||Home||Switchboard||Unix Administration||Red Hat||TCP/IP Networks||Neoliberalism||Toxic Managers|
|(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix|
|News||See also||IBM TEC Documentation Page||Recommended Links||User's Guide||Adapters Guide,||Command and Task Reference||Installation Guide|
|Rule Developer's Guide||Rule Set Reference,||Redbook - Event Management Best Practices||IBM Redbooks Maintaining Your Tivoli Environment||Field Guides||Redbooks||Humor||Etc|
While some technical solutions used in TEC were brilliant at the time when it was written, you will never discover this from the documentation. TEC Guides are written in "Greenspan-speak" (complex sentences with huge mass terms mostly devoid of any useful meaning that was a hall mark of former Fed chairman; the secret of his success is his ability to match content-free arcane jargon of the alchemist to the gullibility of the customers)
Despite large number of pages TEC guides contain very little useful information (the joke "the next 300 pages were intentionally left blank" has more subtle meaning them it looks if we are talking about TEC documentation ;-). Moreover if relevant information exists finding it is extremely difficult as those guides are not well referenced by Google. The following documents are available in the IBM TEC Documentation Page (see also Information Centers page)
In addition there are a dozen of Redbooks of various quality. Most are dated and information, as valuable as it is, is far from being current. Among the most useful are
This IBM Redbook presents a deep and broad understanding about event management with a focus on best practices. It examines event filtering, duplicate detection, correlation, notification, escalation, and synchronization. Plus it discusses trouble-ticket integration, maintenance modes, and automation in regard to event management. Throughout this book, you learn to apply and use these concepts with IBM Tivoli Enterprise Console 3.9.
Tivoli Enterprise Console can be rightly called the flagship of the Tivoli product line because it is the focal point of events from all Tivoli products. The new version of TEC will bring very important usability and performance enhancements such as Java-based TEC Console and Availability Intermediate Manager (AIM). This redbook introduces the new Tivoli Enterprise Console V3.7, covering the installation, tailoring, and configuration of the console itself
2003-10-24 This IBM Redbook is an update of the existing Tivoli Enterprise Internals and Problem Determination, SG24-2034 redbook. The material is revised and updated for Tivoli Management Framework and applications post Version 3.6. Some of the applications that are covered from the troubleshooting point of view in this redbook are: Tivoli Management Framework and related concepts Tivoli Enterprise Console IBM Tivoli Monitoring Tivoli Business Systems Manager Tivoli Enterprise Data Warehouse Tivoli Workload Schedule
This redbook is an update of a previous redbook called Introduction to Tivoliís TME 10, SG24-4948, which remains one of the most widely-read Tivoli Redbooks having sold over 5,000 hardcopies in its life. This update reflects what has changed in Tivoli Management Software since Version 3.2 and covers the Tivoli Framework and the core applications of Version 3.6.1 (Tivoli Inventory, Tivoli Software Distribution, Tivoli Distributed Monitoring, Tivoli Enterprise Console, Tivoli User Administration, and Tivoli Security Management). This book also covers the full suite of Tivoli Enterprise products including Tivoli NetView, Tivoli NetView Performance Monitor, Tivoli Performance Reporter, Tivoli Remote Control, Tivoli Workload Scheduler, Tivoli Output Manager, Tivoli Service Desk, Tivoli Storage Manager, Tivoli Global Sign-On, some Tivoli Plus modules, and Tivoli Global Enterprise Manager (GEM).
Because Tivoli Enterprise products fit in the category of Enterprise Systems Management (ESM), in the first part of this book, we explain why ESM is essential and what it means. Then, we describe how Tivoli provides an enterprise approach to the ESM issues briefly describing all the products included in the Tivoli Enterprise suite of products.
... ... ...
This book is divided into eight parts: Introduction, Tivoli Management Framework, Deployment discipline, Availability discipline, Operations discipline, Security discipline, Tivoli modules, and Tivoli management views. The first part contains the introductory chapters on ESM and Tivoli Enterprise Software. The other parts reflect the architecture of Tivoli Enterprise Software.
Each chapter covers a product. The products that belong to the core applications contain practical hands-on examples to familiarize readers with the way the basic functions work and to deepen their understanding of the concepts. These chapters also contain tests that can help prepare technical support personnel for Tivoli certification programs.
About this guide
Who should read this guidePublications
IBM Tivoli Enterprise Console libraryRelated publications
Accessing publications onlineOrdering publications
Contacting software supportParticipating in newsgroups
Conventions used in this guideTypeface conventions
Operating system-dependent variables and pathsIBM Tivoli Enterprise Console icons
OverviewHighlights of the 3.9 release
Unified system and network managementOptimized event management for key e-business applications
Components of the Tivoli Enterprise Console productAdapter Configuration Facility
Event adapterTivoli Event Integration Facility
Tivoli Enterprise Console gatewayTivoli NetView
Event serverEvent database
User interface serverEvent console
Event flowConfiguring the Tivoli Enterprise Console product
Planning for event managementPredefined event groups
Predefined event consolesPlanning for new event groups
Planning for event group rolesConfiguring event adapters
Configuring the Tivoli Enterprise Console gatewayConfiguring the event server
Updating the source listChanging the logging defaults
Managing rule basesCreating an event console
Configuring an event consoleCreating and changing an event group
Assigning an event group to an event consoleCreating an operator
Assigning an operator to an event consoleIntegrating your trouble ticket system with the trouble ticket rules
Customizing an event consoleConfiguring custom buttons for an event console
Exporting and importing event console definitionsManaging Tivoli region definitions for the Web version of the event console
Tuning the performance of the Web version of the event consoleBacking up and tuning the event database
Stopping and starting the event serverSample IT environment with configuration examples
Sample IT environmentFast path to managing events
Event adaptersEvent server
Extending event management capabilitiesEvent adapters
Event serverExample 1: All operators get all events
Example 2: Geographic differentiationExample 3: System management differentiation
Example 4: Organizational differentiationExample 5: Event-type differentiation
Managing eventsKey concepts for event management
Event statusEvent severity
Primary operator tasksUsing the Java version of the event console
Starting the event consoleExiting the event console
Viewing eventsAcknowledging events
Running tasksRunning local commands
Closing eventsStarting the Tivoli NetView component
Opening a trouble ticketViewing event information
Viewing event propertiesCustomizing the event viewer
Using the Web version of the event consoleOverview of the Web version of the event console
Starting the Web version of the event consoleExiting the event console
Viewing eventsAcknowledging events
Running tasksClosing events
Viewing a summary of eventsOpening a trouble ticket
Viewing event informationViewing event properties
Customizing the event viewerTivoli Enterprise Console gateway
Configuring the gatewayGateway configuration file
Configuring the gateway to receive events from non-TME adaptersConfiguring the gateway for state correlation
Configuring the rate at which events are sent to the event serverStarting and stopping the tec_gwr program
Starting the tec_gwr program manuallyStopping the tec_gwr program manually
Obtaining the status of the tec_gwr program on UNIXAppendix A. Troubleshooting
Getting started with problem determinationProblems locating an event
Understanding event server processesChecking the event flow
Problems starting the Tivoli Enterprise Console productProblems with rules
Enabling rule tracingTuning rules
Problems with the RIM databaseAnalyzing Tivoli Management Framework trace logs
Problems with the Tivoli Enterprise Console gatewayProblems with the tec_gateway program
Problems with the tec_gwr programProblems with the Web version of the event console
Problems with performanceConfiguring the event database
Additional information sourcesAppendix B. Messages
The purpose of this field guide is to describe the functionality of the IBM Tivoli Enterprise Console state correlation engine introduced in ITEC version 3.8. It also outlines the configuration and design aspects as well as gives hints for installing and troubleshooting. Some case studies from different customers are discussed at the end.
The purpose of this white paper is to educate the concerned audience about all the different stages and paths that an event can undergo on its way to the IBM Tivoli Enterprise Console Event Server (referred to as “Event Server” from here on out). Also, this document will be of great help to someone who is trying to diagnose a problem of events not being received. The flowcharts included that show the event flow will definitely help pinpoint specific areas to analyze further.
10.2.1 Using the wizard to create a custom script Resource Model
First, you need to write a custom script on the monitored system. We create a sample script for ITSO_ProcessNum Resource Model, as shown in Example 10-1. The custom script Resource Model checks the standard output from your custom script. Therefore, the custom script must print its result to standard output.
Example 10-1 process_num.ksh#!/bin/kshPROCESS_NAME=$1ps -A -o "args" | grep -v grep |grep -v $0 | grep "$PROCESS_NAME" | wc -l
Note: The custom script runs on the shell environment with variables defined by the lcfd_env.sh, such as LCFROOT, LCF_TEMPDIR, and so on. Instead of writing the special file name or directory name in the script, you may want to use these variables to make your custom script widely usable.
After you finish writing the script, make sure it works in a stand-alone environment, and then copy the script to your PC where you will use the Workbench.
Example 10-2 Running process_num.sh[email protected][/work/itso] process_num.ksh httpd 7
Note: If you select FTP to copy a script from the UNIX machine to the Windows PC where you use Workbench, use the binary mode to keep the original new line code of a script. If you changed the script on your PC, the new line code will be changed to the CR/LF, which is used in the Windows environment. If this happens, you can convert the new line code from the CR/LF to the LF. The bash and tr commands are included in the bin directory of the Workbench. Do the following:bash tr -d "\015" < input_filename > output_filename cp output_filename input_filename
2. Using the wizard
Now you have a custom script in your PC. You can import it into your Resource Model by using the Workbench wizard.
Let us begin by clicking on the New icon in the left side of the Workbench toolbar, as shown in Figure 10-4
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Haterís Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|You can use PayPal to to buy a cup of coffee for authors of this site|
Last modified: March 12, 2019