the report.

¡     If you select the Half Yearly schedule type, reports of the last half year are generated every half year. For example, if you set the report start date to 2011-08-10, the first half yearly report is generated at 04:00 on 02, 10, 2012, and the data collected till 00:00 on the day that the report was generated is displayed in the report.

¡     If you select the Yearly schedule type, reports of the last year are generated every year. For example, if you set the report start date to 2011-08-10, the first yearly report is generated at 04:00 on 08, 10, 2012, and the data collected till 00:00 on the day that the report was generated is displayed in the report.

7.     (Optional.) Set the time when a report becomes invalid. Then, IMC platform does not generate any scheduled report.

Click the End by box and then set the invalid time in the YYYY-MM-DD hh:mm format in the calendar that opens.

8.     From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only).

9.     (Optional.) Set to send a report by Email:

Select Send by Email, and enter the email address of the receiver. Reports can be sent to one email address.

10.     Set query start time and end time:

a.     Click the Set Parameter icon icon_modify_16x16.png for the start time.

b.     Select the start time for each schedule type from the schedule parameter list:

-     Daily—Options are Begin time, One hour after begin time through Twenty-three hours after begin time, and End time.

-     Weekly—Options are Begin time, One day after begin time through Six days after begin time, and End time.

-     Monthly—Options are Begin time, One day after begin time through Thirty days after begin time, and End time.

-     Quarterly—Options are Begin time, One month after begin time, Two months after begin time, and End time.

-     Half Yearly—Options are Begin time, One month after begin time, Five months after begin time, and End time.

-     Yearly—Options are Begin time, One month after begin time, Eleven months after begin time, and End time.

c.     Click OK to return to the page for adding a report.

The Set Parameter icon changes from  to .

d.     Click the Set Parameter icon icon_modify_16x16.png for the end time.

e.     Select the end time for each schedule type from the schedule parameter list:

-     Daily—Options are Begin time, One hour after begin time through Twenty-three hours after begin time, and End time.

-     Weekly—Options are Begin time, One day after begin time through Six days after begin time, and End time.

-     Monthly—Options are Begin time, One day after begin time through Thirty days after begin time, and End time.

-     Quarterly—Options are Begin time, One month after begin time, Two months after begin time, and End time.

-     Half Yearly—Options are Begin time, One month after begin time, Five months after begin time, and End time.

-     Yearly—Options are Begin time, One month after begin time, Eleven months after begin time, and End time.

f.     Click OK to return to the page for adding a report.

The Set Parameter icon changes from  to . The end time must be later than the begin time.

11.     Click OK.


Configuration examples

The chapter provides two configuration examples for using APM to monitor applications on a network:

·     In configuration example 1, a small Internet data center website is deployed with Linux, Apache, MySQL, and PHP servers. Users can access the WWW service at the website.

·     In configuration example 2, a corporate data center is deployed to use Microsoft technologies including DNS, IIS, Active Directory, Exchange, .NET, and SQL Server. Users can access the file server, receive and send emails, and use the OA system.

Configuration example 1

In this example, a website with the domain name www.apm-test.com is deployed with Linux, Apache, MySQL, and PHP servers.

Network diagram

See Figure 150.

Figure 150 Network diagram

典型案例.PNG

 

This network comprises the following devices (all hosts are running Linux):

·     DNS—DNS server used to resolve the domain name apm-test.com. It is deployed with BIND v9 and supports round robin load balancing.

·     Web1/Web2—Web servers that provide web services.

·     MySQL-M/MySQL-S—Database servers deployed with MySQL. The replication function is enabled for MySQL. MySQL-M is the primary server. MySQL-S is the secondary server and it backs up the data and uploads the backup data to the FTP server every day.

·     FTP—FTP server deployed VSFTP. It receives backup data from MySQL-S every day.

·     SW1—Layer 3 switch that provides network access services and performs access control for all servers.

Administrators required for the network include:

·     Administrator A—Performs routine network maintenance. As a member of the operator group Administrator Group, administrator A has the Admin privilege and manages all servers, network devices, BIND, and VSFTP.

·     Administrator B—Updates and publishes web pages. As a member of the operator group Web Group, administrator B has the maintainer privilege and manages Web 1, Web 2, Apache, and PHP.

·     Administrator C—Performs routine database maintenance and optimization. As a member of the operator group DB Group, administrator B has the maintainer privilege and manages MySQL-M, MySQL-S, and MySQL.

·     Administrator D—Monitors services 24 hours a day, 7 days a week. As a member of the operator group 7*24 Monitor Group, administrator D has the viewer privilege.

Configuration consideration

You can configure APM to monitor the following applications in the network:

·     Linux applications on the six Linux servers. Before you add a Linux monitor, you must create an administrator account that allows SSH login to the Linux server.

·     Apache applications on Web 1 and Web 2. Before you add an Apache server monitor, you must modify the Apache configuration file.

·     MySQL applications on MySQL-M and MySQL-S. Before you add a MySQL monitor, you must create an administrator account that allows remote login to the MySQL server.

·     PHP applications on Web 1 and Web 2.

·     DNS service application on the DNS server. The DNS server needs to resolve the domain name www.apm-test.com.

·     FTP application on the FTP server. Before you add an FTP monitor, you must create an FTP account that allows login to the FTP server.

In addition, you can add the following application monitors for better network management:

·     Directory monitor—Monitors the server directories used to save backup files and helps prevent backup file upload failures due to disk space insufficiency.

·     Database query monitor—You can add database query monitors for critical databases to detect query slowdown.

·     URL monitor—You can add URL application monitors to monitor critical pages, such as the home page http://www.apm-test.com/index.html and the user login page http://www.apm-test.com/user/login.php.

Configuration procedure

1.     Configure the Apache server. For more information, see "Web service monitor."

2.     Create a server administrator account, a MySQL account, and an FTP account:

¡     Linux username/passwordroot/apm123

¡     MySQL username/password—apmtest/apm123

¡     FTP username/password—apm/apm123

3.     Add the switch and the servers to the IMC platform. You can view detailed information about the switch and servers on the IMC platform.

4.     Add the following application monitors:

¡     Linux monitor.

¡     Apache server monitor.

¡     MySQL monitor.

¡     PHP monitor.

¡     DNS monitor.

¡     FTP monitor.

¡     Directory monitor.

¡     Database query monitor.

¡     URL monitor.

5.     Add application groups as shown in Table 15.

Table 15 Application groups

Application group

Application

Operator group

Privilege

Group A

·     All Linux applications

·     BIND

·     VSFTP

Administrator Group

ADMIN

Group B

·     Apache servers on Web 1 and Web 2

·     PHP application on Web 1 and Web 2

·     Linux servers on Web 1 and Web 2

Web Group

Maintainer

Group C

·     MySQL on MySQL-M and MySQL-S

·     Linux servers on MySQL-M and MySQL-S

DB Group

Maintainer

Group D

All applications

7*24 Monitor Group

Viewer

 

6.     An operator of the 7*24 Monitor Group can view the application topology after logging in to IMC. See Figure 151.

Figure 151 Application topology

案例1.png

 

Table 16 Application topology

Server

Application monitor

Application type

Dependency

FTP

Gen1_192.168.10.10

Linux

None

FTP_192.168.10.10

FTP service

Depends on Linux

Dir_192.168.10.10

Directory

Depends on:

·     Linux

·     FTP

DNS

Gen2_192.168.10.20

Linux

None

DNS_192.168.10.20

DNS service

Depends on Linux

MySQL-M

MySQL-M_192.168.20.10

Linux

None

MySQL_192.168.20.10

MySQL

Depends on Linux

DBQ_192.168.20.10

Database query

Depends on:

·     Linux

·     FTP

·     MySQL (primary)

MySQL-S

MySQL-S_192.168.20.10

Linux

None

MySQL_192.168.20.10

MySQL

Depends on:

·     Linux

·     MySQL (secondary)

·     FTP

Web1

Web1_192.168.30.10

Linux

None

Apache_192.168.30.10

Apache server

Depends on Linux

PHP_192.168.30.10

PHP

Depends on:

·     Linux

·     Apache server

URL_192.168.30.10

URL

Depends on:

·     Linux

·     Apache server

·     PHP

Web2

Web1_192.168.30.20

Linux

None

Apache_192.168.30.20

Apache server

Depends on Linux

PHP_192.168.30.20

PHP

Depends on:

·     Linux

·     Apache server

URL_192.168.30.20

URL

Depends on:

·     Linux

·     Apache server

·     PHP

Note:

All Linux servers are connected to the network through the Layer 3 switch SW1.

 

7.     View the application monitoring reports.

On the topology, an operator can view the monitoring reports of the applications through the right-click menus.

Configuration example 2

In this example, a company has a data center that uses Microsoft technologies and uses file, email, and OA servers to provide IT services. All PCs in the company belong to domain apm-test.com.

Network diagram

See Figure 152.

Figure 152 Network diagram

典型案例2-拓扑.png

 

This network comprises the following devices (all hosts are running Windows Server 2003):

·     DC-M/DC-S—Primary and secondary DCs in domain apm-test.com. DNS service is integrated on DC-M.

·     EX-1/EX-2/EX-3—Mail servers running Exchange Server 2007. EX-1 and EX-2 belong to domain apm-test.com. EX-3 does not belong to any domain.

¡     EX-1—Deployed with the hub transport role, client access role, and mailbox role.

¡     EX-2—Deployed with the unified messaging server role.

¡     EX-3—Deployed with the edge transport server role.

·     File—File server in domain apm-test.com, provides file services for the R&D, Sales, and Finance departments.

·     OA—OA server in domain apm-test.com, developed by using the .NET technology and released through IIS.

·     SQL—Database server used to provide database support for the OA system. It is running SQL Server 2005 and belongs to domain apm-test.com.

·     SW1—Layer 3 switch that provides network access services and performs access control for all servers.

Administrators required for the network include:

·     Administrator A—Performs routine network maintenance. As a member of the operator group Administrator Group, administrator A has the Admin privilege and manages all servers and network devices.

·     Administrator B—Manages DCs DC-M and DC-S. As a member of the operator group DC Group, administrator B has the maintainer privilege.

·     Administrator C—Manages mail servers EX-1, EX-2, and EX-3. As a member of the operator group Email Group, administrator C has the maintainer privilege.

·     Administrator D—Responsible for office service management and maintenance. As a member of the operator group Office Group, administrator D has the maintainer privilege and manages servers File, OA, and SQL Server.

Configuration consideration

You can configure APM to monitor the following applications in the network:

·     Windows Server applications on the eight hosts. Before you add a Windows Server monitor, you must enable the WMI feature for Windows Server and create an administrator account for the server.

·     Active Directory applications on DCs DC-M and DC-S and DNS service application integrated on the primary DC DC-M. The DNS server needs to resolve the DC domain name dc-m.apm-test.com and the web client domain name mail.apm-test.com.

·     Exchange Server 2007 applications on EX-1, EX-2, and EX-3, and IIS server and .NET server applications on EX-1. When you add an Exchange Server 2007 monitor, note that the services to be monitored are different for different roles.

·     Directories for the three departments on File. The monitors monitor the directories to help prevent disk space insufficiency.

·     IIS server and .NET server applications on OA.

·     SQL Server on SQL.

Configuration procedure

1.     Add the switch and the servers to the IMC platform. You can view detailed information about the switch and servers on the IMC platform.

2.     Add the following application monitors:

¡     Windows Server monitor.

¡     Active Directory monitor.

¡     DNS monitor.

¡     Exchange Server 2007 monitor.

¡     IIS server monitor.

¡     .NET server monitor.

¡     Directory monitor.

¡     SQL Server monitor.

3.     Add application groups as shown in Table 17.

Table 17 Application groups

Application group

Application

Operator group

Privilege

Group A

All Windows Server applications

Administrator Group

ADMIN

Group B

·     Active Directory on DC-M and DC-S

·     Windows Server on DC-M and DC-S

·     DNS on DC-M

DC Group

Maintainer

Group C

·     Exchange Server 2007 on EX-1, EX-2, and EX-3

·     IIS server on EX-1

·     .NET server on EX-1

·     Windows Server on EX-1, EX-2, and EX-3

Email Group

Maintainer

Group D

·     Three directories on File

·     SQL Server on SQL

·     IIS server on OA

·     .NET server on OA

Office Group

Maintainer

 

4.     An operator of the Administrator Group can view the application topology after logging in to IMC. See Figure 153.

Figure 153 Application topology

案例2.png

 

Table 18 Application topology

Server

Application monitor

Application type

Dependency

EX-1

EX1_192.168.30.10

Windows Server

None

IIS_192.168.30.10

IIS server

Depends on Windows Server

NET_192.168.30.10

.NET server

Depends on Windows Server

EX2007_192.168.30.10

Exchange Server 2007

Depends on:

·     Windows Server

·     IIS server

·     .NET server

·     Active Directory

·     Exchange Server 2007 (unified messaging)

·     Exchange Server 2007 (edge transport)

EX-2

EX2_192.168.30.20

Windows Server

None

EX2007_192.168.30.20

Exchange Server 2007

Depends on Windows Server

EX-3

EX2_192.168.30.30

Windows Server

None

EX2007_192.168.30.30

Exchange Server 2007

Depends on Windows Server

DC-M

DC-M_192.168.20.10

Windows Server

None

AD_192.168.20.10

Active Directory

Depends on Windows Server

DNS_192.168.20.10

DNS service

Depends on Windows Server

DC-S

DC-S_192.168.20.20

Windows Server

None

AD_192.168.20.20

Active Directory

Depends on:

·     Windows Server

·     DNS service

·     Active Directory (primary)

File

File_192.168.10.10

Windows Server

None

R&D_192.168.10.10

Directory

Depends on Windows Server

Sales_192.168.10.10

Directory

Depends on Windows Server

Finance_192.168.10.10

Directory

Depends on Windows Server

OA

OA_192.168.10.20

Windows Server

None

IIS_192.168.10.20

IIS server

Depends on Windows Server

NET_192.168.10.20

.NET server

Depends on:

·     Windows Server

·     SQL Server

SQL

SQL_192.168.10.30

Windows Server

None

MSSQL_192.168.10.30

SQL Server

Depends on Windows Server

Note:

All Windows servers are connected to the network through the Layer 3 switch SW1.

 

5.     View the application monitoring reports.

On the topology, an operator can view the monitoring reports of the applications through the right-click menus.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网