Getting started for system administrators

For customers getting started with TrueSight Middleware and Transaction Monitor (TMTM), this topic describes the various steps system administrators have to take in order to have TMTM up and running for users.


StepDescription

Step 1: Planning

Determining what you need for TMTM to work in your environment

If you are planning a new deployment of TMTM, first determine your sizing requirements (together with BMC Support). Determine the technologies to be monitored, the number of objects to be monitored, the number of agents, service platform required (such as Windows or Linux), and so on. A recommendation is then given for the size of that server in regards to CPU and memory, in addition to the database required, in terms of CPU and memory, and how much space may be required based on how long you wish to retain history data.

We do not recommend installing service components on different machines. If this setup is required, contact BMC Support.

Note that during the installation of the TMTM product, you must choose the method in which to integrate the product with TrueSight Middleware Administrator (TSMA). The integration of the two products enables you to administer the same queue managers shown in the TMTM object repository from the TSMA console. When planning your deployment, you must determine the security and queue manager integration options for your environment.

Other factors you should consider that may have an impact on your planning sizing and environment:

Ensuring your environment meets our system requirements

While planning your deployment, ensure your environment is fully supported and meets our system requirements. Note that these requirements may differ according to the type of extensions you deploy (performance and availability or transaction monitoring).

If you (or your DBA) are responsible for database configuration, read the sections on Database performance recommendations and Database server requirements.

Making sure you have the relevant installation credentials

To ensure you have the correct installation credentials when installing TMTM (such as database connection information and the TSMA hostname and port (when integrating with TSMA)) download and fill out the worksheets in the provided Microsoft Excel workbook.

When filling out the installation worksheets, refer to the following topics in the Planning section: 

After you complete the installation worksheet, and you have completed the listed prerequisite tasks, you can install the product.

Step 2: Installing

Obtaining the installation files and preparing the environment

The product installation files are downloaded from the BMC Electronic Product Distribution (EPD) website using the direct download links in this section.

Your ability to access product pages on the EPD website is determined by the license entitlements purchased by your company. To understand which files you are entitled to download, access the license entitlements for your product

Ensure your environment is ready for installation by performing these additional pre-installation tasks:

Installing the TMTM components (and TSMA)

The following sections provide the relevant instructions for installing each of the TMTM and TSMA components:

After installing, make sure you start the relevant services.

Deploying your TMTM extensions and agents

Once you have installed the main TMTM components, access the Launch page in order to deploy the bootstrap package for your system (that contains the agent package and other common packages), which is the preferred way for distributing the files. Once deployed, see the relevant extension section in Running performance and availability monitoring extensions or Installing and running application transaction tracing (transaction monitoring) extensions for information on how to install, configure and run each extension.

You can also manually deploy the TMTM extensions and agents to computers on which the TMTM Agent and TMTM Configuration Service have been installed (in order for the package distribution to work correctly, the TMTM Agent must be installed and running).

Step 3: Configuring your installation

Determining your monitoring options

Once the main components are in place, you can use a number of methods to monitor the objects that TMTM monitors. These methods include:

All of these methods work when the objects have been discovered or previously registered for monitoring. Once registered for monitoring, object attribute values (such as statistics, state, etc.) are published by the relevant TMTM extensions. These published values can be viewed and presented in a variety of views and dashboards.

Managing TMTM agent preferencesThe Agent maintains a set of configuration preferences for itself and for extensions running on the agent server. The agentpref command line tool is included in the agent distribution for each platform and provides a means for displaying and changing these preferences. Common uses include viewing current preferences and setting the deployment interval for the TMTM Configuration Agent.
Creating the TSMA WMQ connection for queue managers

You need to create the WMQ Connection to ensure that the queue managers and objects registered for monitoring in TMTM can be managed and administered in TSMA.

Step 4: Setting up TMTM for users
Creating user accounts and security groups

Once your installation is configured, create user accounts and security groups that manage user access to TMTM functionality.

User and security settings are configured via the options on the Security tab in the Monitor Console.

Note that in TMTM, access permission is granted at a group level, with all members of the group inheriting all permissions granted to the group.

Defining monitoring policies

TMTM provides a set of out-of-the-box policies that contain general monitoring recommendations and which can be easily applied by users (as long as they are assigned the Access Policies Tab and Edit Policies permissions).

Because every environment is unique, you may want to copy and tweak the supplied policies; if so, see Policy architecture, which describes how policies are designed. You can also create your own policies.

All policies are defined in the Policies tab of the Monitor Console.

Manage the product from the command lineAlthough you can navigate the user interface to perform most administrative tasks, you can also perform a number of tasks to manage and maintain the TMTM environment from the Command Line Interface (CLI). These CLI tools include options to export and import Monitor Console environmental components, manage integration with TSMA, and manage TMTM security information.

Was this page helpful? Yes No Submitting... Thank you

Comments