On the Monitor Configuration page, click Add
to add a new monitor configuration, or select an existing monitor configuration and click Edit
to update it.
On the Add Monitor Types dialog, with the Monitoring Profile set to AIX Remote Monitoring, and the Monitor Type set to AIX Hosts, provide the following details:
| |
---|
|
---|
| Select this check box to disable local monitoring. |
Remote Host Configuration |
---|
| Specify the host name of the server in either of the following options: - Single host name or IP address.
- If you want to use the same configuration for multiple hosts, enter a comma separated list of host names or IP addresses with common credentials.
- If you want to use the same configuration for large number of hosts, you can configure the remote hosts from a file (.txt, .csv). Enter the absolute path to the file that includes a list of host names or IP addresses. For example, the file path can be /opt/bmc/BMCPatrolAgent/Patrol3/log/Production_lpars or $PATROL_HOME/log/Production_lpars.
The file must contain a list of comma separated host names or IP addresses  (with or without publish host names) that have common credentials. - The file must be located on the host which is running the PATROL Agent. BMC PATROL default account must have read permission on the directory where the file is located. The _ConfigStatus parameter indicates errors related to the input file.
- A combination of all the earlier options.
You can add a publish hostname to represent the host with different a hostname or, if the Fully Qualified Domain name of the remote host cannot be retrieved. The publish hostname can be added in <hostname>;<publish_hostname> format. This format can be used in any of the above options. |
| Enter the remote host SSH port number. By default, the port number is set to 22. |
Credentials configuration |
---|
| Enter the user name to connect to the remote host. If this field is left blank the KM uses PATROL Agent default account credentials to connect to the remote host. Password based authentication will be used for verifying the credentials. |
| Select the type of authentication to add the remote host. |
Password Based Authentication |
---|
| Enter the common credentials of the hosts added in the Host Names/File Path field. |
|
---|
| Specify the entire path of the public key file. |
| Specify the entire pathname of the private key file. |
| Specify the passphrase to access public and private keys. |
|
---|
| Select the type of monitoring. - Standard Monitoring
- Advance Monitoring
|
| Click this button to configure monitor types for the remote hosts added in the Host Names/File Path field. In the Advance Configuration dialog box, select one or more of the following objects, which you want to monitor. By default, CPU, memory and network monitor types are selected. - CPU
- Memory
- Kernel
- NFS
- Network
- Users
- Swap
|
|
---|
- Process: Select this check box to enable process monitoring on a list of given hosts.
- Process Configuration: Click this button provide process configuration details. The process configuration will be applied to all remote hosts added in Hosts Name/File Path field.
- Process default monitoring: Select this check box to enable default monitoring of processes for the given set of hosts. By default, the following processes will be monitored:
- cron
- named
- sendmail
- bind
- automount
- amd
- ypbind
- ypserv
- Enter the process details for monitoring the processes.
- Process details
- Process Label: Enter a display name for process (s) to be monitored. The display name (process label) cannot contain special characters ( . [ ! @ # $ % ? { } ^ \ \ / | + = & * ( ) ) ; ] ) and blank spaces. The label can contain a maximum of 100 characters.For example: Display name can be sshd_proc, patrolagent_proc. See process configuration examples.
- Monitored Process String: Enter a string that matches names of processes to be monitored. Input may also be a regular expression pattern. For example:
- The string can be /usr/sbin/sshd, Patrol.*
- To monitor PATROL Agent process running on port 3282 enter the regular expression as PatrolAgent -p 3282$. See process configuration examples.
- Minimum Count: Select a minimum limit for which an alert should be generated if the number of processes drops below the specified limit. See process configuration examples.
- Maximum Count: Select a maximum limit for which an alert should be generated if the number of processes exceed the specified limit. See process configuration examples.
- Acceptable process owner: Enter the name of the user who owns the process. Regular expressions are supported. See process configuration examples.
- Use Process Owners for Filtering?: Select this check box to filter processes based on the process owners. See process configuration examples.
- Parent Process ID Must Be 1: Select this check box if the processes should have their parent process id as 1.
- Filter Processes with Parent Process ID 1: Select this check box to filter the processes with parent process id as 1.
- Process Alert Options
- Alert Delay Count: Select the number of collection intervals after which the delay alert will be generated. See process configuration examples.
- Alert State: Select the type of process alert state.
- Add to List: Click this option for confirming the configuration information that you provided and adding the process name to the list of processes.
- Modify Selection: Select one of the items that you added to the list in the preceding step, and click this option to modify details.
- Remove from List: Select the items added earlier and click this option to delete that item from the list of configured processes and the clear the details provided in the earlier fields.
- Add: Click this option to add this monitoring configuration. This information is displayed on the Monitor Configuration page. After you click this option, you can continue to add more objects for monitoring.
- Reset: Click this option to clear off your configuration details and revert to default settings.
- Close: Click this option to exit without saving any changes.
The [expand] macro is a standalone macro and it cannot be used inline. Click on this message for details. This macro generates standalone content. As a consequence you need to make sure to use a syntax that separates your macro from the content before and after it so that it's on a line by itself. For example in XWiki Syntax 2.0+ this means having 2 newline characters (a.k.a line breaks) separating your macro from the content before and after it.Back to host configuration. |
|
---|
- File Systems: Select this check box to enable file system monitoring on a list of given hosts.
- FileSystem Configuration: Click this button provide file system configuration details. The configuration will be applied to all remote hosts added in Hosts Name/File Path field.
- Enter the details for monitoring the file systems.
- FileSystem Include/Exclude Operation
- Exclude FileSystem: Enter the filesystem name or a regular expression to exclude filesystems from monitoring.To exclude multiple filesystems, enter a comma separated list of regular expressions. To exclude the root filesystem use the ^/$ regular expression. If the rules are equally specific (if you exclude a file, and include the same file) then exclude takes precedence over include.
- Include FileSystem: Enter the filesystem name or a regular expression to include filesystems for monitoring. To include multiple filesystems, enter a comma separated list of regular expressions. To include the root filesystem use the ^/$ regular expression. Note: The filesystem monitor type enables monitoring of the following filesystems by default.
- ^/$ (root)
- ^/tmp$ (tmp)
- ^/usr$ (usr)
- ^/home$ (home)
- Filesystem filtering on basis of type
- Filesystem exclusion on type: Selecting any of the following checkboxes has priority over include regex pattern.
- Ignore NFS Filesystems: Select this check box to exclude network filesystem instances from monitoring.
- Ignore CDFS Filesystems: Select this check box to exclude CD-ROM filesystem instances from monitoring.
- Ignore PROC Filesystems: Select this check box to exclude proc filesystem instances from monitoring.
- Ignore Other Filesystems: Select this check box to exclude any other type of filesystem instances from monitoring.
- Other FileSystem types to ignore: Enter a space separated list of other filesystem instances to exclude from monitoring.
- Destroy Unmounted FileSystem: If the filesystem is unmounted and any of the following options are selected, the corresponding filesystem instances will be destroyed from PATROL Agent. The Mount Status parameter will not be set to alarm if the filesystem is unmounted. If such filesystems are mounted again, the instances will be rediscovered.
- Ignore Persistence for NFS Filesystems: Select this checkbox to remove the existing unmounted network filesystem instances.
- Ignore Persistence for NFS Filesystems: Select this checkbox to remove the existing unmounted CD-ROM filesystem instances.
- Ignore Persistence for PROC Filesystems: Select this checkbox to remove the existing unmounted PROC filesystem instances.
- Ignore Persistence for Other Filesystems: Select this checkbox to remove the other types of unmounted filesystem instances.
- Ignore Persistence for Other Filesystems: Enter a space separated list of other types of unmounted filesystem instances. These filesystems will be removed.
Back to host configuration, process configuration. |
|
---|
- Disk: Select this check box to enable disk monitoring on a list of given hosts.
- Disk Configuration: Click this button provide disk configuration details. The disk configuration will be applied to all remote hosts added in Hosts Name/File Path field.
- Enter the details for monitoring the disks.
- Disk Include/Exclude Operation
- Exclude Disk: Enter the disk name or a regular expression to filter disks that you want to exclude from monitoring. To exclude multiple disks, enter a comma separated list of regular expressions.If the rules are equally specific (if you exclude a file, and include the same file) then excludetakes precedence over include.
- Include Disk: Enter the disk name or a regular expression to filter disks that you want to include for monitoring. To include multiple disks, enter a comma separated list of regular expressions.By default all the disks are included for monitoring.
Back to host configuration, process configuration, filesystem configuration. |
| Click this option for confirming the configuration information that you provided and adding the host name to the list of hosts. |
| Select one of the items that you added to the list in the preceding step, and click this option to modify details. |
| Select the items added earlier and click this option to delete that item from the list of configured hosts and the clear the details provided in the earlier fields. |
| Click this option to clear off your configuration details and revert to default settings. |
| Click this option to add this monitoring configuration. This information is displayed on the Monitor Configuration page. After you click this option, you can continue to add more objects for monitoring. |
| Click this option to exit without saving any changes. |
Back to Host configuration, Process configuration, Filesystem configuration, Disk configuration.
Back to top
Configuring-after-installation