H3C U-Center IOM 2.0 User Guide-5W102

HomeSupportNetwork Operations & ManagementH3C U-CenterConfigure & DeployUser ManualsH3C U-Center IOM 2.0 User Guide-5W102
Table of Contents
Related Documents
01-Text
Title Size Download
01-Text 1.15 MB

U-Center 2.0 overview

Product orientation

H3C U-Center orients toward the enterprise-level, comprehensive O & M solution in the aspects of monitoring, management, and control. It applies to the multi-organization, multi-network, large capacity, and permission control scenarios, implementing one-stop management for all resources of the cloud, networks, and endpoints. Figure 1 shows the overall framework of U-Center 2.0.

Figure 1 Overall framework of U-Center 2.0

 

Components

·     Configuration Management Database (CMDB)

·     Infrastructure Operation Management (IOM)

·     IT Service Management (ITSM)

·     Business Service Management (BSM)

·     User Experience Management (UEM)

·     Application Discovery Tracing and Diagnostics (ADTD)

·     Network Traffic Analyzer (NTA)

·     Automated Operations Management

Capabilities

U-Center 2.0 adopts the microservice infrastructure and containerized Unified Platform. Based on CMDB data, monitor templates, custom indexes, process orchestration engine, and service management, U-Center 2.0 provides the following capabilities:

·     AggregationAggregates the cloud, network, endpoint, and security technical fields through the microservice-integrated Unified Platform to implement unified O & M.

·     ApplicationBased on CMDB data and OBASHI methodology (that describes relationships and data flows between services and IT resources), U-Center 2.0 generates topologies for service applications to implement unified resource management.

·     AIOpsAdopts big data and machine learning to solve exceptions, predict capacity, and analyze root causes.

·     AgilityUses monitor templates, predefined resource models, custom indexes, and automation for agile product delivery.

 


Quick start

U-Center 2.0 provides users with an intuitive, interactive Web interface that can be accessed through a Web browser. The following information covers these topics:

·     Access U-Center 2.0

·     Explore the U-Center 2.0 GUI

·     Manage operators

Access U-Center 2.0

U-Center 2.0 is developed based on the browser/server model. Users can access U-Center 2.0 directly by entering the URL of the U-Center server in the Web browser.

Table 1 lists the Web browsers supported by U-Center 2.0.

Table 1 Recommended Web browsers

Browser

Version

Chrome

Chrome 70 or later

Firefox

Firefox 78 or later

 

U-Center 2.0 can be accessed through both HTTP and HTTPS, by using URLs in the following formats:

·     http://<IP address>:<port>

·     https://<IP address>:<port>

The IP address is the virtual IP address configured in Matrix for northbound services. By default, the port number is 30000, which is configurable during installation.

 

 

NOTE:

·     You can use the predefined administrator account (with username admin and password Pwd@12345) for initial access to U-Center 2.0. After login, change the default account password as soon as possible for security purposes.

·     To view the northbound service virtual IP address, navigate to the DEPLOY > Clusters > Cluster Parameters page in Matrix.

 

Explore the U-Center 2.0 GUI

U-Center displays the overview page after you log in.

The U-Center 2.0 overview page contains the top navigation bar and O&M work pane, as shown in Figure 2.

Figure 2 U-Center 2.0 overview page

 

You can hover over the logo in the top left corner to display the U-Center 2.0 function modules, as shown in Figure 3.

Figure 3 U-Center 2.0 function menus

 

Table 2 U-Center GUI areas

Item

Name

Description

1

Logo

Provides access to all function modules of U-Center 2.0.

2

Top navigation bar

Provides one-key access to the function modules of U-Center.

3

O&M work pane

Displays the objects managed by the system, as well as the alarm information in the network.

4

Left navigation pane

Provides access to all resources and functions pertaining to the function module selected on the top navigation bar.

5

Configuration page

Allows you to configure the objects added to the system.

 

Click a tab on the top navigation bar to open the operation interface of the corresponding function module. For example, to open the IOM page, click Monitor on the top navigation bar.

Figure 4 IOM page

 

 

Manage operators

U-Center 2.0 implements role-based permission control on operators. An operator with a role has the operation and data permissions on a specific resource type. A role is a collection of permissions. To implement operation and data permission control for an operator, assign permissions to a role, specify the role for a group, and then add the operator to the group.

U-Center 2.0 allows provides various groups for you to add operators and assign permissions to them for implementing secure O & M.

Modify the default password of the admin account

U-Center 2.0 provides a predefined account with login name admin and password Pwd@12345. You can use the account for initial access to U-Center 2.0.

After login, change the default password of the admin account as soon as possible to improve security. To modify the default password of the admin account:

1.     On the top navigation bar, click System.

2.     From the navigation pane, select Operator Management > Operators.

3.     Click the Edit icon  in the Actions column for the admin operator.

4.     Turn on the Change Password option, and then enter the new password in the Login Password and Confirm Password fields.

5.     Click OK.

Add an operator

To manage a medium- or large-sized network, you can add multiple operators with associated permissions for secure O & M.

To add an operator:

1.     On the top navigation bar, click System.

2.     From the navigation pane, select Operator Management > Operators.

3.     Click Add.

4.     Configure the basic operator information:

¡     Operator Name: Enter the login account name, a case-insensitive string of at least two characters that can contain only letters, digits, underscores (_), hyphens (-), periods (.), and backslashes (\).

¡     Tenant: Specify a tenant for the operator.

¡     Group: Specify a group for the operator. Predefined groups include system management group, system viewer group, service management group, and service viewer group. The groups have different operation permissions.

¡     Authentication Method: Select an authentication method. The system provides the following authentication methods:

-     Simple Password Authentication: Requires specifying a password when adding the operator. The operator uses local password authentication for login.

-     LDAP/RADIUS/TACACS Authentication: Requires the operator to perform authentication with the associated authentication server for login.

¡     Tel: Enter the phone number of the operator. This field is optional.

¡     Email: Enter the Email account of the operator. This field is optional.

5.     Configure the advanced operator information:

¡     Last Name: Enter the last name of the operator. This field is optional.

¡     First Name: Enter the first name of the operator. This field is optional.

¡     Full Name: Enter the full name of the operator. This field is optional.

¡     Password/Confirm Password: Enter the login password for the operator.

¡     Permitted Login Time Span: Specify a login time range for the operator. The operator is not allowed to log in to the system at a time out of this range.

¡     Description: Enter a description of the operator. The description information facilitates maintenance.

¡     Self-Service Operator: Turn on this option to specify the operator as a self-service operator. This parameter is available only when you turn on the Self-Service option by navigating to the System > System Settings > Authentication Settings page.

¡     Account Validity Period: Specify a validity period for the password.

¡     Single User Login Control: Turn on this option to enable the operator to log in to only one client at a time.

6.     Click OK.

 

 

NOTE:

To use the RADIUS, LDAP, or TACACS authentication type, you must configure the authentication server settings on the Authentication Server page.

 


Monitor management

Monitor management provided by U-Center 2.0 is typically used to monitor, analyze, and optimize basic infrastructure for key services of enterprises. It helps enterprises enhance the reliability, availability, and continuity of the key services in order to reduce the total cost of ownership (TCO).

Monitor management provides a simple, highly efficient management tool for the increasingly complex IT infrastructures and service environments. It supports long-term monitoring and analysis for basic indexes of IT infrastructures such as server, storage, virtualization, container, operating system, database, and middleware, and can display the monitoring and analysis results as reports from various aspects. It helps administrators obtain the running status of IT infrastructures, fast locate service system faults, and make proper IT resource planning to ensure stable service operation.

Basic monitors

Servers

U-Center 2.0 can monitor various types of servers in terms of CPU status, memory status, disk information, network, power information, fan status, and other indexes, and can send a notification through the alarm module when a monitor index exceeds an alarm threshold.

Table 3 shows the servers that can be monitored by U-Center 2.0.

Table 3 Supported servers

Vendor

Model

HP

HP Blade Server, HP Integrity Server, HP Server

H3C

H3C Server

Huawei

HUAWEI Blade Server, HUAWEI Server

DELL

Dell Blade Server, Dell Server

Lenovo

Lenovo Server

IBM

IBM Server

Inspur

INSPUR Server

UNISINSIGHT

Unisit Server

UNIS

UNIS Server

ZTE

ZTE Server

CISCO

CISCO Server

Sugon

Sugon Server

Information2

i2Box Server

Resolink

Resolink Server

ChinaTelecom

ChinaTelecom Server

 

Add a server monitor

Before adding a server monitor, identify the server vendor and model. This section takes H3C Server-FlexServer B390 as an example to illustrate how to add server monitors.

To add a server monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Server.

3.     Click Add to select the target server type. In the dialog box that opens, click H3C Server and then click FlexServer B390 in the dropdown list.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, log access parameters, resource group, and other information for the server monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the server.

-     Name: Enter the name of the server.

-     Description: Enter a description for the server. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, and in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Submodel: Click Compute. In the Indexes Not Supported for Collection window that opens, view the details.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is REST GENERAL.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Username/Password: Specify the management user information used for monitoring the server.

-     Protocol: Specify a protocol. Options are HTTP and HTTPS. The default protocol is HTTP.

-     Port: Set the port of the server. The default value is 443.

¡     In the Log Access Parameters area, configure the following parameters:

-     Enable Log Monitoring: Select whether to enable log monitoring for the server. With this feature enabled, the system starts server log monitoring.

-     Collect All Logs: Select whether to enable collection of all logs of the server. With this feature enabled, the monitor collects all logs of the server.

-     Log Template: Specify a log template. After you enable log monitoring, click Settings. In the dialog box that opens, select an existing template or click Add to add a target template.

-     Polling Interval (Min): Specify the polling interval. After you enable log monitoring, you can set the polling interval, in minutes. The default value is 30.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the server connectivity.

6.     Click OK.

Edit a server monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Server.

3.     Click the Edit icon  in the Actions column for the target sever monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, log access parameters, and other information for the server monitor.

5.     Click Test Connectivity to test the server connectivity.

6.     Click OK.

Enable log monitoring

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Server.

3.     Perform one of the following operations:

¡     To enable log monitoring for one or multiple server monitors, select the server monitors, and then click More Actions > Enable Log Monitoring.

¡     To enable log monitoring for one server monitor, click the Enable Log Monitoring icon  in the Actions column for the sever monitor.

Disable log monitoring

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Server.

3.     Perform one of the following operations:

¡     To disable log monitoring for one or multiple server monitors, select the server monitors, and then click More Actions > Disable Log Monitoring.

¡     To disable log monitoring for one server monitor, click the Disable Log Monitoring icon  in the Actions column for the sever monitor.

Perform remote operations

To reboot, power on, or power off one or multiple server monitors remotely:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Server.

3.     Select the server monitors, click More Actions, and then click Reboot, Power On or Power Off.

Storage

Table 4 shows the storage devices that can be monitored by U-Center 2.0.

Table 4 Supported storage devices

Vendor

Model

H3C

H3C UniStor CB, H3C CF2205, H3C UniStor CB7000, H3C UniStor CD, H3C UniStor CF22000, H3C UniStor CF5040, H3C UniStor CF6000, H3C UniStor CH3800, H3C UniStor CP5520, H3C UniStor CX, H3C UniStor X10000, H3C UniStor X10000T, H3C ONEStor3.0, H3C ONEStor, H3C P5730, UNISINSIGHT

HP

HPE 3PAR, HPE Nimble HF40, HPE MSA2050, HP Primera, HPE StoreOnce 5200, HP MSA P2000

Huawei

HW OceanStor 18500 V3, HW UNIVERSAL, HW OceanStor 5300 V3, Huawei T Series, HW OceanStor 5800 V3, HW OceanStor 9000, HW OceanStor S3900

ZTE

ZTE KS3200

DELL

DELL Storage Center 2020, DELL EMC SC4020, DELL EMC SC5020, DELL EqualLogic, DELL SC 8000

EMC

EMC CLARiiON, EMC VMAX 100K, EMC ISILON, EMC VPLEX, EMC VNX5300

NETAPP

NetApp, NetApp AFF A7000

Quantum

Quantum Scalar i500

IBM

IBM DS Family, IBM DS8800, IBM F900, IBM FlashSystem series, IBM SVC, IBM Storwize V series

Hitachi

HUS110, Hitachi VSP, VSP G200

VMware

VMware VSAN

Inspur

Inspur AS5600

UNIS

UNIS X10216, UNIS X10216

Common Storage Equipment

Common Storage Equipment

MacroSAN

MacroSAN M5520

Brocade

Brocade

 

U-Center 2.0 can monitor various types of storage devices in terms of storage pool/virtual disk, power, fan, disk, storage volume, controller, interface, and other information, and can send a notification through the alarm module when a monitor index exceeds an alarm threshold.

Add a common storage device monitor

This section takes a common storage device as an example to illustrate how to add storage device monitors.

Support for monitoring storage devices based on the implementation of SMI-S on the storage devices. Due to differences of storage device vendors in implementing SMI-S, certain devices might not have data in the common storage device monitor list.

To add a common storage device monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Storage.

3.     Click Add to select the Common Storage Equipment type in the Common Storage Equipment category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the storage device monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the storage device.

-     Name: Enter the name of the storage device.

-     Description: Enter a description for the storage device. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is SMI-S.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Username/Password: Specify the management user information used for monitoring the storage device.

-     SSL: Enable SSL to use the HTTPS request method. If SSL is not enabled, the HTTP request method is used.

-     SMI-S Port: Enter monitor port number of the SMI-S Provider. The default value is 5989.

-     Namespace: Specify the namespace of the SMI-S interface.

-     Storage System Name: Specify the name of the storage system.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the storage device connectivity.

6.     Click OK.

Edit a storage device monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Storage.

3.     Click the Edit icon  in the Actions column for the target storage device monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the storage device monitor.

5.     Click Test Connectivity to test the storage device connectivity.

6.     Click OK.

Virtualization

The system can monitor virtualization devices such as CAS cluster, New CAS cluster, CloudOS, VMware vCenter, VMware ESX, KVM, HW FusionCompute, and HyperV. This helps administrators obtain virtualization device usage information (CPU, memory, network, and storage, for example), and provides basis for fault location, usage efficiency evaluation, and infrastructure optimization for virtualization devices.

Add a virtualization monitor

U-Center 2.0 supports monitoring virtualization devices such as CAS cluster, New CAS cluster, CloudOS, VMware vCenter, VMware ESX, KVM, HW FusionCompute, and HyperV. This section takes CAS cluster as an example to illustrate how to add virtualization device monitors.

CAS is the server virtualization product of H3C.

To add a CAS cluster monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Virtual.

3.     Click Add to select the CAS Cluster type in the Virtual Device Monitor category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the virtualization monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the CAS cluster.

-     Name: Enter the name of the CAS cluster.

-     Description: Enter a description for the CAS cluster. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, and in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is CAS CLUSTER.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Username/Password: Specify the management user information used for monitoring the CAS cluster.

-     Monitor Port: Enter the monitor port number of the CAS cluster. The default value is 8080.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the virtual device connectivity.

6.     Click OK.

Edit a virtualization monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Virtual.

3.     Click the Edit icon  in the Actions column for the target virtualization monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the virtualization monitor.

5.     Click Test Connectivity to test the virtualization device connectivity.

6.     Click OK.

Container

The system can monitor Kubernetes Master, Kubernetes cluster, Kubernetes container, and Docker. This helps administrators obtain container usage information (CPU, memory, and network, for example), and provides basis for container fault location, usage efficiency evaluation, and container orchestration optimization.

Add a container monitor

U-Center 2.0 supports monitoring and managing Kubernetes cluster, Kubernetes container, and Docker. This section takes Kubernetes cluster as an example to illustrate how to add container monitors.

To add a Kubernetes cluster monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Container.

3.     Click Add to select the Kubernetes Cluster type in the Container Monitor category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the container monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the Kubernetes cluster.

-     Name: Enter the name of the Kubernetes cluster.

-     Description: Enter a description for the Kubernetes cluster. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, and in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is KUBERNETES CLUSTER.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Monitor Port: Enter the monitor port number of the Kubernetes cluster. The value is usually 8080 for HTTP and 6443 for HTTPS.

-     Kube-apiserver Protocol: Specify a protocol used to access the Kubernetes cluster. Options are HTTP and HTTPS. The default port is HTTP.

-     Kube-apiserver AuthN Mode: Select an authentication mode. Options are None, Basic Authentication, and Token Authentication. The default authentication mode is None.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the Kubernetes cluster connectivity.

6.     Click OK.

Edit a container monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Container.

3.     Click the Edit icon  in the Actions column for the target container monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the container monitor.

5.     Click Test Connectivity to test the container connectivity.

6.     Click OK.

Operating system

U-Center 2.0 can monitor various types of operating systems (including Windows, Unix, and Linux servers) in terms of their CPU usage, memory usage, disk usage, system load, network interfaces, and server processes, and can send a notification through the alarm module when a monitor index exceeds an alarm threshold.

Add an OS monitor

U-Center 2.0 supports monitoring and managing Windows servers, Unix servers, and Linux servers. This section takes Windows OS monitor as an example to illustrate how to add OS monitors.

To add a Windows OS monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Operating System.

3.     Click Add to select the Windows type in the Windows Server Monitor category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the Windows OS monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the Windows OS.

-     Name: Enter the name of the Windows OS.

-     Description: Enter a description for the Windows OS. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. Options are WMI and SNMP.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Username/Password: Specify the management user information used for monitoring the Windows OS.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the Windows OS connectivity.

6.     Click OK.

Edit an OS monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Operating System.

3.     Click the Edit icon  in the Actions column for the target OS monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the OS monitor.

5.     Click Test Connectivity to test the OS connectivity.

6.     Click OK.

Database

U-Center 2.0 can monitor various types of database servers in terms of database, session, and cache details, and can send a notification through the alarm module when a monitor index exceeds an alarm threshold.

Add a database monitor

U-Center 2.0 supports adding various database monitors to ensure database performance and stability for correct operation of service applications. U-Center 2.0 supports monitoring and managing Cache, Cache2010, CloudOS DAaaS, H3C DataEngine, DB2, DB2 DPF, DB2 v11, DM, SeaSQL DRDS, ElasticSearch, Gbase, SAP HANA, HBase, Informix, Kingbase, Kingbase8, MemCached, MongoDB, SQL Server, MySQL, MySQL 8, Oracle ASM, Oracle, Oracle PDB, PostgreSQL, Redis, SeaSQL MPP, Shentong, Sybase, and Xugu.

 

 

NOTE:

The access parameter template varies by database.

 

SQL Server is the database management system developed by Microsoft.

 

IMPORTANT

IMPORTANT:

·     The system supports monitoring SQL Server 2000 SP4, SQL Server 2005, SQL Server 2008, and SQL Server 2012.

·     The system does not support monitoring SQL Server 2008 installed on Windows Server 2003.

 

This section takes SQL Server as an example to illustrate how to add database monitors.

To add a database monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Database.

3.     Click Add to select SQL Server type in the Database Server Monitor category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the SQL Server database monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the database.

-     Name: Enter the name of the database.

-     Description: Enter a description for the database. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is SQL SERVER.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Monitor Port: Enter the monitor port number of the SQL Server. The default value is 1433.

-     AuthN Type: Select an authentication mode. Options are SQL Server Authentication and Windows Authentication. The default authentication mode is SQL Server Authentication.

-     Username/Password: Specify the management user information used for monitoring the SQL Server.

-     Instance Name: Specify the name of the SQL Server database instance.

-     Driver Type: Specify the driver type. Options are jTDS JDBC Driver and Microsoft JDBC Driver. The default authentication mode is jTDS JDBC Driver.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the database connectivity.

6.     Click OK.

Edit a database monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Database.

3.     Click the Edit icon  in the Actions column for the target database monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the database monitor.

5.     Click Test Connectivity to test the database connectivity.

6.     Click OK.

Middleware

U-Center 2.0 supports monitoring middleware such as Portal, application servers, Web servers, and mail servers. The system can monitor various types of middleware servers in terms of their CPU usage and memory usage, and can send a notification through the alarm module when a monitor index exceeds an alarm threshold.

Table 5 shows the middleware that can be monitored by U-Center 2.0.

Table 5 Supported middleware

Monitor Category

Model

Middleware/Portal Monitor

ActiveMQ, Etcd, Flume, H3C SDN, Hadoop, Kafka, Oracle GoldenGate, RabbitMQ, TongLINK/Q, Tuxedo, WebSphere MQ, Zookeeper

Application Server Monitor

Apusic Server, .NET Server, GlassFish Server, JBoss Server, Jetty, Lotus Domino Server, Lync 2013 Server, Resin, Solr, Tomcat Server, Tongweb Server, Wildfly Server, WebLogic Server, WebSphere Server

Web Server Monitor

Apache Server, IIS Server, Nginx Server, PHP

Mail Server Monitor

Exchange 2010, Exchange 2016, POP3, SMTP

 

Add a middleware monitor

This section takes H3C SDN middleware as an example to illustrate how to add middleware monitors.

To add a middleware monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Middleware.

3.     Click Add to select H3C SDN type in the Middleware/Portal Monitor category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the H3C SDN middleware monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the middleware.

-     Name: Enter the name of the middleware.

-     Description: Enter a description for the middleware. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is H3C SDN.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Username/Password: Specify the management user information used for monitoring the H3C SDN middleware.

-     Monitor Port: Enter the monitor port number of H3C SDN. The default value is 8080.

-     Protocol: Specify the protocol. Options are HTTP and HTTPS.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the middleware connectivity.

6.     Click OK.

Edit a middleware monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Database.

3.     Click the Edit icon  in the Actions column for the target middleware monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the middleware monitor.

5.     Click Test Connectivity to test the middleware connectivity.

6.     Click OK.

Other resources

U-Center 2.0 supports monitoring other resources such as HTTP services and LDAP services, detecting service availability, and can send a notification through the alarm module when a monitor index exceeds an alarm threshold.

Table 6 shows other resources that can be monitored by U-Center 2.0.

Table 6 Supported other resources

Monitor Category

Model

HTTP Service Monitor

Linux Remote Curl, URL

LDAP Service Monitor

Active Directory, LDAP

Service Monitor

H3C Cloud AI, Linux Custom, DNS Monitor, H3C Oasis Data Platform, H3C Oasis Integration Platform, H3C Workspace, JavaRuntime, Linux Remote Netcat, Linux Remote Telent, CloudOS MQS, H3C Oasis Digital Plat, Ping Test Monitor, Ping Command, TCP Port

File/Directory Monitor

Directory, File

 

A Uniform Resource Locator (URL) is an address that identifies a Web page or other resources, as described in RFC 1738. The resources provided by HTTP services can be accessed by using URLs. For example, you can enter URLs to access pages that require no authentication or redirection to display contents.

 

IMPORTANT

IMPORTANT:

·     To monitor a domain name such as www.aabb.com, you need to obtain the associated IP address for the monitored object.

·     To monitor the only root path, you only need to enter a slash (/) for the relative path.

 

Add a resource monitor

This section takes URL as an example to illustrate how to add resource monitors.

To add a resource monitor:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Other Resources.

3.     Click Add to select URL type in the HTTP Service Monitor category.

4.     On the page that opens, specify the basic information, monitor parameters, access parameters, resource group, and other information for the URL resource monitor:

¡     In the Basic Info area, configure the following parameters:

-     IP Address: Enter the IP address of the resource.

-     Name: Enter the name of the resource.

-     Description: Enter a description for the resource. This field is optional.

¡     In the Monitor Parameters area, configure the following parameters:

-     Monitor Template: Specify the monitor template. You can use the default monitor template. Alternatively, you can click Settings, in the dialog box that opens, select an existing template or click Add to add a target template of the specified type.

-     Enable Config Poll: Select whether to add configuration polling settings when adding a monitored object.

-     Select Agent: Specify the management station to be monitored. The local-level environment applies by default. You can also use a lower-level management station of another proxy type.

¡     In the Access Parameters area, configure the following parameters:

-     Monitoring Protocol: Specify the monitoring protocol. The default protocol is URL.

-     Access Parameter Template: Specify an access parameter template. Click Settings. In the dialog box that opens, select an existing template, and then click OK.

-     Monitor Port: Enter the HTTP service port number in the requested URL. The default value is 80.

-     Protocol: Specify the protocol. Options are HTTP and HTTPS.

-     Domain Name: Specify the name of the domain to monitor in the URL.

-     Relative Path: Specify the relative path of the URL. The path must start with a forward slash (/).

-     Keyword: Specify the requested keywords in the URL.

¡     In the Resource Group area, specify the resource group to which the current resource belongs. This field is configurable only when you add a monitor. Click Settings, and select an existing resource group in the dialog box that opens.

¡     In the Others area, select whether or not to enable detection. If you enable detection, the system checks whether it can connect to the monitor, which might slow down the monitor adding speed or cause adding failure.

5.     Click Test Connectivity to test the resource connectivity.

6.     Click OK.

Edit a resource monitor

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Basic Monitor > Other Resources.

3.     Click the Edit icon  in the Actions column for the target resource monitor.

4.     On the page that opens, edit the basic information, monitor parameters, access parameters, and other information for the resource monitor.

5.     Click Test Connectivity to test the resource connectivity.

6.     Click OK.

More operations

You can perform the following generic operations on resource monitors:

·     Enable Monitor: For objects that are not monitored, enable monitors for them, so the system can collect data for the monitor indexes.

¡     Bulk enable monitors: Select one or more objects and then click Enable Monitor.

¡     Enable a monitor: Click the Enable Monitor icon  in the Actions column for the object.

·     Disable Monitor: After you disable monitors for specific objects, the system will stop data collection for the objects.

¡     Bulk disable monitors: Select one or more monitors and then click Disable Monitor. Then click OK in the confirmation dialog box that opens.

¡     Disable a monitor: Click the Disable Monitor icon  in the Actions column for the monitor, and then click OK in the confirmation dialog box that opens.

·     Sync: The system periodically collects index data based on the monitor template settings. Operators can use the synchronization function to immediately start data collection for monitor indexes without waiting for the data collection interval.

¡     Bulk synchronize monitors: Select one or more monitors and then click Sync.

¡     Synchronize a monitor: Click the Sync icon  in the Actions column for the monitor.

·     Enable Config Poll: You can configure this setting for the objects that are not monitored. The system will poll indexes for the objects. To bulk enable config polls, select one or more objects, and then click More Actions > Enable ConfPoll.

·     Disable Config Poll: After you disable the setting for certain objects, the system will stop polling indexes for the objects. To bulk delete config polls, select one or more config polls, click More Actions > Disable ConfPoll, and then click OK in the confirmation dialog box that opens.

·     Change Monitor Template: You can specify a monitor template when adding a monitor. The system uses the specified monitor template to collect data of the specified index group. You can change the monitor template for a single resource or bulk change the monitor template for resources.

¡     To change the monitor template for a single resource, click  in the Actions column for that resource.

¡     To bulk change the monitor template for resources, access the monitor list, and select multiple resources of the same type. Click More Actions > Change Monitor Template, select a different monitor template for the resources, and click OK.

·     Change Access Parameter Template: You can specify an access parameter template when adding a monitor. The system uses the specified access parameter template to access the monitored object. You can change the access parameter template to edit access parameters for monitors in bulk, including monitors with no access parameter template specified when they are added. To bulk change access parameter templates, select one or more monitors of the same type, click More Actions > Change Access Parameter Template, and then select a new access parameter template and click OK in the confirmation dialog box that opens.

·     Add Maintenance Tag Task: The system schedules a maintenance tag task based on the task settings including data collection, trap generation, trap-to-alarm upgrade, and alarm forwarding. To bulk add maintenance tag tasks, select one or more monitors of the same type and click More Actions > Add Maintenance Tag Task. In the window that opens, specify the name, scheduling type, start time, end time, and description, and then click OK. For more information about maintenance tag tasks, navigate to the Monitor Settings > Maintenance Tag Tasks > Resource Tasks page.

·     Import Monitors: You can bulk import monitors to the system by uploading a file.

¡     Import Monitors: Click More Actions > Import > Import Monitors. In the window that opens, click Choose to select a file, and then click Upload. For more information about file format, see Download Template.

¡     View Operation Results: To view import operation results, click More Actions > Import > View Operation Results. On the page that opens, you can view the result for the current or the last import operation. The system refreshes the import result page every 5 seconds for an ongoing import operation. By default, the last import result can be retained for a maximum of one hour.

¡     Download Template: Click More Actions > Import > Download Template > Excel File or Zip File to download the target template file. Enter required parameters in the file, and then click Import Monitors to upload the file.

·     Export Monitors: This function allows you to export key access parameter information. The passwords in the exported information will be encrypted.

¡     Export Selected: Select one or more monitors in the list, and then click More Actions > Export > Export Selected to export the monitors in Excel or ZIP format. In an export operation, you can export only one type of monitors in an Excel file or multiple types of monitors in a ZIP file.

¡     Export All(without CP) or Export All(with CP): Click More Actions > Export > Export All(without CP) or Export All(with CP) to export all resources of the category in the monitor list in Excel or ZIP format. In an export operation, you can export only one type of monitors in an Excel file or multiple types of monitors in a ZIP file.

·     Cancel Maintenance Tag Task: You can cancel the maintenance tag task for a monitored object. To cancel a maintenance tag task, click the Cancel Maintenance Tag Task icon  in the Actions column for a monitor, select the task, and then click OK. The task list is empty if no maintenance tag tasks exist for the monitor.

Monitor options

Agent management

This function allows you to manage agents, view agent installation instructions, download agent installation packages, view information about installed agents, remotely enable or disable agent monitor, delete installed agents, and view applications on agents.

Search for agents

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Perform basic search or advanced search for installed agents:

¡     Basic search: In the upper right corner of the page, enter a host IP in the search box and then click the Search icon  to filter agents with this IP address.

¡     Advanced search: In the upper right corner of the page, click the Advanced Search icon  next to the search box to expand the advanced search area. Specify the filter criteria and then click Search to view information about matching agents.

Install an agent

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Click Install. On the page that opens, you can view the agent installation instructions, including procedures, necessary tools, and installation package download links for local installation and remote installation respectively.

4.     Follow the installation procedures to install the agent.

View agent details

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Click the IP address in the Host IP column for the target agent. On the page that opens, you can view the details about the agent, including host IP, host type, installation path, and log path.

View agent application details

To view details about an application running on an agent:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Click the icon of the target application in the Applications column for the agent to view details about the application.

Synchronize an agent

To synchronize the process status information of an agent:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Click the Synchronize icon  in the Actions column for the target agent.

Delete agents

·     Delete a single agent:

a.     On the top navigation bar, click Monitor.

b.     From the navigation pane, select Monitor Options > Agent Management.

c.     Click the  icon in the Actions column for an agent, and then click OK in the confirmation dialog box that opens.

This operation will remove the processes, registry entries, and installation packages of the agent from the monitored host. After deletion, the result is displayed on the page.

·     Bulk delete agents:

a.     On the top navigation bar, click Monitor.

b.     From the navigation pane, select Monitor Options > Agent Management.

c.     Select one or more agents from the list, and click Delete. In the dialog box that opens, click OK.

Export agents

·     Export all agents:

a.     On the top navigation bar, click Monitor.

b.     From the navigation pane, select Monitor Options > Agent Management.

c.     Click Export and select Export All to export all agent resources as an Excel file.

·     Export the selected agents:

a.     On the top navigation bar, click Monitor.

b.     From the navigation pane, select Monitor Options > Agent Management.

c.     Click Export and select Export Selected to export the selected agent resources on the list as an Excel file.

Add monitors

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Select the agents to be added to the system monitors.

4.     Click Add Monitor to add the default operating system monitors automatically with the default operating system monitor template for the selected agents on this page.

Remove monitors

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Agent Management.

3.     Select the agents to be removed from the operating system monitor.

4.     Click Remove Monitor to remove all monitors automatically for the selected agents on this page.

Monitor templates

This feature implements centralized, template-based monitor setting management. This feature also provides template-based monitor index selection, threshold settings, and collection interval settings. You can select monitor templates in the monitor and auto discovery components.

 

 

NOTE:

The operations that an operator can perform for a monitor template depend on the operator permissions. For example, if an operator has the view permissions but not the edit permissions to a monitor template, the operator can view the monitor template but cannot edit the monitor template.

 

Add a monitor template

Perform this task to add monitor templates for different resources.

To add a monitor template:

1.     On the top navigation bar, click Monitor.

2.     From the left navigation pane, select Monitor Options > Monitor Templates.

3.     Select a template type in sequence and then click Add or directly click Add.

The Add Monitor Template page opens.

4.     Configure the following parameters in the Basic Info area:

¡     Template Name: Enter a name for the template. The template name must be unique among all templates of the same type.

¡     Template Type: Specify the template type to which the template belongs. This field is configurable only for an add operation.

¡     Template Description: Optional. Enter a description for the template as needed.

¡     Resource Group: Specify the resource groups to which the template belongs. This field is configurable only for an add operation. Click Select. On the window that opens, select resource groups.

5.     Configure index groups for the template: On the Index Settings tab, configure index groups for the template.

¡     Add index groups: Click Add. In the dialog box that opens, select the desired index groups. Click OK.

¡     Delete index groups:

-     Bulk delete index groups: Select the target index groups and then click Delete. Click OK in the confirmation dialog box that opens.

-     Delete a single index group: Click the Delete icon  in the Actions column for the index group to be deleted. Click OK in the confirmation dialog box that opens.

¡     Edit the data collection interval:

-     Bulk edit the data collection interval for multiple index groups: Select the target index groups, and then click Edit Collection Interval. In the dialog box that opens, set the data collection interval for the selected index groups and click OK.

-     Edit the data collection interval for a single index group: Click the Edit Collection Interval icon  in the Actions column for the target index group. In the dialog box that opens, set the data collection interval and click OK.

6.     Configure threshold settings on the Threshold Settings tab.

¡     Add threshold settings: Click Add. In the dialog box that opens, configure parameters as needed. Click OK.

-     Threshold Type: Options are Common Threshold, Index-Based Rule, Instance Loss Threshold, and Composite Threshold.

-     Applicable Time: Applicable time for the threshold. Options are All Time and Custom Time. To customize the applicable time, select the day of week and time range and then click Add.

-     Entrance Settings: If you select the index-based rule threshold type, you must configure entrance settings. If the index group of the monitor instance matches the entrance settings, the rule-based threshold settings will be applied. In this case, the common threshold settings for the index group will no longer take effect.

-     Thresholds Settings: If you select the common threshold, index-based rule, or composite threshold type, perform the following tasks: Select the index group and index, select the operator, and select the alarm levels you want to enable and set the alarm threshold and required threshold-violation count (occurrences) for triggering an alarm of each level.

¡     Edit a threshold: Click the Edit icon  in the Actions column for a threshold. In the dialog box that opens, edit the threshold settings. Click OK.

-     Alarm Level: Options are Notification, Warning, Minor, Major, and Critical.

-     Occurrences: Maximum number of consecutive threshold violations for triggering alarms.

¡     Set time: Click Set Time. In the dialog box that opens, select all time or select custom time and set the time, and click OK.

¡     Delete threshold settings: Click Delete to delete threshold settings for an existing non-availability index group.

When adding a monitor template, follow these restrictions and guidelines:

·     An index group configured with thresholds cannot be deleted.

·     Before configuring thresholds, first specify the indexes to be monitored.

·     You can customize the applicable time for the server, storage, virtualization, container, operating system, database, middleware, and others monitor templates. By default, the applicable time for the others monitor templates is All Time.

·     Collectors for configuration polling are not displayed for the server, storage, virtualization, container, operating system, database, middleware, and others monitor templates.

·     If you select the instance loss threshold type, perform the following tasks:

a.     Select the index group and index.

b.     Set the maximum number of consecutive instance losses.

c.     Select the alarm level you want to enable.

Only one level can be configured for the instance loss threshold.

Edit a monitor template

Perform this task to edit a monitor template for resources.

To edit a monitor template:

1.     On the top navigation bar, click Monitor.

2.     From the left navigation pane, select Monitor Options > Monitor Templates.

3.     Click the Edit icon  in the Actions column for a monitor template.

4.     Edit the monitor template settings (for example, the collection interval and indexes) as needed.

 

 

NOTE:

After a monitor template is successfully edited, the edited monitor template is automatically applied in the next collection interval.

 

Edit threshold settings

1.     On the top navigation bar, click Monitor.

2.     From the left navigation pane, select Monitor Options > Monitor Templates.

3.     Click the Edit Thresholds  icon in the Actions column for a monitor template. Edit the threshold settings for the monitor template.

Delete monitor templates

·     Bulk delete monitor templates:

a.     On the top navigation bar, click Monitor.

b.     From the left navigation pane, select Monitor Options > Monitor Templates.

c.     Select one or multiple monitor templates, and click Delete.

d.     In the confirmation dialog box that opens, click OK.

·     Delete a single monitor template:

a.     On the top navigation bar, click Monitor.

b.     From the left navigation pane, select Monitor Options > Monitor Templates.

c.     Click the Delete icon  in the Actions column for a monitor template.

d.     In the confirmation dialog box that opens, click OK.

 

 

NOTE:

You cannot delete monitor templates in use. To delete a monitor template in use, first remove the monitor template from applications using it. To view the applications using a monitor template, access the usage info tab on the monitor template details page.

 

Copy a monitor template

Perform this task when the monitor template to be created is highly similar to an existing monitor template.

To copy a monitor template:

1.     On the top navigation bar, click Monitor.

2.     From the left navigation pane, select Monitor Options > Monitor Templates.

3.     Click the Copy icon  in the Actions column for an existing monitor template.

The system automatically creates a new monitor template with settings (including the thresholds and collection interval) of the existing monitor template.

4.     Then, edit few parameters of the monitor template as needed.

View a monitor template

1.     On the top navigation bar, click Monitor.

2.     From the left navigation pane, select Monitor Options > Monitor Templates.

3.     Click the name of a monitor template on the monitor template list to open the details page for the monitor template.

On this page, you can view the basic information, usage information, and threshold information of the monitor template.

Indexes

From this menu, you can uniformly view and manage all monitor indexes in the system. On the index management page, you can configure level-2 classes, and customize index groups and indexes. On the left of the page, the resource type tree is displayed. On the right of the page, the index group information for the selected resource type is displayed.

When managing indexes, follow these restrictions and guidelines:

·     If a custom resource type has a custom template, the custom resource type cannot be deleted.

·     If the default template of a custom resource type is used by a monitor, the custom resource type cannot be deleted.

·     If a custom level-2 class has a custom resource type, the custom level-2 class cannot be deleted.

·     If a custom index group is used by a monitor template, the custom index group cannot be deleted.

·     For level-1 classes server, storage, virtualization, container, operating system, database, middleware, and others, you can add level-2 classes, add index groups, configure availability settings, configure auto discovery settings, and edit the resource type templates. To perform an operation, make sure the current operator has the corresponding permissions.

·     You can add indexes to level-1 class Network. After an index is added, if all indexes in the index group to which the index belongs have been configured in a monitor template, the index will be automatically added to the monitor template.

Add a level-2 class

Perform this task to add a level-2 class under an existing level-1 class.

To add a level-2 class:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Add icon  next to a level-1 class, and enter the class identifier and name in the dialog box that opens.

The class identifier of a level-2 class cannot be edited after the level-2 class is added.

4.     Click OK.

Add a resource type

Perform this task to add a resource type to an existing level-2 class.

To add a resource type:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Add icon  next to a level-2 class.

The page for adding a resource type opens.

4.     Configure the information, availability index group, and key parameters for the resource type.

5.     Click OK.

After adding a resource type, you can monitor and manage applications of the resource type.

Add an index group

Perform this task to add an index group to an existing resource type.

To add an index group:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click a specific resource type on the left tree.

4.     Click Add on the right of the page to access the page for adding an index group.

5.     Configure basic information, indexes, and collection protocols for the index group.

For more information, see the help for adding an index group.

6.     Click OK.

For a monitor to use the added index group, configure the index group in the corresponding monitor template.

Configure availability settings

Perform this task to edit the index group of an existing resource type.

To configure availability settings:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click a specific resource type on the left tree.

4.     Click Availability Settings on the right.

5.     On the page that opens, edit the availability index group for the resource type.

For more information, see the help for configuring availability settings.

6.     Click OK.

Configure auto discovery settings

After you add a resource type that supports auto discovery, you can configure the auto discovery index group for the resource type.

To configure auto discovery settings:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click a specific resource type on the left tree.

4.     Click Auto Discovery Settings on the right.

5.     On the page that opens, configure the auto discovery index group for the resource type.

6.     Click OK.

Edit a resource type template

Perform this task to orchestrate the indexes for an existing resource type.

To edit a resource type template:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click a specific resource type on the left tree.

4.     Click Edit Resource Type Template on the right.

5.     On the page that opens, orchestrate the indexes for the resource type.

Add an index

Perform this task to add an index of an existing resource type.

To add an index:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Add icon  in the Actions column for an index group.

4.     Configure the index parameters as needed.

5.     Click OK.

Edit a level-2 class

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Edit icon  next to a level-2 class.

4.     Edit the name of the level-2 class.

5.     Click OK.

Edit a resource type

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Edit icon  next to a resource type.

The page for editing the resource type opens.

4.     Configure the information, availability index group, and key parameters for the resource type.

5.     Click OK.

Edit an index group

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Edit icon  in the Actions column for an index group to access the page for editing the index group.

4.     Configure basic information, indexes, and collection protocols for the index group.

5.     Click OK.

After an index group is edited, the edited index group will be automatically applied in the next collection interval.

Edit an index

Perform this task to edit an existing index in an index group.

To edit an index:

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Edit icon  in the Actions column for an index to access the page for editing the index.

4.     Configure the index parameters as needed.

5.     Click OK.

After an index is edited, the edited index will be automatically applied in the next collection interval.

Delete a level-2 class

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     When a level-2 class does not have resource types, click the Delete icon  for the level-2 class on the list.

4.     In the confirmation dialog box that opens, click OK to delete the level-2 class.

Delete a resource type

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Delete icon  next to a resource type.

4.     In the confirmation dialog box that opens, click OK to delete the resource type.

Delete an index group

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Delete icon  in the Actions column for an index group.

4.     In the confirmation dialog box that opens, click OK to delete the index group.

Delete an index

1.     On the top navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Indexes.

3.     Click the Delete icon  in the Actions column for an index.

4.     In the confirmation dialog box that opens, click OK to delete the index.

Maintenance tag tasks

You can create maintenance tag tasks for resources such as servers, storage, virtualization, container, operating system, database, middleware, and other resources. In addition, you can configure parameters for the system to perform relevant actions on the resources.

Add a maintenance tag task

To maintain or stop a resource, you can configure a maintenance tag task.

To add a maintenance tag task:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Maintenance Tag Tasks > Resource Tasks.

3.     Click Add. Configure basic information:

¡     Name: Enter a maintenance tag task name. The task name cannot exceed 32 characters, and can contain only Chinese characters, digits, letters, asterisks (*), pound signs (#), hyphens (-), underscores (_), and slashes (/).

¡     Scheduling Type—Select a scheduling type. Options include Periodic and One-Off.

-     A one-off task is executed only once according to the start time and end time.

-     A periodic task is executed periodically in the selected period according to the start time and end time.

¡     Start Time: Select the start time of the task. The start time cannot be earlier than the current server time or local time, or later than the end time.

¡     End Time: Select the end time of the task. The end time cannot be earlier than the current server time, local time, or start time.

¡     Scheduling Interval: Select a scheduling interval. Options include Day, Every Week, and Every Month.

¡     Execution Time: Select a specific day, start time, and end time within the selected scheduling interval. You can click the Add or Delete icon to configure the execution time.

¡     Description: Enter the description of the task. The description cannot exceed 200 characters.

4.     In the Resource List area, click Select to select resources on the page that opens.

5.     Click OK.

6.     You can perform the following operations on maintenance tag tasks:

¡     To copy a task, click the Copy icon  in the Actions column for a task, and then edit the task parameters (such as task name) as needed.

¡     To edit a task, click the Edit icon  in the Actions column for a task, and then edit the task settings as needed.

¡     To delete a task, click the Delete icon  in the Actions column for a task, and then click OK in the dialog box that opens.

¡     To suspend an ongoing task, click the Pause icon  for the task. You cannot suspend a task that has been completed.

¡     To resume a suspended task, click the Resume icon  for the task.

Configure resource maintenance tag tasks

To configure the global settings for resource maintenance tag tasks:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Maintenance Tag Tasks > Resource Tasks.

3.     Click the Settings tab and configure the following parameters:

¡     Data Collection: Enable or disable data collection of the monitored devices.

¡     Trap Generation: Enable or disable trap generation for data not in the threshold range.

¡     Trap-to-Alarm Upgrade: Enable or disable the upgrade of trap messages to alarm messages.

¡     Alarm Forwarding: Enable or disable the forwarding of alarm messages.

4.     Click OK to save the settings.

Filter maintenance tag tasks

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Maintenance Tag Tasks > Resource Tasks.

3.     Click the Resources tab, and configure the filter criteria, such as resource name, resource type, or resource IP.

4.     Click Search. The matching resources will be displayed in the Resource List area. In the Resource List area, click the task name link in the Task column for a resource to view the task details.

Parameter Settings

This function allows you to configure parameters for monitors, such as server, storage device, operating system, virtualization, container, database, middleware monitors, and monitors of other resource type.

To configure monitor parameters:

1.     On the top network navigation bar, click Monitor.

2.     From the navigation pane, select Monitor Options > Parameter Settings.

3.     Configure data retention time settings:

¡     Raw Data Retention Days (1-60): Enter an integer in the range of 1 to 60. The default value is 30.

¡     Hourly Data Retention Months (1-6): Enter an integer in the range of 1 to 6. The default value is 3.

4.     Click OK.

5.     Specify whether to trigger alarms after manual recovery. Options are On and Off. The default setting is On.

6.     Click OK.

Server logs

Server logs include event logs, HPE integrated management logs, and log-to-alarm rules. You can customize log settings and log upgrade rules as required.

Event logs

This feature displays the logs for various system events, such as the power supply, system startup, and system firmware operations. You can also upgrade these logs to alarms and define rules for the upgrade.

Perform log-to-alarm upgrade

Perform this task to specify the alarm severity, description, and upgrade rule for system event logs of the servers.

1.     On the top navigation bar, click Monitors.

2.     From the navigation pane, select Server Logs > Event Logs.

3.     Click the Log-to-Alarm Upgrade icon  in the Log-to-Alarm Upgrade column for a log entry.

4.     In the dialog box that opens, set the alarm severity and description, and select On/Off to determine whether to generate an upgrade rule. Then, click OK.

¡     If you select Off, the system generates an alarm immediately after you finish the configuration.

¡     If you select On, the system opens the log-to-alarm rule configuration page for the event. The rule type is Event Logs. For more information about configuring other parameters, see "Add or edit a log-to-alarm rule." After you finish the rule configuration, the system displays the rule in the log-to-alarm rule list and generates an alarm for the event log.

HPE integrated management logs

This feature allows you to view logs for the history events (such as system ROM or iLO monitor events) on servers. You can upgrade such logs to alarms or add new log-to-alarm rules for such events.

Perform log-to-alarm upgrade

1.     On the top navigation bar, click Monitors.

2.     From the navigation pane, select Server Logs > HPE Integrated Management Logs.

3.     Click the Log-to-Alarm Upgrade icon  in the Log-to-Alarm Upgrade column for a log entry.

4.     In the dialog box that opens, set the alarm severity and description, and select On/Off to determine whether to generate an upgrade rule. Then, click OK.

¡     If you select Off, the system generates an alarm immediately after you finish the configuration.

¡     If you select On, the system opens the log-to-alarm rule configuration page for the event. The rule type is HPE Integrated Management Logs. For more information about configuring other parameters, see "Add or edit a log-to-alarm rule." After you finish the rule configuration, the system displays the rule in the log-to-alarm rule list and generates an alarm for the HPE integrated management log.

Log-to-alarm rules

You can customize rules as required by services to upgrade server event logs or HPE integrated management logs to alarms. The system automatically upgrades logs that match the rules to alarms.

Add or edit a log-to-alarm rule

Perform this task to add or edit a log-to-alarm rule. The system automatically upgrades event logs or HPE integrated management logs that match the rule to alarms.

1.     On the top navigation bar, click Monitors.

2.     From the navigation pane, select Server Logs > Log-to-Alarm Rules.

3.     Click Add or click the Edit icon  in the Actions column for the rule.

4.     On the page that opens, configure the following parameters:

¡     In the Basic Info area, set the rule name and enter a description for the rule.

¡     In the Rule Type Settings area, set the rule type and log severities. Options for rule types are HPE Integrated Management Logs and Event Logs. Options for log severities are Major and Critical.

¡     In the Match Rule Settings area, select a match method for keyword filtering and enter keywords for matching.

¡     In the Alarm Source Settings area, specify the alarm source servers. Options include All Servers and User-defined Servers. If you select User-Defined Servers, you can click Select to select servers.

¡     In the Alarm Settings area, set the alarm severity and alarm enabling status. If the status is On, the system automatically upgrades logs that match the rule to alarms.

5.     Click OK.

View log-to-alarm rule details

1.     On the top navigation bar, click Monitors.

2.     From the navigation pane, select Server Logs > Log-to-Alarm Rules.

3.     Click the rule name of the target rule.

Enable a log-to-alarm rule

1.     On the top navigation bar, click Monitors.

2.     From the navigation pane, select Server Logs > Log-to-Alarm Rules.

3.     Click Off in the Status column for the rule to switch the rule status to On.

Disable a log-to-alarm rule

1.     On the top navigation bar, click Monitors.

2.     From the navigation pane, select Server Logs > Log-to-Alarm Rules.

3.     Click On in the Status column for the rule to switch the rule status to Off.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网