Tideway Knowledge Update 2009-Aug-1
- Release Compatibility
- Download
- Contents of the Knowledge Update
- Installation and Upgrade
- TKU Core
- Product Lifecycle Patterns
- Hardware Reference Data
The Tideway Knowledge Update 2009-Aug-1 (TKU 2009 August) is a deliverable for Tideway Foundation platform version 7.2 and later.
Release Compatibility
TKU 2009-Aug-1 has been tested and verified against Tideway Foundation version 7.2 / 7.2.1.
Download
Customers can access this TKU release from the Tideway Downloads site and then clicking Download Area->latesttku. If you're a customer or partner and don't already have a login to this site or have forgotten yours please contact support@tideway.com.
Contents of the Knowledge Update
The Tideway Knowledge Update comprises four main components:
- Core - Patterns that model various software products
- Database detail - Patterns that extend some of the core database patterns to obtain additional detailed information about certain databases
- Product Lifecycle - Patterns that populate Foundation with information about End-of-Life, End-of-Support, and End-of-Extended-Support for versions of certain host Operating Systems as well as versions of certain software products
- Hardware Reference Data - Patterns and data import CSV file that populate Foundation with power and heat consumption figures for various hosts.
To see some of the highlights of this release visit the August In The Spotlight Page
Installation and Upgrade
Installation and upgrade instructions are provided here.
A matrix covering ALL commands executed and ALL files retrieved by the patterns is available to our customers from the Tideway Downloads site
TKU Core
New Software Instance Patterns
Vendor | Product | Category | Platforms | Instances | Versioning | Module |
---|---|---|---|---|---|---|
CA | Unicenter DSM | Change and Configuration Software | UNIX, Windows | Y | Y | |
CA | NSM | Performance Management Software | UNIX, Windows | Y | Y | |
HP | Application Security Center - Web Inspect | Security and Vulnerability Management Software | Windows | Y | Y | |
HP | Discovery Dependency Mapping | Change and Configuration Software | Windows | Y | Y | |
IBM | General Parallel File System (GPFS) | File System Software | UNIX, Windows | N | Y | |
IBM | InfoSphere Information Analyzer | End-User Query, Reporting, and Analysis | UNIX, Windows | Y | Y | |
IBM | Tivoli OMEGAMON | Event Automation Tools | UNIX, Windows | Y | Y | |
IBM | PureEdge Webform Server | Software Construction Components | Windows | Y | Y | |
IBM | Tivoli Data Warehouse | Relational Database Management Systems | UNIX, Windows | Y | Y | |
IBM | Tivoli Netcool Security Manager | Identity and Access Management | UNIX | Y | Y | |
IBM | WebSphere Transformation Extender | Integration Server Software Platforms | UNIX, Windows | Y | Y | |
Microsoft | Commerce Server | Order Management | Windows | Y | Y | |
Microsoft | System Center Data Protection Manager | Data Protection and Recovery Software | Windows | Y | Y | |
Microsoft | Office Groove Server | Integrated Collaborative Environments | Windows | Y | Y | |
Microsoft | PerformancePoint Server | End User, Query, and Reporting Analysis | Windows | Y | Y | |
Oracle | Financial Services | Sevices Operations Management - Finance | UNIX | Y | Y | |
Oracle | Vantive | Customer Relationship Management | UNIX, Windows | Y | N |
Enhanced Software Instance Patterns
Vendor | Product | Enhancement | SI Key Change | Pattern Module |
---|---|---|---|---|
CA | Software Change Manager | Agent pattern trigger made a bit less specific based on customer feedback, but code added to ensure that cross-matching would not lead to an increase in number of SIs created. | N | |
IBM | WebSphere Application Server | Application Server pattern: Added another method to extract product version and edition - if XPath method fails, regular expression parsing is used. Node Agent pattern: Added support for Windows platform Deployment Manager pattern: Added support for Windows platform | N | |
IBM | WebSphere Application Server | Additional patterns added to link the Node Agent with its managed Application Server in deployments of WebSphere Application Server Network Deployment edition. Additional patterns added to link the Deployment Manager with its managed Node Agents in deployments of WebSphere Application Server Network Deployment edition. | N | |
VMware | ESX Server | ESX Server v4 (vSphere 4) introduces tools to obtain license information via a command-line interface. The ESX Server pattern checks for presence of the command-line tool (/usr/bin/vmware-vim-cmd) and if the Foundation user is running with elevated privileges ('priv_execution' configuration option is set to 'true' and 'PRIV_RUNCMD' function has been defined in Foundation Discovery configuration), the pattern will run the command and parse the license information. Additionally, the pattern will no longer erroneously create a Software Instance on hosts where VMware Server 2.x is running. VMware Server 2.x introduced a number of changes in its architecture and now a process that is used by the ESX Server pattern as the trigger is also found in VMware Server 2.x installations. The ESX Server pattern now ensures that the host it has triggered on is actually an ESX Server host before continuing. | N | |
VMware | Virtual Machine Software | Additional information (value of 'guestOS' attribute) is parsed from the .vmx file for each VM. This information is stored as 'vm_guest_os' attribute on the VMware VM Software Instance. | N |
Bugs Fixed
The following bugs have been fixed in Tideway Knowledge Update 2009-Aug-1
Case No | Defect No | Details | Pattern Module |
---|---|---|---|
N/A | 12155 | Trigger for the ContentEngineServer pattern in IBM FileNet Content Manager module re-written to follow best-practice guidelines | |
21837 | 12156 | Problem: In certain cases, where licensing information has changed, the Symantec VERITAS Storage Foundation for Windows pattern could fail with ECA Engine error. Solution: Code fix in node maintenance code. | |
N/A | 12159 | HyperVConsolidateFromVirtualHost pattern (Microsoft Hyper V module) trigger improved. Now ensures that the Host node it has triggered on has 'serial' attribute set, making the pattern potentially a bit more efficient. | |
N/A | 12167 | ITMEnterpriseMonitoringServer and ITMEnterprisePortalServer patterns in IBM Tivoli Monitoring module will ensure that they continue only if it is IBM Tivoli Monitoring and not IBM Tivoli OMEGAMON installed. | |
N/A | 12171 | A minor issue with the algorithm used to link the BEA AquaLogic BPM SI to its related database has been found and fixed. The issue is unlikely to have has much effect in the past, as it was in the backup method and would only result in the failure to create a relationship and no other problems. | |
21874 | 12174 | Problem: Relationships between SupportDetail nodes and Host nodes (or SoftwareInstance nodes) would stay in place if the Host/SI node attributes related to product lifecycle changed but the product lifecycle patterns do not contain the data to create a mapping to a new SupportDetail node. E.g. Solaris 8 host upgraded to Solaris 10. Sun Microsystems have so far not published the End of Support dates for Solaris 10, hence SupportDetails nodes do not exist for Solaris 10. The host running Solaris 10 now is still linked to Solaris 8 Support Details node. Solution: Code fix to ensure that relationships are correctly maintained in these situations. | All Software and OS Lifecycle patterns |
N/A | 12184 | Execution of BMC Patrol 'pconfig.exe' command in PatrolAgent pattern is now user configurable and disabled by default as the execution of this command is often not allowed in production environment since it presents a potential security risk. NOTE: If this command is not executed, the pattern may not locate related BMC Performance Manager RTServers | |
21586 | 12218 | Problem: Apache Tomcat pattern uses as part of its key the command-line path and arguments (passed through an MD5 hash) to ensure that unique instances of the application server have been identified. A change in the command-line arguments is regarded as a change in the instance which would create a new SI while the original SI starts ageing. A recent change in a customer's environment where an additional command-line argument has been added has meant that new SI is created every time a Tomcat server has been restarted (and the old SI starting to age out of the model) leading to an unexpected increase in Apache Tomcat SIs. Solution: New algorithm has been implemented to create the SI key. The SI is now created using the following criteria:
This approach makes the model both more accurate as well as making the SI key less susceptible to minor changes in the trigger process args. The pattern has had its major version number incremented due to the changes to how the key is generated. | |
21586 | 12219 | Problem: Red Hat JBoss Rules pattern uses as part of its key the command-line path and arguments (passed through an MD5 hash) to ensure that unique installations of the libraries have been identified. A change in the command-line arguments is regarded as a change in the Software Instance which would create a new SI while the original SI starts ageing. A recent change in a customer's environment where an additional command-line argument has been added has meant that new SI is created every time an application server using these libraries has been restarted (and the old SI starting to age out of the model) leading to an unexpected increase in Red Hat JBoss Rules SIs. Solution: New algorithm has been implemented to create the SI key group. The SI key group is now generated using the following criteria:
The pattern major version has been incremented since the mechanism for SI key creation has been updated. | |
21586 | 12230 | Problem: Red Hat Hibernate patterns use as part of their key the command-line path and arguments (passed through an MD5 hash) to ensure that unique installations of the libraries have been identified. A change in the command-line arguments is regarded as a change in the Software Instance which would create a new SI while the original SI starts ageing. A recent change in a customer's environment where an additional command-line argument has been added has meant that new SI is created every time an application server using these libraries has been restarted (and the old SI starting to age out of the model) leading to an unexpected increase in Red Hat Hibernate SIs. Solution: New algorithm has been implemented to create the SI key group. The SI key group is now generated using the following criteria:
The pattern major version has been incremented since the mechanism for SI key creation has been updated. | |
21586 | 12248 | Problem: BEA AquaLogic Enterprise Security pattern uses as part of its key the command-line path and arguments (passed through an MD5 hash) to ensure that unique installations of the product have been identified. A change in the command-line arguments is regarded as a change in the instance which would create a new SI while the original SI starts ageing. A recent change in a customer's environment where an additional command-line argument has been added has meant that new SI is created every time the WebLogic server running this product has been restarted (and the old SI starting to age out of the model) leading to an unexpected increase in BEA AquaLogic Enterprise Security SIs. Solution: AquaLogic Enterprise Security pattern has been updated to improve the SI model generated.
These changes ensure that the SI key is much less susceptible to minor changes in the trigger process args. The pattern major version has been incremented due to changes to the SI key creation. |
Product Lifecycle Patterns
You can use Tideway Foundation and OS / Software product lifecycle data to:
- Identify operating systems and software that are exposed to security / stability risks as they are no longer supported by patch updates
- Identify operating systems and software that you may may be paying a premium maintenance subscription for
- Identify operating systems and software that are no longer shipping so may increase costs and risks associated with variance
Operating System Product Lifecycle Patterns
TKU 2009-Aug-1 includes product life cycle patterns providing End Of Life, End Of Support and End Of Extended Support dates for:
- 11 publishers
- 17 operating systems
- 177 operating system versions
Go to the OS-Product-Life-Cycle-Patterns-TKU-2009-Aug-1 page for a full list of products included in this release.
Software Product Lifecycle Patterns
This TKU includes product life cycle patterns providing End Of Life, End Of Support and End Of Extended Support dates for:
- 33 publishers
- 208 software products
- 1,204 software product versions
Go to the Software-Product-Life-Cycle-Patterns-TKU-2009-Aug-1 page for a full list of products included in this release.
Hardware Reference Data
You can use Tideway Foundation hardware reference data to:
- Identify servers that can be expanded in situations where space is a constraining factor in the data center
- Identify server refresh / rationalization candidates in situations where cooling is a constraining factor in the data center
- Identify server refresh / rationalization candidates in situations where power is a constraining factor in the data center
This TKU includes hardware reference data providing Rack Size, Power Consumption, Heat Output and Maximum Memory capacity for:
- 9 manufacturers
- 401 server models
- 1,166 server model configurations
Go to the Hardware-Reference-Data-TKU-2009-Aug-1 page for a full list of products included in this release.