Configuring Microsoft Clusters
This topic provides information about configuring PATROL for Microsoft Cluster KM.
Cluster configuration video
Click to view a short video (4:36) of how to configure clusters for monitoring.
Configuration details
On the Add Monitoring Configuration window, set the following preferences:
Monitoring Solution | Monitor Profile | Monitor Type |
---|---|---|
Microsoft Windows Servers | Cluster Server | Cluster Monitoring |
Provide the following details:
Field | Description |
---|---|
Cluster Details | |
Cluster Name | Enter a cluster name or a comma-separated list of clusters for monitoring. A cluster instance is created with this name below the Microsoft Clusters container. If you have entered a comma separated list of clusters, they must have the same credentials. For example: |
User Name | Enter the user name to connect to the cluster. |
Password | Enter the password. |
Confirm Password | Re-enter the password for confirmation. |
WinRM Port | Enter the WinRM port number that would be used to communicate with the cluster. Default port number is 5985. |
Connection Protocol | Select the type of connection protocol. By default, this value is set to HTTP.
|
Filtering | |
Cluster Entity Filter Configuration: Click the Add button to add the configuration details. | |
Entity Type | Select the entity on which you want to apply the filters. The entities are specified as:
Filtering criteria can be for inclusion or exclusion. |
Include Criteria | Enter a name or a regular expression to include the entity (Roles or Resources or Shares) for monitoring. By default all roles and resources are included for monitoring, except shares. For example, |
Exclude Criteria | Enter a name or a regular expression to exclude the entity (roles or resources or shares) from monitoring and click OK. For example, |
Disable File Shares Monitoring | Select this check box to disable shares monitoring. By default, shares monitoring is disabled. Note: Clear this option to monitor and apply filtering of shares. |
Specify Resource Type to Exclude | Enter a comma-separated list of resource types to exclude from monitoring. For example, you can exclude Generic Application, Generic Service types of resources. The resource type names are case sensitive. |
Node OS monitoring | |
Node configuration: Click the Add button to add the configuration details. | |
Cluster Nodes | Enter a comma-separated list of cluster nodes for remote monitoring. |
Monitoring options | Specify one of the following options:
|
Advanced Monitor Configuration |
* indicates additional configuration is required for monitoring. |
Processor Configuration
Field | Description |
---|---|
Exclude Criteria | Enter a comma-separated list of processor instances that you want to exclude from monitoring. Wild card characters are not supported. For example: 0,1,2. If you leave this field blank, none of the CPU instances is excluded and the field is ignored. |
Include Criteria | Enter a comma-separated list of processor instances that you want to include for monitoring. Wild card characters are not supported. For example: 0,1,2. If you leave the field blank, all instances are monitored. |
Network Configuration
Field | Description |
---|---|
Exclude Criteria | Enter a comma-separated list of network interface instances that you want to exclude from monitoring. For example: Local Area Connection,6TO4 Adapter |
Include Criteria | Enter a comma-separated list of network interface instances that you want to include for monitoring. For example: Local Area Connection,6TO4 Adapter |
Physical Disk Configuration
Field | Description |
---|---|
Exclude Criteria | Enter a comma-separated list of physical disk instances to exclude from monitoring. For example: 0,1,2 |
Include Criteria | Enter a comma-separated list of physical disk instances to include for monitoring. For example: 0,1,2 |
Logical Disk Configuration
Field | Description |
---|---|
Exclude Criteria | Enter a comma-separated list of logical disk instances to exclude from monitoring. For example: C:,D:,E: |
Include Criteria | Enter a comma-separated list of logical disk instances to include for monitoring. For example: C:,D:,E: |
Page File Configuration
Field | Description |
---|---|
Exclude Criteria | Enter a comma-separated list of paging file instances that you want to exclude from monitoring. For example: _Total,C:\pagefile.sys. |
Include Criteria | Enter a comma-separated list of paging file instances that you want to include for monitoring. For example: _Total,C:\pagefile.sys. |
Process Configuration
Field | Description |
---|---|
List of Processes |
Click the Add button to configure the process manually. |
Process Specification | |
Configure Process Monitoring | |
Process Label |
Specify a label to identify a group of processes. The input that you specify must match the regular expression pattern, '^[0-9a-zA-Z_]+$'. |
Process Name | Specify a name or a regular expression pattern that matches the names of processes that must be monitored. Enter only the process name without extension. Example: If the process name is Notepad, enter Notepad. Do not enter Notepad.exe. |
Use Regular Expression for Process Name | Select this check box if you want to monitor all the processes that contain the process name specified. |
Process Arguments |
Specify the command line arguments for the processes that you want to monitor. Note:
Example: C:\Windows\system32\svchost.exe -k NetworkService |
Use Regular Expression for Process Argument | Select this check box to enter process command line arguments using regular expression pattern. |
Minimum Count | Specify a value so that an alarm is raised if the process count drops under this value. |
Maximum Count | Specify a value so that an alarm is raised if the process count rises above this value. |
Acceptable Process Owner | Specify a name or regular expression pattern that matches the name of the acceptable process owner. |
Use Process Owners for Filtering | Select this check box if you want to filter processes based on the process owners. |
Process Settings | |
Generate alarm on Process stop | Select this check box to generate an alarm when the process stops. |
Generate alarm on Process start | Select this check box to generate an alarm when the process starts. |
Restart Command |
Enter the command that would be used to restart a stopped process. |
Time to terminate runaway Process |
Enter the time for which a process is retained and not terminated when the CPU usage for the process exceeds the defined maximum CPU threshold. After the specified time, the process is terminated. The time that you enter must match the following regular expression pattern - ^[0-9]+$ . |
Automatic Process Monitoring | |
CPU Threshold in % | Specify the CPU threshold (in %) for automatic process monitoring. The value that you enter must match the following regular expression pattern - ^[0-9]+$ .By default, this value is set to 90. |
Time Duration in secs | Specify the time limit (in seconds) to start the automatic process monitoring. The input that you specify must match the regular expression pattern, '^[0-9]+$'. By default, this value is set to 300. |
Note
With 5.0.00 version, exclude operation is independent of the include operation. You can use Exclude Services to exclude objects, regardless of any include rules specified in the Include Services option.
You can now create a policy with Service Exclusions only.
Field | Description |
---|---|
Service Configuration | |
Disable Automatic Restart | Select this check box to disable automatic restart of the monitored services. |
Disable Alert For Paused Services | Select this check box to disable alerts for the paused services. |
List of Included Services | Click Add to add a list of services to monitor. |
Service Details | |
Generate an Alarm/Warning when service is stopped | By default, when a service is stopped, the PATROL Agent generates an alarm. However, for a particular service, you can specify a Warning instead. This feature is available for the services with a startup type of Automatic only. |
Alert State | Select one of the following options to define the type of alert that you want to raise when the service stops:
|
Restart service when stopped | Select this check box to restart a stopped service. |
Enable process monitoring for the services | Select this check box to monitor the process that are associated with the configured service. By default, the PATROL Agent monitors only whether services are available. To monitor how much memory and CPU a service executable consumes, you must enable process monitoring for the service. When you enable process monitoring, the PATROL Agent monitors the service executable process and displays the monitored process beneath the NT_SERVICE application. |
Use command line for non-responsive services | Select this check box to use command line and enter the command line in the Command line field. This option is used for the non-responsive services. |
Command line | Enter the command line name. |
Service Name | |
Service Name | Enter the display name or service name that you want to monitor. Use regular expressions for the display name only. If you enter the service name, clear the Use Display Name check box. The KM uses \| characters for OR operation instead of | character. Example:
|
Use Display Name | By default this check box is selected. If you have entered a service name in the Service Name field, clear this check box. |
Service Startup Type | |
Automatic |
Select this check box to monitor the services with Automatic Startup Type. This check box is enabled by default. Note If you are using BMC PATROL for Microsoft Windows Servers 5.1, use this check box for the following Startup Types - Automatic, Automatic (Trigger Start), and Automatic (Delayed Start). For BMC PATROL for Microsoft Windows Servers 5.1.10 and later, separate check boxes for trigger and delayed startup type services are provided. |
Automatic Delayed Start | Select this check box to monitor automatic delayed start type services. |
Automatic Trigger Start | Select this check box to monitor automatic trigger start type services. |
Manual | Select this check box to monitor the services with Startup Type as Manual, Manual (Trigger Start). This check box is enabled by default. |
Disabled | Select this check box to monitor the services with Startup Type as Disabled. |
Exclude Services | |
List of Excluded Services | Click Add to add a list of services that you do not want to monitor. |
Service Name | Enter the display name or service name that you want to monitor. Use regular expressions for the display name only. If you enter the service name, clear the Use Display Name check box. |
Use Display Name | By default this check box is selected. If you have entered a service name in the Service Name field, clear this check box. |
Event Log: Select this check box to enable Event Log monitoring. By default, all Windows event logs are monitored if they are registered in the Windows registry at the following location:
HKLM\SYSTEM\CurrentControlSet\Services\Eventlog
List of Event Logs: Click button to configure the event logs. |
|||
Log Name | Specify the event log name for which you want to create a filter. |
||
List of Filters: Click button to filter the event logs. | |||
Name | Enter a unique name that represents the event filter, and follows these rules:
|
||
Description | Enter a short description of the filter you are creating. This is additional information regarding the filter and you can change the description at any time. | ||
Report/Notify | Select one of the following options, as appropriate:
|
||
Source Details | Click button to configure the source name. | ||
Name | Specify the event log source name or a regular expression. | ||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. | ||
Use name as a regular expression | Select this check box if you specified a regular expression in the Name field. | ||
Disable case sensitivity | Select this check box to disable case sensitivity for the source filtering. You can specify whether to make filter comparisons in a case-independent manner for the source, user, category, and string options of a Windows event filter. To disable case-independent comparisons for any of the options, ensure that the corresponding Disable Case Sensitivity check box while configuring windows event monitoring is cleared. The /PSX_P4WinSrvs/PWK_PKMforMSWinOS_config/EventLogMonitoring/eventlog/EventFilters/filter/FilterDisableCase configuration variable stores information about case-sensitivity of the event filter options. This variable has five bit values, depending upon case sensitivity, one bit corresponding to each of Source, User, Category, String, and Computer name, respectively. If any bit value is 1, a case-independent filter comparison is made for the corresponding field. You can set this variable to either of the following values:
To disable case-sensitivity in the event filters, set the value of the FilterDisableCase configuration variable to 00000. |
||
Include/Exclude Source List | Select one of the following options, as appropriate:
|
||
Event Type Details | This option helps you to configure event details. | ||
Event Types to Monitor | Select one or more of the following event types to use in the filter for monitoring.
|
||
Consolidate event types when reporting |
|
||
Event ID Details | Click button to configure event ID details. | ||
Windows Event ID(s) | You can select one or more multiple IDs in the following ways:
|
||
Use Event ID as a regular expression | Select this check box if you specified a regular expression in the Windows Event ID(s) field. | ||
Include/Exclude Event ID List | Select one of the following options, as appropriate:
|
||
Event Handling | Choose how to handle your Windows events. | ||
Annotate Graph parameter with event details | Select this check box to annotate event details to Graph parameters. | ||
Write event details to a text parameter | Select this check box to add event details to text parameters. | ||
Use event details for a recovery action | Select this check box to enable using the event details for recovery actions. | ||
Report multiple events as a single event when the event occurs | Specify the number of events that must be reported as a single event depending on the value that you specify in the Time within seconds field. By default, this value is set to 1. |
||
Time within seconds | Specify the number of seconds that must be used for reporting multiple events as a single event. By default, this value is set to 0. |
||
Enter text automatic or Filter name to Acknowledge Alarm | Specify how you want to acknowledge the alarm raised by the event filter. You can specify one of the following values:
By default, this value is set to automatic. |
||
Advanced Properties | Click this tab to specify advanced properties for events. | ||
List of Users | Click | button to configure user details.||
---|---|---|---|
User Name | Specify the user name associated with the events that you want to monitor or exclude from monitoring. | ||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. | ||
Include/Exclude User List | Select one of the following options, as appropriate:
|
||
Disable Case Sensitivity | If you select this option, the event filter makes filter comparisons in a case-independent manner. | ||
List of Categories | Click button to provide category details for the events you want to monitor. |
||
Category Name | Specify the category name associated with the events that you want to monitor or exclude from monitoring. | ||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. | ||
Include/Exclude Category List | Select one of the following options, as appropriate:
|
||
Disable Case Sensitivity | If you select this option, the event filter makes filter comparisons in a case-independent manner. | ||
String Details | Click | button to provide string details associated with the events you want to monitor.||
Include String | Specify the string associated with the events that you want to include for monitoring. When entering a string that includes special characters that are used in regular expressions, such as a dollar sign ($), a period (.), a parenthesis (), or a slash (), you must escape each special character with a slash. For example, if the string is $Error, you must enter the string as \$Error. |
||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. | ||
Exclude String | Specify the string associated with the events that you want to exclude for monitoring. When entering a string that includes special characters that are used in regular expressions, such as a dollar sign ($), a period (.), a parenthesis (), or a slash (), you must escape each special character with a slash. For example, if the string is $Error, you must enter the string as \$Error. |
||
Disable Case Sensitivity | If you select this option, the event filter makes filter comparisons in a case-independent manner. | ||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. | ||
Close | Click this option to save your details | ||
Computer Details | Click to provide details regarding the computers associated with the events that you want to monitor. |
||
Computer Name | Specify the computer associated with the events that you want to monitor or exclude from monitoring. | ||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. | ||
Include/Exclude User List | Select one of the following options, as appropriate:
|
||
Disable Case Sensitivity | Select this check box to disable case sensitivity for computer comparison. | ||
OK | Click to save the configuration. | ||
Cancel | Click to close the dialog. |
For similar information about cluster monitoring, see the Remote Monitoring of a Windows Cluster using Patrol for Windows Servers discussion on BMC Communities.
Comments
Log in or register to comment.