Remote monitoring configuration


The Microsoft Windows Servers remote monitoring profile can be configured through Central Monitoring Administration.

Note

Local monitoring will be disabled by default unless any monitoring profile is configured explicitly for local monitoring. Thus there will not be local monitoring if only remote monitoring profile is configured. 

On the Add Monitor Types dialog box, with the Monitoring Profile set to Remote Monitoring, and the Monitor Type set to Windows Remote Monitoring, provide the following details:

Field

Description

Remote Host Configuration

Host Details

Remote host names

Host Names/File Path

Specify the host name of the server in either of the following options:

  • Single host name or IP address.
  • If you want to use the same configuration for multiple hosts, enter a comma separated list of host names or IP addresses with common credentials.
  • If you want to use the same configuration for large number of hosts, you can configure the remote hosts from a file (.txt, .csv). Enter the absolute path to the file that includes a list of host names or IP addresses.
    For example, the file path can be C:\PROGRA~2\BMCSOF~1\Patrol3\log\WinProductionHosts.txt or %PATROL_HOME%\log\WinProductionHosts.txt.
    • The file must contain a list of comma separated host names or IP addresses *(with or without publish host names) that have common credentials.
    • The file must be located on the host which is running the PATROL Agent. BMC PATROL default account must have read permission on the directory where the file is located. The _ConfigStatus parameter indicates errors related to the input file.
  • A combination of all the earlier options.

Note

You can add a publish hostname to represent the host with different hostname or, if the Fully Qualified Domain name of the remote host cannot be retrieved. The publish hostname can be added in <hostname>;<publish_hostname> format. This format can be used in any of the above options.

Authentication

Select the type of authentication for adding the remote host.

  • Negotiate: Negotiate is selected for local computer accounts. In this option, the client sends a request to the server to authenticate. The user name should be specified as username for a local user on the server.
  • Kerberos:  Kerberos is selected to authenticate a domain account. In this option, the client and server mutually authenticate using Kerberos tickets. The user name should be specified as domain\username for a domain user.

Connection Protocol

Select the type of connection protocol for adding the remote host.

  • HTTP
  • HTTPS

Port Number

Enter the remote host port number.
By default, the port number is set to 5985 for HTTP and 5986 for HTTPS.

User Credentials

User Name

Enter the common user name to connect to the remote host. By default the value is $USERNAME.

Note

 If you continue with the default username then default PATROL account is used to connect remote hosts and hence the password field is ignored.

Password

Enter the common password of the hosts added in the Host Names/File Path field.

Confirm Password

Reconfirm the password that you entered in the field above.

Monitor Configuration

Operating System Monitoring

Monitoring options

Specify one of the following options:
Disable OS Monitoring: This option disables both Standard and Advance monitoring options. You can select this option whenever you want to use only the Custom monitoring.
Standard Monitoring: This option enables all the Standard monitors by default and cannot be disabled. Also, this monitoring option does not monitor any advance monitoring options.
Advance Monitoring: This option monitors both windows Standard and Windows advanced configurations. Advance monitors need to be enabled explicitly. In this option, you can enable and disable all the configuration types.

Advanced Monitor Configuration

Memory Configuration

Memory

Select this check box to enable Memory monitoring.

Health Configuration

Health 

Select this check box to enable Health monitoring on a list of given hosts.

Cache Configuration

Cache

Select this check box to enable Cache monitoring on a list of given hosts.

System Configuration

System

Select this check box to enable System monitoring on a list of given hosts.

Processor Configuration

Field

Description

Exclude Criteria

Specify a comma-separated list of processor instances that you want to exclude from monitoring.

For example: 0,1,2

Include Criteria

Specify a comma-separated list of processor instances that you want to include for monitoring.

For example: 0,1,2

Network Configuration

Field

Description

Exclude Criteria

Specify a comma-separated list of network interface instances that you want to exclude from monitoring.

For example: Local Area Connection,6TO4 Adapter

Include Criteria

Specify a comma-separated list of network interface instances that you want to include for monitoring.

For example: Local Area Connection,6TO4 Adapter

Physical Disk Configuration

Field

Description

Exclude Criteria

Specify a comma-separated list of physical disk instances to exclude from monitoring.

For example: 0,1,2

Include Criteria

Specify a comma-separated list of physical disk instances to include for monitoring.

For example: 0,1,2

Logical Disk Configuration

Field

Description

Exclude Criteria

Specify a comma-separated list of logical disk instances to exclude from monitoring.

For example: C:,D:,E:

Include Criteria

Specify a comma-separated list of logical disk instances to include for monitoring.

For example: C:,D:,E:

Page File Configuration

Field

Description

Exclude Criteria

Specify a comma-separated list of paging file instances that you want to exclude from monitoring.

For example: _Total,C:\pagefile.sys.

Include Criteria

Specify a comma-separated list of paging file instances that you want to include for monitoring.

For example: _Total,C:\pagefile.sys.

Process Configuration 

Process

Select this check box to enable Process monitoring on a list of given hosts.

Automatic Process Monitoring 

CPU Threshold in %

Specify the CPU threshold (in %) for automatic process monitoring. The input that you specify must match the regular expression pattern, '^[0-9]+$'.By default, this value is set to 90.

Time Duration in secs

Specify the time limit (in seconds) to start the automatic process monitoring. The input that you specify must match the regular expression pattern, '^[0-9]+$'. By default, this value is set to 300.

List of Processes 

Configure Process Monitoring 

Process Label

Specify a label to identify a group of processes. The input that you specify must match the regular expression pattern, '^[0-9a-zA-Z_]+$'.

Process Name

Specify a name or a regular expression pattern that matches the names of processes that must be monitored.

Enter only the process name without extension.

Example: If the process name is Notepad, enter Notepad. Do not enter Notepad.exe.

Process Arguments

Specify the command line arguments for the processes that you want to monitor.

Notes

To monitor a specific process, enter the process arguments.

To monitor all the instances of the same process, enter wildcard asterisk ( * )

If the process argument field is left blank, only the process with no arguments will be monitored.

Example:

C:\Windows\system32\svchost.exe -k NetworkService 
C:\Windows\system32\svchost.exe is considered as no arguments and -k NetworkService is considered as arguments 

Use Regular Expression for Process Argument:

Select this check box if you want to monitor all the processes that contain the process name specified.

Minimum Count

Specify a value so that an alarm is raised if the process count drops under this value.

Maximum Count

Specify a value so that an alarm is raised if the process count rises above this value.

Acceptable Process Owner

Specify a name or regular expression pattern that matches the name of the acceptable process owner.

Use Process Owners for Filtering

Select this check box if you want to filter processes based on the process owners.

Process Settings 

Generate alarm on Process stop

Select this check box to generate an alarm when the process stops.

Generate alarm on Process start

Select this check box to generate an alarm when the process starts.

Add to List:

Click this option for confirming the configuration information that you provided and adding the process label to the list of processes. Select the processes that you want to finally configure and click this option.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured objects and the clear the details provided in the earlier fields.

Service Configuration

Service

Select this check box to enable Service monitoring on a list of given hosts.

Service Configuration

Disable Alert For Paused Services

Select this check box to disable alerts for paused services.

List of Included Services

Service Details

Service Name

Specify a Display Name or Service Name to add the service for monitoring. Regular expressions are supported only for Display Name.

Use Display Name

Select this option to add services by using Display Name or clear this option to add services using Service Name. 

Service Startup Type

Automatic

Select this check box to monitor the services with Startup Type as Automatic, Automatic (Trigger Start) Automatic (Delayed Start). This check box is enabled by default.

Manual

Select this check box to monitor the services with Startup Type as Manual, Manual (Trigger Start). This check box is enabled by default.

Disabled

Select this check box to monitor the services with Startup Type as Disabled.

Generate an Alarm/Warning when service is stopped

Select this check box to generate a PATROL alarm or warning when the service stops.

Alert State

Select one of the following options to define the type of alert you want to raise when the service stops:

  • Alarm
  • Warning

Enable process monitoring for the services

Select this check box to enable process monitoring for the services.

List- List of Included Services 

Add to List

Click this option for confirming the configuration information that you provided and adding the service name specified to the list of services. Select the services that you want to finally configure and click this option so that the host name appears in the list of service hosts configured.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured objects and the clear the details provided in the earlier fields.

Exclude Services

List of Excluded Services

 Service Name

Specify a Display Name or Service Name to add the service for monitoring. Regular expressions are supported only for Display Name.

 Use Display Name

 Select this option to exclude services by using Display Name or clear this option to exclude services by using Service Name.

List- List of Excluded Services 

Add to List

Click this option for confirming the configuration information that you provided and adding the service name specified to the list of services. Select the services that you want to finally configure and click this option so that the host name appears in the list of service hosts configured.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured objects and the clear the details provided in the earlier fields.

Event Log Configuration 

Event Log

Select this check box to enable Event Log monitoring on a list of given hosts.

List of Event Logs 

Log Name

Specify the event log name for which you want to create a filter.

List of Filters

Name

Enter an appropriate name for the filter.

Description

Enter additional information regarding the filter.

Report/Notify

Select one of the following options, as appropriate:

  • Report the number of events that match the filter criteria during each collection period
  • Notify immediately when an event matches the filter criteria

Source Details

Click this tab to specify the following details about the event log source.

Name

Specify the event log source name or a regular expression.

Add to List

Click this option to confirm the details that you provided and to add the details to the list of sources.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured objects and the clear the details provided in the earlier fields.

Use name as a regular expression

Select this check box if you specified a regular expression in the Name field.

Disable case sensitivity

Select this check box to disable case sensitivity for the source filtering.

Include/Exclude Source List

Select one of the following options, as appropriate:

  • Include all event sources in the list
  • Exclude all event sources in the list

Close

Click this option to save your details.

Event Type Details

Click this tab to provide the following details regarding the type of events to monitor.

Event Types to Monitor

Select one or more of the following event types to use in the filter for monitoring.

  • Critical
  • Error
  • Warning
  • Information
  • Verbose
  • Success_Audit
  • Failure_Audit
  • Others

Consolidate event types when reporting

  • Select this option if you want various types of events (for example, Warning, Information, Error) to be reported by using one parameter, ELMStatus (or ELMNotification if you configured to be notified immediately when an error occurs while defining the Report/Notify option).
  • Clear this check box, if you want to have separate parameters for each event type that can raise alarms independently.

Close

Click this option to save your details.

Event ID Details

Click this tab to provide the following event ID details.

Windows Event ID(s)

You can select one or more multiple IDs in the following ways:

  • Single event ID. For example: 100
  • Comma-separated list of multiple event IDs. For example: 100,110,120
  • Range of event IDs. For example: 100-120
  • Regular expression. For example: 1[0-5]3

Use Event ID as a regular expression

Select this check box if you specified a regular expression in the Windows Event ID(s) field.

Include/Exclude Event ID List

Select one of the following options, as appropriate:

  • Include all event IDs in the list
  • Exclude all event IDs in the list

Close

Click this option to save your details.

Event Handling

Click this tab to provide the following about how the events must be handled.

Annotate Graph parameter with event details

Select this check box to annotate event details to Graph parameters.

Write event details to a text parameter

Select this check box to add event details to text parameters.

Use event details for a recovery action

Select this check box to enable using the event details for recovery actions.

Report multiple events as a single event when the event occurs

Specify the number of events that must be reported as a single event depending on the value that you specify in the Time within seconds field.

By default, this value is set to 1.

Time within seconds

Specify the number of seconds that must be used for reporting multiple events as a single event.

By default, this value is set to 0.

Enter text automatic or Filter name to Acknowledge Alarm

Specify how you want to acknowledge the alarm raised by the event filter. You can specify one of the following values:

  • automatic: If you specify automatic, then PATROL acknowledges alarms and returns the filter to an OK state if the filter criteria are not met during the most recent collection cycle. In other words, if the events you are monitoring do not occur during the collection cycle, the event filter state is changed back to OK. With this option you are not actively monitoring for alarms, you might not notice when the monitored events occurs because any alarms will be reset during the next collection cycle if the monitored events do not re-occur. Note: With this option, PATROL cannot acknowledge the alarm or return the filter to an OK state.
  • filterName: If you specify the filter name, then PATROL changes the filter state from an alarm state to an OK state when the criteria of a second event filter are met. To use this option, you must create an event filter that monitors for the required event and that is configured to notify PATROL immediately when that filter criteria is met, and then specify the filter name in this field.

By default, this value is set to automatic.

Close

Click this option to save your details.

Advanced Properties

Click this tab to specify advanced properties for events.

User Details

Click this tab to provide user details.

User Name

Specify the user name associated with the events that you want to monitor or exclude from monitoring.

Add to List

Click this option to confirm the details that you provided and add the user names to the list of users.

Modify Selection

Select one of the user names that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select one or more of the user names added earlier and click this option to delete those user names from the list displayed.

Include/Exclude User List

Select one of the following options, as appropriate:

  • Include all users in the list
  • Exclude all users in the list

Disable Case Sensitivity

Select this check box if you want to disable case sensitivity for the user name comparison.

Close

Click this option to save your details.

Category Details

Click this tab to provide category details for the events you want to monitor.

Category Name

Specify the category name associated with the events that you want to monitor or exclude from monitoring.

Add to List

Click this option to confirm the details that you provided and add the category names to the list of categories.

Modify Selection

Select one of the category names that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select one or more of the category names added earlier and click this option to delete those names from the list displayed

Include/Exclude User List

Select one of the following options, as appropriate:

  • Include all categories in the list
  • Exclude all categories in the list

Disable Case Sensitivity

Select this check box if you want to disable case sensitivity for the category comparison.

Close

Click this option to save your details

String Details

Click this tab to provide string details associated with the events you want to monitor.

Include String

Specify the string associated with the events that you want to include for monitoring.

Add to List

Click this option to confirm the details that you provided and add the string names to the list of string names to include.

Modify Selection

Select one of the string names that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select one or more of the string names added earlier and click this option to delete those names from the list displayed

Exclude String

Specify the string associated with the events that you want to exclude for monitoring.

Add to List

Click this option to confirm the details that you provided and add the string names to the list of string names to exclude.

Modify Selection

Select one of the string names that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select one or more of the string names added earlier and click this option to delete those names from the list displayed

Disable Case Sensitivity

Select this check box to disable case sensitivity for string comparison.

Close

Click this option to save your details

Computer Details

Click this tab to provide details regarding the computers associated with the events that you want to monitor.

Computer Name

Specify the computer associated with the events that you want to monitor or exclude from monitoring.

Add to List

Click this option to confirm the details that you provided and add the computer names to the list of computer names.

Modify Selection

Select one of the computer names that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select one or more of the computer names added earlier and click this option to delete those names from the list displayed.

Include/Exclude User List

 Select one of the following options, as appropriate:

  • Include all computers in the list
  • Exclude all computers in the list

Disable Case Sensitivity

 Select this check box to disable case sensitivity for computer comparison.

 Close

 Click this option to save your details

Add to List

Click this option for adding the various configuration information that you provided. Click this option for adding each of the configuration details that you specified, such that you see the host details under List - Event Log Logs at the end of the dialog box.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured objects and the clear the details provided in the earlier fields.

 

Note

The check boxes in each monitoring configuration can be enabled/disabled only under Advance monitoring option.

Custom Monitoring 

WMI Monitors

List of Parameters

Parameter Name

Enter the WMI parameter name. For example: CDrive_FreeSpace.

Namespace

Specify the namespace you want to connect. By default it is root\\cimv2

WMI Query

Enter the WMI query. For example: select FreeSpace from win32_logicaldisk WHERE DeviceID='C:'

NOTE
The WMI Query must return a numeric value.

Scaling Factor

Enter a value between 1 and 2147483647, to scale down value that cannot be directly set to parameters, such as WMI queries that return 64-bit integer value.

 Raw Counter Data Configurations

Formatted Raw Counter Data

Select the checkbox to display a normalize formatted performance data.

Note

You can select this check box only for Win32_PerfRawData WMI classes. For more information, see  Performance counters supported through Win32_PerfRawData WMI class

Counter Type

Specify the counter type qualifier for properties in Win32_PerfRawData classes. To see more on counter type configuration click here.

List - List of Parameters

Add to list

Click this option for confirming the configuration information that you provided and adding the host name to the list of hosts.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured hosts and the clear the details provided in the earlier fields.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

List - Remote Host Configuration

Add to list

Click this option for confirming the configuration information that you provided and adding the host name to the list of hosts.

Remove from List

Select the items added earlier and click this option to delete that item from the list of configured hosts and the clear the details provided in the earlier fields.

Modify Selection

Select one of the items that you added to the list in the preceding step, and click this option to modify details.

Reset

Click this option to clear off your configuration details and revert to default settings.

Add

Click this option to add this monitoring configuration. This information is displayed on the Monitor Configuration page. After you click this option, you can continue to add more objects for monitoring.

Close

Click this option to exit without saving any changes.

If you want to use the same configuration for multiple hosts, enter a comma separated list of host names or IP addresses with common credentials.

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*