BMC TrueSight Operations Management - Tivoli Storage ... · PDF file9 BMC TrueSight Operations...
Transcript of BMC TrueSight Operations Management - Tivoli Storage ... · PDF file9 BMC TrueSight Operations...
BMC TrueSight OperationsManagement - Tivoli StorageManager Monitoring
STORAGE MONITORING
USER DOCUMENTATION
Version 3.0.00
January 2017
Contacting BMC Software
You can access the BMC Software Web site at http://www.bmc.com. From this Web site, you canobtain information about the company, its products, corporate offices, special events, and careeropportunities.
United States and Canada
Address BMC Software, Inc.2101 CityWest Blvd. Houston TX77042-2827
Telephone 1 (713) 918 8800 or 1 (800) 841 2031 (Toll Free)
Copyright 2015 BMC Software, Inc. or licensors, as an unpublished work. All rights reserved.
BMC Software, the BMC Software logos, and all other BMC Software product or service names areregistered trademarks or trademarks of BMC Software, Inc.
All other trademarks belong to their respective companies.
BMC Software considers information included in this documentation to be proprietary andconfidential. Your use of this information is subject to the terms and conditions of the applicableEnd User License Agreement for the product and the proprietary and restricted rights noticesincluded in this documentation.
Restricted Rights Legend
U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVEDUNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any dataand computer software by the U.S. Government is subject to restrictions, as applicable, set forthin FAR Section 52.227-14, DFARS 252.227-7013, DFARS 252.227-7014, DFARS 252.227-7015, andDFARS 252.227-7025, as amended from time to time. Contractor/Manufacturer is BMC Software,Inc., 2101 CityWest Blvd., Houston, TX 77042-2827, USA. Any contract notices should be sent to thisaddress.
2
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Customer Support
You can obtain technical support by using the Support page on the BMC Software Web site or bycontacting Customer Support by telephone or e-mail.
Support Web Site
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at http://www.bmc.com/support_home. From this Web site, you can:
Read overviews about support services and programs that BMC Software offers
Find the most current information about BMC Software products
Search a database for problems similar to yours and possible solutions
Order or download product documentation
Report a problem or ask a question
Subscribe to receive e-mail notices when new product versions are released
Find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax numbers, and telephone numbers
You can also access product documents and search the Knowledge Base for help with an issue at http://www.sentrysoftware.com
Support by Telephone or E-mail
In the United States and Canada, if you need technical support and do not have access to the Web,call 800 537 1813. Outside the United States and Canada, please contact your local support centerfor assistance. To find telephone and email contact information for the BMC Software supportcenter that services your location, refer to the Contact Customer Support section of the Supportpage on the BMC Software Web site at http://www.bmc.com/support_home.
3
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
4
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Table of Contents.....................................................................................................................................................................................9User Goals and Features
.....................................................................................................................................................................................10Business Value
.....................................................................................................................................................................................11Requirements
.......................................................................................................................................................................................11System Requirements
.......................................................................................................................................................................................11Software Requirements
.......................................................................................................................................................................................13Security Requirements
.......................................................................................................................................................................................18Disk Space Requirements
.......................................................................................................................................................................................18Remote Monitoring Requirements
.....................................................................................................................................................................................22Importing the Monitoring Solution into Central Administration
.....................................................................................................................................................................................23Creating the Installation Package
.....................................................................................................................................................................................24Downloading the Installation Package
.....................................................................................................................................................................................24Installing the Package
.....................................................................................................................................................................................27Configuring Monitor Settings
.......................................................................................................................................................................................29Configuring the Tivoli Storage Manager Solution
......................................................................................................................................................................301. Configuring Tivoli Storage Manager Servers Monitoring
......................................................................................................................................................................312. Configuring the User Account
......................................................................................................................................................................333. Configuring Advanced Settings
..........................................................................................................................................................................33Configuring TSM Server Discovery Overrides (Optional)
..........................................................................................................................................................................35Configuring Remote Connection Settings
..........................................................................................................................................................................36Configuring the Maximum Number of Instances
..........................................................................................................................................................................38Configuring the Multi-Node Monitoring Mode
......................................................................................................................................................................42Enabling the Debug Mode
.......................................................................................................................................................................................45Configuring Other Monitor Types
......................................................................................................................................................................45Configuring Automated Drives
......................................................................................................................................................................46Configuring Automated Libraries
......................................................................................................................................................................47Configuring Clients
......................................................................................................................................................................48Configuring Daemons
......................................................................................................................................................................49Configuring Domains
......................................................................................................................................................................50Configuring Domain Client Nodes
......................................................................................................................................................................51Configuring Jobs
......................................................................................................................................................................52Configuring Logs
......................................................................................................................................................................53Configuring Manual Drives
5
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
......................................................................................................................................................................54Configuring Mount Requests
......................................................................................................................................................................55Configuring Processes
......................................................................................................................................................................56Configuring Storage Pools
......................................................................................................................................................................57Filtering Elements to Monitor
.....................................................................................................................................................................................61Tivoli Storage Manager KM
.....................................................................................................................................................................................62TSM Clients
.....................................................................................................................................................................................63TSM Client
.....................................................................................................................................................................................64TSM Daemons
.....................................................................................................................................................................................65TSM Daemon
.....................................................................................................................................................................................67TSM Databases
.....................................................................................................................................................................................68TSM Database
.....................................................................................................................................................................................71TSM Logs
.....................................................................................................................................................................................72TSM Log
.....................................................................................................................................................................................73TSM Domains
.....................................................................................................................................................................................74TSM Domain
.....................................................................................................................................................................................76TSM Jobs
.....................................................................................................................................................................................78TSM Job
.....................................................................................................................................................................................80TSM Mount Requests
.....................................................................................................................................................................................81TSM Mount Request
.....................................................................................................................................................................................82TSM Automated Libraries
.....................................................................................................................................................................................83TSM Automated Library
.....................................................................................................................................................................................84TSM Manual Drive
.....................................................................................................................................................................................85TSM Automated Drives
.....................................................................................................................................................................................86TSM Automated Drive
.....................................................................................................................................................................................87TSM Domain Client Node
.....................................................................................................................................................................................88TSM Storage Pools
.....................................................................................................................................................................................89TSM Storage Pool
.....................................................................................................................................................................................93TSM Processes
.....................................................................................................................................................................................94TSM Process
.....................................................................................................................................................................................95Managing Baselines and Key Performance Indicators
7
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
What's NewTSM-14: BMC TrueSight Operations Management - Tivoli Storage Manager Monitoring nowsupports multiple TSM server monitoring on local and remote hosts.
Changes and ImprovementsTSM-14: The overall performance of the Tivoli Storage Manager KM has been significantlyimproved.
TSM-155: Tivoli Storage Manager KM now fully supports the monitoring of librariescontrolled by ACSLS (StorageTek Automated Cartridge System Library Software).
TSM-371: Tivoli Storage Manager KM has been improved to support all PATROL Agent v10+versions and prevent failures due to a compatibility error.
Fixed IssuesTSM-380: The default actlog query limit has been modified to allow querying all actlogmessages since the last collection cycle (default: 300 minutes).
9
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
The pages in this section provide a high-level overview of the product.
User Goals and Features
Business Value
Requirements
Note that for convenience and brevity, reference to BMC TrueSight Operations Management - Tivoli StorageManager Monitoring, may also be made as Tivoli Storage Manager KM.
User Goals and FeaturesTivoli Storage Manager KM enables you to monitor the following in your environment:
Jobs: size, duration, throughput, time elapsed since last backup, number of objects andstatus.
Server and Storage Agent availability: status memory and CPU time consumption.
Internal server processes: monitoring of database backups, data migration and spacereclamations.
Server database and recovery logs: database and file system utilization, cache and bufferperformance, time elapsed since last backup and database reorganization, etc.
Storage pools: space utilization, status, capacity, logical occupancy, growth rates, etc.
Libraries and drives: number of available drives, status, and number of scratch volumesloaded, etc.
Client: working status.
10User Goals and Features
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Business ValueBMC TrueSight Operations Management - Tivoli Storage Manager Monitoring provides currentand historical information through a centralized console so you can easily view and manage yourentire Tivoli Storage Manager environment. The product collects and brings critical performancedata and useful metrics into the BMC TrueSight Operations Management environment andenables SAN Administrators to be warned whenever a problem occurs in their Tivoli StorageManager environment.
BMC TrueSight Operations Management - Tivoli Storage Manager Monitoring:
Detects backup and restore errors
Ensures maximum data protection and maximum availability
Measures jobs progress
Helps diagnosing server problems
Analyzes trend
Detects disk or tapes space shortages
Ensures backups are successful
Helps identify bottlenecks and optimize backup domains.
11 Business Value
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
RequirementsBefore installing the Tivoli Storage Manager KM, verify the:
software requirements
system requirements
security requirements
remote monitoring requirements.
System RequirementsOperating System Operating System Version
Sun® microsystems SolarisTM 8, 9, 10, 11
HP-UX 11.00, 11.11, 11iv2, 11iv3
IBM® AIXTM 5.1, 5.2, 5.3, 6.1
Red Hat® Linux® 7.2
Microsoft® Windows® 2003, 2008, 2008 R2, 2012
Software RequirementsThe Tivoli Storage Manager KM supports the following platforms:
Software Version
Tivoli Storage Manager Server 5.1.x, 5.2.x, 5.3.x, 5.4.x, 5.5.x, 6.1.x, 6.2.x, 6.3.x, 7.1.x
Tivoli Storage Manager Administrative Client 5.1.x, 5.2.x, 5.3.x, 5.4.x, 5.5.x, 6.1.x, 6.2.x, 6.3.x, 6.4.x,7.1.x
BMC Software PATROL Agent 3.4.20, 3.5.x, 3.6.x, 3.7.x, 3.8.x, 3.9.x, 9.x, 10.x
BMC ProactiveNet Performance Manager 8.x, 8.5.x, 8.6.x, 9.x
BMC TrueSight Operations Management 10.x
Java 1.6 or higher
12Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
If you're running the Tivoli Storage Manager KM on LINUX, or Microsoft Windows x64 managednodes, please verify these additional software requirements:
Purpose Software Version
When running Tivoli StorageManager KM with sudo useraccount on Solaris, HP-UX, AIX orLinux managed nodes
Sudo (superuser do) 1.6.7 or later
When running Tivoli StorageManager KM on AIX managednodes
Default ncargs value forprocessing bpdbjobs output maynot be sufficient. Check this attribute using:lsattr -EH -l sys0 | grep ncargs If the value is below 16, increaseit using:chdev -l sys0 -a ncargs=16
Any
When running Tivoli StorageManager KM on Linux managednodes
Korn shell binary (/bin/ksh)Alternatively a soft link frombin/ksh to /bin/bash will beneeded.
Any
When running Tivoli StorageManager KM on MicrosoftWindows x64 managed nodes
Reg.exe patch KB948698(http://support.microsoft.com/kb/948698)
Any
The Microsoft Windows x64 Reg.exe patch, KB948698 is required to allow access to 64-bit registry keysfrom PATROL Agent. Access the above patch site f rom the managed node to obtain the correct patch forthat platform.
To support bash shell platforms when ksh is not installed
To collect TSM stats when ksh was not installed on UNIX/Linux servers, you need to create a softlink for /bin/ksh to /bin/bash:
ln –s /bin/bash /bin/ksh
13 Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Security RequirementsA user account with administrative privileges must be configured in BMC PATROL to read andexecute Tivoli Storage Manager application programs and access file systems. Depending on theoperating systems used, several options will be available.
The following user accounts can be used:
On Unix platforms:
a root user
a non-root user, such as patrol, that has sudo privileges on Tivoli Storage Manager toexecute application programs and access file systems
a non-root account, such as patrol, configured in Tivoli Storage Manager application toadminister the Tivoli Storage Manager application.
On Windows platforms:
an administrator user
a non-administrator account, such as patrol, configured in Tivoli Storage Managerapplication to administer the Tivoli Storage Manager application.
The user login details are configured in the KM. The password is stored in the PATROL Agent in aDES encrypted format.
Access Permissions
The Tivoli Storage Manager KM user needs “read & execute” permission to executable and libraryfiles under the paths listed below. The Tivoli Storage Manager installation path INSTALL_PATH,referenced below, is normally /usr/tivoli/tsm or /opt/tivoli/tsm (on Unix) or C:\Program Files\Tivoli\TSM (on Microsoft Windows).
Unix Microsoft Windows
INSTALL_PATH/client/ba/bin (or bin64) INSTALL_PATH\baclient
INSTALL_PATH/client/admin/bin INSTALL_PATH\Server
INSTALL_PATH/server/bin INSTALL_PATH\StorageAgent
INSTALL_PATH/StorageAgent/bin INSTALL_PATH\Server\tsmdiag
INSTALL_PATH/server/bin/tsmdiag INSTALL_PATH\StorageAgent\tsmdiag
INSTALL_PATH/StorageAgent/bin/tsmdiag/usr/lib C:\Windows\system32
14Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
If the KM is enabled to failover in a clustered environment, the login user needs executepermissions to the following cluster commands:
/opt/VRTSvcs/bin/hagrp (in Veritas Cluster Server)vxdctl (in Veritas Cluster File System)/usr/cluster/bin/clrg (in Oracle Solaris Cluster)C:\Windows\sysnative\cluster (in Microsoft Cluster)
The Tivoli Storage Manager KM includes some scripts which should be executable by the PATROLAgent user and the Tivoli Storage Manager KM user. These scripts are stored under KM_HOMEpath, normally PATROL_HOME/lib/TSM.
To list all OS commands used by the Tivoli Storage Manager KM, execute the following PSL codefrom the PATROL Console, using PSL Task menu, after installing and loading the KM.
foreach var (grep("^/Runtime/TSM/.*CommandControls/",pconfig("LIST")))
{
ctl=get(var);
opt=ntharg(grep("Option",ctl),"2-"," =");
nsa=ntharg(grep("NoSudoAttempt",ctl),"2-"," =");
sua=ntharg(grep("SingleUserAttempt",ctl),"2-"," =");
typ=ntharg(grep("CommandType",ctl),"2-"," =");
cmd=nthargf(grep("CommandText",ctl),"2-","=","=");
if(osp=="") { osp=trim(nthargf(grep("OSPlatform",ctl),"2-","=","="), " "); }
fields=lines(ntharg(var,"1-","/"));
old_host=host;
host=(fields == 5)? ntharg(var,"3","/") : "localhost";
if(host!=old_host)
{
if((osp!="WINDOWS") && sudoers) { printf("\n\nCommands used with sudo:\n%s",sort(sudoers)); }
printf("\n\nOn %s:\n\n", host);
i=0; sudoers=""; osp="";
}
if((typ == "")||(typ == "OS"))
{
met="";
if(opt == "NoLogin") { met = "(run as patrol user)"; }
elsif(nsa == "YES") { met = "(run as configured user without sudo)"; }
elsif(sua == "YES") { met = "(run as supplied user - used in menu)"; }
else
{
scmd=cmd;
s=index(scmd,"%sudo");
if(s) { scmd=replace(substr(scmd,s,length(scmd)),"%sudo",""); }
sudoers=union(sudoers,ntharg(ntharg(scmd,1,">|"),"1-"," "," "));
}
printf("(%2d) %-30s %-40s: %s\n",i++,ntharg(var,fields,"/"),met,cmd);
}
}
if((osp!="WINDOWS") && sudoers) { printf("\n\nCommands used with sudo:\n%s",sort(sudoers)); }
15 Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
The PATROL Agent user (normally patrol) requires write permission to DSM_LOG directory anddsmerror.log file. For all other paths and files listed in the table below the PATROL Agent userneeds “read & execute” permission.
Unix Microsoft Windows
DSM_DIR (INSTALL_PATH/client/ba/bin or bin64) DSM_DIR (INSTALL_PATH\baclient)
DSM_LOG (KM_TEMP) DSM_LOG (KM_TEMP)
DSM_DIR/dsmadmc DSM_DIR\dsmadmc.exe
DSM_CONFIG (DSM_DIR/dsm.opt) DSM_CONFIG (DSM_DIR/dsm.opt)
If a monitored log file cannot be read by the PATROL Agent user, it will copied to KM_TEMP path usingthe configured KM login account, and processed by the PATROL Agent user. On completion the copiedlog file will be removed. This may increase the file system usage under KM_TEMP temporarily during thisactivity.
On Windows platforms the Tivoli Storage Manager installation is identified by checking theregistry sub-keys under HKEY_LOCAL_MACHINE\SOFTWARE\IBM\ADSM\.
The configured login user should have sufficient privileges to run regedit command on themanaged node.
Sudo User for Operating System Access
If a non-root user with sudo privileges is preferred as the Tivoli Storage Manager KM user,configure the account as a sudoer through the visudo utility using code appropriate for yourplatform as detailed below. This user should be able to execute TSM commands and OScommands.
The code below also applies to all non-root users who may execute Tivoli Storage Manager KMadministration and report menu commands using their sudo privileges. The Tivoli StorageManager KM accepts any non-root user with the following sudo configuration in the sudoers file.Please replace user1, user2, user3 with appropriate KM user name. The Tivoli Storage Managerinstallation path INSTALL_PATH, referenced below is normally /usr/tivoli/tsm or /opt/tivoli/tsmand PATROL_HOME is the path where the PATROL Agent is installed (including the target, like /opt/bmc/Patrol3/Solaris29-sun4/).
Entering the non-root sudo user with ‘Use Sudo’ option selected in to the login configuration dialog,before updating the sudoers file, will generate sudo errors. Also if the sudo user is configureddifferently, the KM may run sudo commands using incorrect sudo settings, which may expose the sudouser password.
16Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
On Solaris:
User_Alias TSMKMUSERS = user1, user2, user3
Defaults:TSMKMUSERS !lecture,!authenticate,!requiretty,\
env_keep+="PATH LD_LIBRARY_PATH INSTALL_PATH KM_HOME KM_TEMP \
DSM_CONFIG DSM_DIR DSM_LOG",env_reset
TSMKMUSERS ALL=/bin/*,/sbin/*,/usr/bin/*,/usr/sbin/*,\
INSTALL_PATH/server/bin/*,\
INSTALL_PATH/client/ba/bin/*,\
PATROL_HOME/lib/TSM/*,PATROL_HOME/bin/*
env_keep+="PATH LD_LIBRARY_PATH INSTALL_PATH KM_HOME KM_TEMP
\DSM_CONFIG DSM_DIR DSM_LOG",env_reset
user1, user2, user3 must be replaced with username(s) used by the KM; INSTALL_PATH andPATROL_HOME with the relevant paths.
On HP-UX:
User_Alias TSMKMUSERS = user1, user2, user3
Defaults:TSMKMUSERS !lecture,!authenticate,!requiretty,\
env_keep+="PATH LD_LIBRARY_PATH INSTALL_PATH KM_HOME KM_TEMP \
DSM_CONFIG DSM_DIR DSM_LOG",env_reset
TSMKMUSERS ALL=/bin/*,/sbin/*,/usr/bin/*,/usr/sbin/*,\
INSTALL_PATH/server/bin/*,\
INSTALL_PATH/client/ba/bin/*,\
PATROL_HOME/lib/TSM/*,PATROL_HOME/bin/*
user1, user2, user3 must be replaced with username(s) used by the KM; INSTALL_PATH andPATROL_HOME with the relevant paths.
On AIX & Linux:
User_Alias TSMKMUSERS = user1, user2, user3
Defaults:TSMKMUSERS !lecture,!authenticate,!requiretty,\
env_keep+="PATH LD_LIBRARY_PATH INSTALL_PATH KM_HOME KM_TEMP \
DSM_CONFIG DSM_DIR DSM_LOG",env_reset
TSMKMUSERS ALL=/bin/*,/sbin/*,/usr/bin/*,/usr/sbin/*,\
INSTALL_PATH/server/bin/*,\
INSTALL_PATH/client/ba/bin/*,\
PATROL_HOME/lib/TSM/*,PATROL_HOME/bin/*
user1, user2, user3 must be replaced with username(s) used by the KM; INSTALL_PATH andPATROL_HOME with the relevant paths.
Admin Interface User Access
BMC TrueSight Operations Management - Tivoli Storage Manager Monitoring requires that anadministrator account (standard administrator with no other privileges) be added to the TivoliStorage Manager server for use by PATROL and the Tivoli Storage Manager KM.
17 Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
This account is used to query the configuration details and resource utilization of the serverthrough the Tivoli Storage Manager Administrative Client interface (DSMADMC). No changes aremade by this user on the Tivoli Storage Manager server - the Tivoli Storage Manager KM operatesin “read-only” mode for normal operation.
The suggested name for this DSMADMC user account is patrol and it can be created as part of theconfiguration procedure described in Configuring the KM User Accounts. Alternatively, the useraccount can be set up directly in TSM Server, and the details simply entered during KMconfiguration in the same way that the OS login details are entered. The password is stored inthe PATROL Agent in an encrypted format.
DSMADMC command binary is executed using an OS user account matching the the DSMADMClogin. If this account does not exists, the PATROL Agent user account will be used. Therefore it isrecommended to create an operating system user account matching the DSMADMC usernamewith the same password to avoid invalid user login attempts and to improve the performance.This user should be able to access required paths and binaries of DSMADMC. This includesexecute permission to DSM_CONFIG path and dsmadmc (or dsmadmc.exe) file and writepermission to DSM_LOG path and dsmerror.log file.
To list all DSMADMC commands used by the Tivoli Storage Manager KM, execute the followingPSL code from the PATROL Console, using “PSL Task” menu, after installing and loading the KM.
i=0;
foreach var (grep("^/Runtime/TSM/.*CommandControls/",pconfig("LIST")))
{
ctl=pconfig("GET", var);
typ=ntharg(grep("CommandType",ctl),"2-"," =");
if(typ != "DSMADMC") { next; }
fields=lines(ntharg(var,"1-","/"));
old_host=host;
host=(fields == 5)? ntharg(var,"3","/") : "localhost";
if(host!=old_host)
{
printf("\n\nOn %s:\n\n", host);
i=0;
}
cmd=nthargf(grep("CommandText",ctl),"2-","=","=");
printf("(%2d) %-25s: %s\n",i++,ntharg(var,fields,"/"),cmd);
}
18Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Disk Space RequirementsBMC TrueSight Operations Management - Tivoli Storage Manager Monitoring requiresapproximately:
1.5 MBytes disk space on each monitored PATROL Agent system
2.5 MBytes disk space on each PATROL Console system
600 KBytes disk space on each PATROL Central Console Server system
1.4 MBytes disk space on each PATROL Central Web Server system
The Tivoli Storage Manager KM is installed under the PATROL installation path.
When monitoring a standard installation of Tivoli Storage Manager, the PATROL Agent willgenerate approximately 500 KBytes of history data per day. An enterprise installation of TivoliStorage Manager on a server with multiple storage agents, clients, automated libraries, andmanual drives will generate more history data (as per other KMs used by the PATROL Agent).These history data files are recycled by PATROL depending on the PATROL Agent historyretention period.
During execution, the Tivoli Storage Manager KM creates and maintains temporary files under KM_HOME, KM_TEMP and KM_DEBUG paths. By default they are all under PATROL_HOME/lib/TSM, where PATROL_HOME path is normally /opt/bmc/Patrol3/ (on Unix) or C:\Program Files(x86)\BMC Software\Patrol3\ (on Microsoft Windows). Please make sure you have sufficientspace under KM_TEMP and KM_DEBUG paths.
If the location of the KM_TEMP or KM_DEBUG is not suitable, it can be changed using theConfiguration > Paths menu from the main instance. These folder should have read, write andexecute permissions for both the PATROL Agent user and the KM login user.
Remote Monitoring RequirementsRemote monitoring is required for all servers on which no PATROL Agent can be installed. Thisfeature is also interesting if you lack resources or time to deploy a PATROL Agent and TivoliStorage Manager KM on several servers since it allows to monitor multiple hosts from onePATROL Agent.
Remote monitoring is not possible f rom a UNIX/Linux PATROL Agent system to a Windows-based TSMserver.
The requirements listed below must be met to be able to use remote monitoring.
19 Requirements
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
JAVA
BMC TrueSight Operations Management - Tivoli Storage Manager Monitoring requires Java 1.6 orhigher and a Java Runtime Environment (JRE) to be installed on the same system that runs thePATROL Agent.
The solution will automatically detect the JRE path if it has been installed in the default locationor under the BMC PATROL Agent installation path. If it has been installed in a different location,you will have to set it to the PATH for the PATROL Agent default account before starting thePATROL Agent.
You can download the Java Runtime Environment along with the KM on the Sentry Software Website.
SSH/WMI Connection
An SSH (UNIX/Linux platforms) or a WMI (Windows platforms) connection is required to monitorremote TSM servers. When using an SSH connection, the SSH host key authentication must bedisabled on the remote host.
Disabling the SSH Host Key Authentication
SSH host key authentication is enabled by default on most TSM servers. To disable it:
1. Open the global SSH configuration file (ssh_config) stored in the /etc/ssh/ directory on theremote host
2. Add the line StrictHostKeyChecking no
3. Save the file.
21
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Once the latest version of the solution has been loaded into Central Monitoring Administration,administrators can create all the installation packages required for their different operatingsystems and platforms and save them for later use in the Monitoring Installation Packages list.These packages can then be deployed to multiple computers. Administrators just have toconnect to TrueSight Operations Management from the server where they want to install thepackage, download it and launch the installation.
This section describes the different steps to follow to install Tivoli Storage Manager KM:
Importing Tivoli Storage Manager KM into Central Monitoring Administration
Creating the Installation Package
Downloading the Installation Package
Installing the Package
22
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Importing the Monitoring Solutioninto Central AdministrationThe TrueSight Central Monitoring Repository includes the current versions of BMC TrueSightOperations Management - Tivoli Storage Manager Monitoring that you can use with BMCTrueSight. If the version available in the Repository does not correspond to the latest one, youwill have to manually import it:
1. Log on to the BMC TrueSight Operations Management Console.
2. Launch Central Monitoring Administration.
3. Click the Repository drawer and select Manage Repository.
4. Check that the version of the BMC component available is actually the latest one. If not,download the latest version corresponding to your operating system (Windows or UNIX/Linux) available on the Sentry Software Website.
5. From TrueSight Operations Management, click Import .
6. Select Single solution.
7. Browse to the .zip source file.
8. Click Import.
The selected archive file is imported to the repository.
23 Importing the Monitoring Solution into CentralAdministration
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Creating the Installation PackageThe installation package to deploy to managed systems can be created directly from TrueSightOperations Management:
1. Log on to TrueSight Operations Management
2. Click the Repository drawer and select Deployable Package Repository.
3. Click Add .
4. Select the operating system and platform for which you want to create a package. Thecomponents available in the repository for the selected operating system and platform aredisplayed.
5. Select the Installation Package Component:
From the Available components list, select the relevant component.
From the Version list, select the latest version.
Click the right arrow button to move the component into the Selected Components list.By default, the appropriate BMC PATROL Agent for the operating system and platform thatyou chose is included in the Selected components list.
Click Next. The Add Component Installation Package wizard are displayed.
6. Go through the wizard and specify the required PATROL information. The InstallationPackage Details is displayed.
7. Verify that:
the operating system and platform are correct
the components that you want to include are listed in the Included Components list.
8. Provide the following information:
Name: Enter a unique name for the package.
(Optional) Description: Enter a description of the package. The description is displayed inthe Monitoring Installation Packages list on the Monitoring Repository window.
Format: Select a file compression format for the package.
9. Click Save Installation Package.
10. Click Close. The package is now available in the Monitoring Installation Packages list.
24Creating the Installation Package
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Downloading the Installation PackageYou can download an installation package and install the components on one or more hosts. Theinstallation runs silently with the information entered during package creation.
RecommendationIf you defined the BMC TrueSight Integration Service variable for PATROL Agents in theinstallation package, ensure the agents are started in phases. Do not start newly deployedagents all at once. Start and configure monitoring for the agents in planned phases to reducethe performance impact on the Integration Service nodes and on the BMC TrueSight Serverassociated with the automatic workflow process.
1. Log on to TrueSight Operations Management from the computer on which the PATROL Agentis installed or to be installed.
2. Click the Repository drawer and select Deployable Package Repository.
3. (Optional) To filter the list of installation packages, select an operating system from the Filter by Operating System list.
4. Click the link for the installation package that you want to download.
5. Through the browser's download dialog box, save the installation package.
Installing the PackageThis chapter provides a step by step procedure to install a monitoring solution package:
1. From the computer on which you want to install the package, log on to TrueSight OperationsManagement.
2. (Optional) To filter the list of installation packages, select an operating system from the Filter by Operating System list.
3. Click the link for the installation package that you want to download.
4. Through the browser's download dialog box, save the installation package in a temporaryfile.
5. Extract the installation package that is appropriate for your operating system. The package isextracted to the bmc_products directory on the current host.
6. From the bmc_products directory, run the installation utility for your operating system:
(UNIX or Linux) RunSilentInstall.sh
(Microsoft Windows) RunSilentInstall.exe
The package is installed on the current host. If the package includes a BMC PATROL Agent, theagent sends a configuration request by passing its tags to Central Monitoring Administration, viathe Integration Service. Central Monitoring Administration evaluates policies that match thetags, determines the final configuration to be applied, and sends the configuration informationback to the agent. Monitoring is based on the configuration information received by the agent.
26
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
You configure monitoring of Tivoli Storage Manager KM when you create a policy. A policy is atemplate containing the configuration of a PATROL Agent. A policy can be assigned to one ormore PATROL Agents using a unique tag (Central Monitoring Administration tag), and a PATROLAgent can be assigned one or more policies with different priorities.
If you have not already added the Central Monitoring Administration tag to your PATROL Agentsduring the solution installation, then you must manually assign the tag after you have configuredthe policy. For details, see Adding Central Monitoring Administration Tags.
27
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring Monitor SettingsWhen you create a policy, you can configure monitor types. The Add Monitor Types dialog boxpresents configuration fields for compatible BMC PATROL monitoring solutions that are locatedin the Central Monitoring Repository.
To configure the Monitor Type settings
To add a monitor type:
1. Log on to Central Monitoring Administration.
2. In the Navigation pane, click the Policies drawer and select a policy view (e.g. All).
3. Click Add .
4. Configure the policy general settings and click Next.
5. In the Monitoring Policy Configuration window, click Add .
6. From the Monitoring Solution menu, select Tivoli Storage Manager.
7. From the Version menu, select the required version.
28Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
8. From the Monitor Type menu, select the required monitor:
Monitor Type Description
Tivoli Storage Manager KM To set the general settings of Tivoli Storage Manager KM (credentials, debugmode, instances, multi-node mode, etc.)
TSM Automated Drive Enables access to the filtering options to select the automated driveselements that will be monitored.
TSM Automated Library Enables access to the filtering options to select the automated librarieselements that will be monitored.
TSM Client Enables access to the filtering options to select the clients elements that willbe monitored.
TSM Daemon Enables access to the filtering options to select the daemons elements thatwill be monitored.
TSM Domain To:enable access to the filtering options to select the domains elements thatwill be monitoredset backup restrictions.
TSM Domain Client Node Enables access to the filtering options to select the domain client nodeselements that will be monitored.
TSM Job To indicate:how long the jobs in OK, Suspicious, and Failure status will be monitored.the status the jobs will have when the monitoring period is over.
TSM Manual Drive Enables access to the filtering options to select the manual drives elementsthat will be monitored.
TSM Mount Request To indicate how long the mount requests will be monitored.
TSM Process To indicate how long the processes will be monitored.
TSM Storage Pool Enables access to the filtering options to select the storage pools elementsthat will be monitored.
29 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring the Tivoli Storage ManagerSolutionBefore using Tivoli Storage Manager KM, you'll have to configure its general settings. This sectionwill learn you how to:
Specify the Tivoly Storage Manager servers to be monitored.
Configure the user account.
Configure the remote connection settings.
Possibly configure the advanced settings (Discovery Overrides, debug mode, number ofinstances, and multi-node monitoring mode).
30Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
1. Configuring Tivoli Storage Manager Servers MonitoringTo specify the remote or local Tivoli Storage Manager server or the Tivoli Storage Managerappliance to be monitored:
1. Create a new monitor type.
2. From the Monitor Type menu, select Tivoli Storage Manager KM.
3. In the TSM Server section:
TSM Server Configuration
Enter the TSM server instance ID for the Tivoli Storage Manager server instance
Enter the Hostname, IP Address, or FQDN of the Tivoli Storage Manager server to bemonitored
Specify whether the Tivoli Storage Manager server is a UNIX/Linux or Windows system
Check Create a Device in the Console if you want the Tivoli Storage Manager server toappear as a separate device in TrueSight OM
4. You will then have to configure the user account to be used.
31 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
2. Configuring the User AccountAn operating system login as well as a TSM Admin Client login must be configured in BMCTrueSight Operations Management to monitor a Tivoli Storage Manager server. Refer to the Security Requirements chapter for detailed information about login requirement.
On Unix platforms, you can use the following user accounts:
a root user
a non-root user, such as patrol, that has sudo privileges on Tivoli Storage Manager to executeapplication programs and access file systems
a non-root account, such as patrol, configured in the Tivoli Storage Manager application toadminister the Tivoli Storage Manager application.
On Windows platforms, you can use the following user accounts:
an administrator user
a non-administrator account, such as patrol, configured in the Tivoli Storage Managerapplication to administer the Tivoli Storage Manager application.
32Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
To configure the user account1. Specify the Tivoli Storage Manager Server to be monitored
2. Locate the TSM Credentials section:
3. To use:
To use the default PATROL Agent Account, check the Use Agent Default Account box
To use a different user account, enter the login details in the Username and Passwordfields
(UNIX Only) If the user account has sudo privileges, check the Use Sudo box and indicatethe sudo binary file path (by default: /usr/local/bin/sudo)
4. (UNIX Only) If the user account has sudo privileges, check the Use Sudo box and indicate thesudo binary file path (by default: /usr/local/bin/sudo).
5. Specify the TSM Admin Client User ID and Password.
6. Indicate the DSMADMC file path on the PATROL Agent system. By default, the solutionsearches for the default TSM Backup Admin Client installation path.
7. Click Add to List.
8. (Optional) You can now configure advanced settings.
33 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
3. Configuring Advanced SettingsOnce the Tivoli Storage Manager server to be monitored and the account to be used arespecified, you can configure the following advanced settings:
The TSM server discovery overrides
The remote connection settings
The maximum number of instances
The multi-node monitoring mode
The debug mode
Configuring TSM Server Discovery Overrides (Optional)
The solution automatically discovers the Tivoli Storage Manager installation path, the DSM_DIRand DSM_LOG directory paths, the DSM_CONFIG file path, the temporary directory path used byTivoli Storage Manager KM, the node type, and the node status. This information can however beoverridden.
To configure TSM server discovery overrides1. Specify the Tivoli Storage Manager server to be monitored and the user account to be used.
2. In the Advanced Settings section, click the Discovery Overrides button.
Accessing Advanced Settings
34Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
3. The Discovery Overrides dialog is displayed.
Configuring Discovery Overrides Options
4. Provide the following information:
the TSM Installation path
the DSM_DIR Directory path
the DSM_CONFIG File path
the DSM_LOG Directory path
the Remote Temp Directory path
the Local Temp Directory path
The DSM_CONFIG f ile will contain the .opt f ile that specif ies the TSM server instance ID and the requiredconnection setting used by the TSM Admin Client to connect to the TSM server instance.
5. Configure the Node Type: Select the the Node Type (Server or Storage Agent).
6. Provide the Node Status Alarms and Warnings: Enter the regular expressions to determinethe Node Status in Alarm or Warning status. This regular expression will be used on theresult from DSMADMC command: "query status" on the TSM server.
7. Click Close.
35 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring Remote Connection SettingsIf you configured the monitoring of a remote host, you may want to specify the time after whichthe connection to the remote node will timeout or the maximum number of simultaneousconnections allowed to the remote node. This configuration is possible through the AdvancedSettings options.
To configure the remote connection settings1. Specify the Tivoli Storage Manager server to be monitored and the user account to be used.
2. In the Advanced Settings section, click the Advanced button.
Accessing Advanced Settings
3. The Advanced dialog is displayed.
Advanced Settings Options
36Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
4. In the Remote Connection Settings section, click Connection Settings.
5. Provide the required values:
Configuring Connection Settings
Connection Timeout (in Seconds): Enter the number of seconds after which the connectionto the remote node will timeout.
Maximum Connections: Enter the maximum number of simultaneous connections allowedto the remote node.
6. Click Close on all pop-ups.
7. Click Add to List in the main window.
Remote monitoring cannot be performed from UNIX/Linux PATROL Agent to Windows TSM server.
Configuring the Maximum Number of Instances
By default, the solution monitors all the elements discovered, which may represent an importantworkload to the agents and servers. Because the monitoring of some elements may be irrelevantfor various reasons, you can configure the maximum number of instances to be monitored.
Because increasing the number of instances may impact the performance of the solution, it is recommendedto only monitor critical elements in large environments.
To configure the maximum number of instances1. Specify the Tivoli Storage Manager server to be monitored and the user account to be used.
2. In the Advanced Settings section, click the Advanced button.
Accessing Advanced Settings
37 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
3. The Advanced dialog is displayed.
Advanced Settings Options
38Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
4. In the Maximum Number of Instances section, click Instance Max.
5. For each monitored element, indicate the maximum number of instances to be displayed:
Configuring Maximum Number of Instances
6. Enter 0 in the relevant field to disable the monitoring of a specific element.
7. Click Close on all pop-ups.
8. Click Add to List in the main window.
Configuring the Multi-Node Monitoring Mode
If the Tivoli Storage Manager environment is installed in a cluster using Veritas Cluster Server,Veritas Cluster File System, Oracle Solaris Cluster or Microsoft Cluster, Tivoli Storage Manager KMmust be installed on all the cluster nodes to enable continuous monitoring and avoid single pointof failure. To avoid duplicate alerts from multiple nodes, it is recommended to configure thesolution to operate in multi-node monitoring mode.
39 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
To configure the multi-node monitoring mode1. Specify the Tivoli Storage Manager server to be monitored and the user account to be used.
2. In the Advanced Settings section, click the Advanced button.
Accessing Advanced Settings
3. The Advanced dialog is displayed.
Advanced Settings Options
40Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
4. In the Multi-node Monitoring Mode section, click Multi-node Mode Config...
5. Configure the multi-node mode:
Configuring Multi-node Mode
6. Select the appropriate Cluster Application: Veritas Cluster Server, Veritas Cluster FileSystem, Oracle Solaris Cluster or Microsoft Cluster.
Indicate the Failover Group Name. Leave this field blank if you previously selected VeritasCluster File System. Then the Tivoli Storage Manager KM will monitor the entire clusterfrom the active master system, which is identified by the “vxdctl -c mode” command. Thismethod requires vxconfigd in enable mode with its clustered state active.
In the Monitoring Node Names field, name all the nodes where the solution is installed.The list must be delimited by commas.
7. (Optional) Allow the solution to check the monitoring mode of the remote PATROL Agents. Ifthe Remote PATROL Agent Checking is disabled, the solution will monitor actively throughactive master system or on the node where failover group is online and will not check themonitoring status of the other nodes through PATROL Agent:
Check the Enable Remote PATROL Agent Checking box.
Click the Remote Agent button. The following dialog box is displayed:
41 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring Remote Agent Settings
In the Monitoring Node Name field, indicate the cluster node used for multi-node modefailover
Indicate all the information required to communicate with the remote PATROL Agent(protocol, port number, and credentials)
In the Number of Attempts field, indicate how many times the solution will try tocommunicate with the remote PATROL Agent before failing over
Enter the timeout between attempts, in seconds
Click Add to List
Resume the procedure for all the nodes previously listed
42Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
8. Click Close on all pop-ups.
9. Click Add to List in the main window.
Tivoli Storage Manager will then be monitored through the active or online node. The othernodes, which are standing by for a failover, will be in passive multi-node mode and only the localTivoli Storage Manager components will be monitored.
If a managed node is unable to determine the system which should be in Active Multi-node Mode, it willchange to Temporary Single-node Mode.
Enabling the Debug ModeWhen you encounter an issue and wish to report it to Sentry Software, you will be asked toenable the Debug Mode and provide the debug output to the Sentry Software support team.
To enable the debug mode1. Specify the Tivoli Storage Manager server to be monitored and the user account to be used.
2. In the Advanced Settings section, click the Advanced button.
Accessing Advanced Settings
43 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
3. The Advanced dialog is displayed.
Advanced Settings Options
44Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
4. In the Debug Mode section, click Debug.
5. Select all the elements for which you want to obtain debug information:
Configuring Debug Settings
5. In the Options section, indicate:
when the system must stop logging debug information. The required format is: YYYY/MM/DD HH:MM:SS
where the debug file will be stored. The default path is: <PATROL_HOME>/lib/TSM/debug
7. Click Close on all pop-ups
8. Click Add to the List in the main window.
When the debug end time is reached, a tar/zip file is automatically created under <PATROL_HOME>/lib/TSM/ and can be sent to the BMC Support for help. It is also recommendedto check the TSM_<port>.log file, stored in <PATROL_HOME>/log, for any error.
45 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring Other Monitor TypesConfiguring Automated DrivesBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered automated drives for a local or remote TSM server. However, it ispossible to apply filters to specify whether or not specific drives will be monitored.
To configure the monitoring of automated drives1. Add or edit a monitor type and select TSM Automated Drive as a Monitor Type.
Configuring Automated Drives Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the drives thatwill be monitored.
4. (Optional) In the Additional Automated Drives (manual discovery), click Manual Add to addspecific drives you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
46Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring Automated LibrariesBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered libraries for a local or remote TSM server. However, it is possible toapply filters to specify whether or not specific libraries will be monitored.
To configure the monitoring of automated libraries1. Add or edit a monitor type and select TSM Automated Library as a Monitor Type.
Configuring Automated Libraries Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the librariesthat will be monitored.
4. (Optional) In the Additional Automated Libraries (manual discovery), click Manual Add toadd specific libraries you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
47 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring ClientsBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered clients for a local or remote TSM server. However, it is possible toapply filters to specify whether or not specific clients will be monitored.
To configure the monitoring of clients1. Add or edit a monitor type and select TSM Client as a Monitor Type.
Configuring Clients Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the clients thatwill be monitored.
4. (Optional) In the Additional Clients (manual discovery), click Manual Add to add specificclients you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
48Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring DaemonsBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered daemons for a local or remote TSM server. However, it is possible toapply filters to specify whether or not specific daemons will be monitored.
To configure the monitoring of daemons1. Add or edit a monitor type and select TSM Daemon as a Monitor Type.
Configuring Daemons Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the daemonsthat will be monitored.
4. (Optional) In the Additional Daemons (manual discovery), click Manual Add to add specificdaemons you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
49 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring DomainsBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered domains for a local or remote TSM server. However, it is possible toapply filters to specify whether or not specific domains will be monitored.
To configure the monitoring of domains1. Add or edit a monitor type and select TSM Domain as a Monitor Type.
Configuring Domains Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
50Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the domainsthat will be monitored.
4. (Optional) In the Additional Domains (manual discovery), click Manual Add to add specificdomains you wish to monitor.
5. If you want a warning to be triggered when a backup is started during a specific period oftime, configure a backup restriction window:
Check the Enable Backup Restriction Window box
Indicate the Restriction Start and End Time. The format required is HH:MM:SS and therestriction window must at least last 5 minutes
6. Click Add to list.
7. Click Add.
Configuring Domain Client NodesBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered domain client nodes for a local or remote TSM server. However, it ispossible to apply filters to specify whether or not specific domain client nodes will bemonitored.
To configure the monitoring of domain client nodes1. Add or edit a monitor type and select TSM Domain Client Nodes as a Monitor Type.
Configuring domain client nodes Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Manager
51 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
servers
a hostname or IP address to apply these settings to a specific server
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the domainclient nodes that will be monitored.
4. (Optional) In the Additional Domain Client Nodes (manual discovery), click Manual Add toadd specific domain client nodes you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
Configuring JobsBy default, the Tivoli Storage Manager KM monitors all scheduled jobs that completedsuccessfully for 24 hours and any other scheduled job for 72 hours. This monitoring duration canhowever be modified to better suit your requirements.
Increasing the monitoring duration may affect the performance of the application.
To configure jobs1. Add or edit a monitor type and select TSM Job as a Monitor Type.
Configuring Tivoli Storage Manager Server Jobs
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
52Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
a hostname or IP address to apply these settings to a specific server
3. In the Monitoring Duration section:
Indicate how many hours the jobs in OK, Suspicious, and Failure status will be monitored
Uncheck Keep Monitoring Active Jobs Indefinitely if you prefer not to monitor active jobswhen their duration exceeds the monitoring duration set above
5. Click Add to List
6. Click Add.
7. Finally, Update the policy.
Configuring LogsBMC TrueSight Operations Management - Tivoli Storage Manager Monitoring scans log files byreading the new log entries since the last data collection cycle. By default, only 500 KBytes ofdata is scanned for each log file during each data collection cycle. This log scan limit can howeverbe modified to better suit your requirements.
Increasing the Log Scan Limit may impact the performance of the data collector (TSMLogCollector), themonitoring solution, and the PATROL Agent.
To customize the log scan limit1. Add or edit a monitor type
2. Select TSM Log as a Monitor Type.
Configuring the Logs Monitoring
3. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on TSM Servers
a hostname or IP address to apply these settings to a specific server
53 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
4. In the Log Scan Limit field, indicate the amount of data (in KBytes) that will be read by themonitoring solution during each data collection cycle (Default is 500 kBytes).
5. In the Actlog Query Limit field, indicate the maximum query limit (in minutes). By defaultthe solution queries up to 300 minutes (5 hours) of actlog data.
6. Click Add to List.
7. Click Add.
8. Finally, Update the policy.
Configuring Manual DrivesBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered manual drives for a local or remote TSM server. However, it ispossible to apply filters to specify whether or not specific drives will be monitored.
To configure the monitoring of manual drives1. Add or edit a monitor type and select TSM Manual Drive as a Monitor Type.
Configuring Manual Drives Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
54Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the drives thatwill be monitored.
4. (Optional) In the Additional Manual Drives (manual discovery), click Manual Add to addspecific drives you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
Configuring Mount RequestsBy default, the Tivoli Storage Manager KM monitors all mount requests for 24 hours. Thismonitoring duration can however be modified to better suit your requirements.
Increasing the monitoring duration may affect the performance of the application.
To configure the monitoring of mount requests1. Add or edit a monitor type and select TSM Mount Request as a Monitor Type.
Configuring Mount Requests Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. In the Mount Request Configuration section, indicate how many hours the mount requestswill be monitored.
4. Click Add to List.
5. Click Add.
55 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring TSM ProcessesBy default, the Tivoli Storage Manager KM monitors all processes for 24 hours. This monitoringduration can however be modified to better suit your requirements.
Increasing the monitoring duration may affect the performance of the application.
To configure the monitoring of processes1. Add or edit a monitor type and select TSM Process as a Monitor Type.
Configuring Processes Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. In the Process Configuration section, indicate how many hours the processes will bemonitored.
4. Click Add to List.
5. Click Add.
56Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Configuring Storage PoolsBy default, BMC TrueSight Operations Management - Tivoli Storage Manager Monitoringmonitors all the discovered storage pools for a local or remote TSM server. However, it ispossible to apply filters to specify whether or not specific storage pools will be monitored.
To configure the monitoring of storage pools1. Add or edit a monitor type and select TSM Storage Pool as a Monitor Type.
Configuring Storage Pools Monitoring
2. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage Managerservers
a hostname or IP address to apply these settings to a specific server
3. (Optional) In the Filtering (automatically discovered), click Filtering to specify the storagepools that will be monitored.
4. (Optional) In the Additional Storage Pools (manual discovery), click Manual Add to addspecific storage pools you wish to monitor.
5. Click Add to List.
6. Click Add.
7. Finally, Update the policy.
57 Configuring Monitor Settings
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Filtering Elements to MonitorFiltering options are available for the following monitor types: TSM Automated Drive, TSMAutomated Library, TSM Client, TSM Daemon, TSM Domain, TSM Domain Client Node, TSMManual Drive, and TSM Storage Pool.
To filter elements to monitor1. Add or edit a monitor type
2. Select the Monitor Type for which you wish to apply filters.
3. In the Hostname field, enter:
localhost to apply these settings to all PATROL Agents installed on Tivoli Storage ManagerServers
a hostname or IP address to apply these settings to a specific server
4. Indicate which elements will be monitored:
Click the Filtering button
In the Keep Only... section, indicate the regular expression for the element to bemonitored and click Add to List
In the Exclude... section, indicate the regular expression for the element not to bemonitored and click Add To List
Resume procedure to keep and/or exclude as many elements as required
Click Close
5. If needed, manually add elements to be monitored:
Click the Manual Add button
Indicate the element to be monitored and click Add to List
Resume procedure to add as many elements as required
Click Close
6. Click Add to List.
7. Click Add.
8. Finally, Update the policy.
59
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Introduction
This chapter provides statistical information about resources, operating status, and performancesmanaged by the Tivoli Storage Manager KM. It contains tables describing the attributes used inthe monitoring solution, grouped by Monitor Types, and provides a brief description of eachattribute and its default settings.
Monitor Types
Tivoli Storage Manager KM
TSM Clients
TSM Client
TSM Daemons
TSM Daemon
TSM Databases
TSM Database
TSM Logs
TSM Log
TSM Domains
TSM Domain
TSM Jobs
TSM Job
TSM Mount Requests
TSM Mount Request
TSM Automated Libraries
TSM Automated Library
TSM Manual Drive
TSM Automated Drives
TSM Automated Drive
TSM Domain Client Node
TSM Storage Pools
TSM Storage Pool
TSM Processes
TSM Process
60
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Baselines and Key Performance Indicators
Some attributes are identified by default as Key Performance Indicators (KPIs) and thereforeautomatically included in the base lining calculation. To learn more about auto baselining andKPIs, please refer to the Managing Baselines and Key Performance Indicators chapter.
In this guide, attributes flagged as KPIs are respectively identified by the following icon: .
61
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Tivoli Storage Manager KMAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Login Status Monitors the status ofthe TSM KM logindetails (username/password) for theoperating system andDSMADMC.
If no valid username/password is detectedfor the operatingsystem or DSMADMC,this attribute will beset to Failure. If thereare any suspiciouscommand exits, thisattribute will be set toSuspicious.
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Collection Status
Monitoring Mode Monitors the failovermode of the TSM KM.By default TSM KMruns in PermanentSingle-node Mode.
0 =PermanentSingle-nodeMode1 =TemporarySingle-nodeMode2 = ActiveMulti-nodeMode3 = PassiveMulti-nodeMode-1 =Unknown
n/a Collection Status
Node Status Monitors the errormessages generated forthe Tivoli StorageManager applicationon the managedsystem.
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
62Tivoli Storage Manager KM
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM ClientsAttributes
Name Description Units Recommended AlertConditions
AttributeTypeType
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restartthe PATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMClientCollectorExecTi
me", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximumtime. This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMClientCollectorWarn",
3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
63 TSM Clients
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM ClientAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Last Access ElapsedTime
Displays the timeelapsed since the lastcommunication fromthe client.
Hours None Statistics
Space Used Displays the amount ofspace used on theclient node.
Gigabytes(GB)
None Statistics
State Displays the state ofthe client.
0 = Running1 = Locked2 = NeverCommunicated-1 =Unknown
None Availability
Status Displays the clientstatus. The followingState to Statusmapping rule is used:
NeverCommunicated >FailureUnknown > FailureLocked > SuspiciousAll other states > OK
0 = OK1 =Suspicious 2 = Failure
Warning = 1Alarm =2
Availability
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
64TSM Client
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM DaemonsAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard attributemonitors the collector executiontime. To activate this attribute,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDaemonsCollectorExecT
ime", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximumtime. This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDaemonCollectorWarn",
3600);
Seconds Warning:> presetvalue orobservedmaximum(default)
CollectionStatus
65 TSM Daemons
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM DaemonAttributes
Name Description Units Recommended AlertConditions
Attribute Type
CPU Duration Displays the CPUseconds consumed bythe daemon.
Seconds None Statistics
CPU Utilization Displays thepercentage of CPU used by the daemon.
Percentage(%)
None Statistics
Memory Size Displays the coreimage size of thedaemon in the virtualmemory.
Kilobytes(KB)
None Statistics
Processes Count Displays the number ofdaemon processes/threads found.
Processes None Statistics
State Displays the state ofthe daemon asreported in thecommand executed bythe data collector.
0 = Running1 = Sleeping2 = Waiting3 = Queued4 =Intermediate5 =Terminated6 = Stopped/Disabled7 = Growing8 =Nonexistent/NotResponding9 = NotRunning-1 =Unknown
None Availability
Status Monitors the status ofthe daemon. Thefollowing State toStatus mapping rule isused:
Nonexistent/NotResponding > FailureNot Running >FailureTerminated orStopped >Suspicious
0 = OK1 =Suspicious 2 = Failure
None Availability
66TSM Daemon
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
Growing or Unknown> SuspiciousAll other states > OK
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
67 TSM Daemon
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM DatabasesAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDatabaseCollectorExec
Time", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximumtime. This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDatabaseCollectorWarn
", 3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
68TSM Databases
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM DatabaseAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Backup Elapsed * Displays the elapsedtime since the lastsuccessful databasebackup.
Hours None Statistics
Buffer Request
Count *Displays thecumulative number ofrequests for databasepages since the bufferpool was last reset (orsince the server waslast started).
Count None Statistics
Cache Hit Percent * Displays (as apercentage of the totalnumber of requests)the number of requestsfor a database pagesthat are already in thebuffer pool.
Percentage(%)
None Statistics
Cache Wait Percent
*Displays (as apercentage of the totalnumber of requests)the number of requestsfor database bufferpool pages where nopages are available,because all pages arein use.
Percentage(%)
None Statistics
File System Space
Used Percent *Monitors thepercentage of spaceused by the file systemwhere the databaseresides.
Percentage(%)
Warning = 95-98 Alarm > 98
Statistics
Log Consumed Size * Displays thecumulativeconsumption of the logspace used by theserver since the lastreset of this attribute.
Megabytes(MB)
None Statistics
69 TSM Database
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
Log Pool Used
Percent *Displays (as apercentage of allrecovery log bufferpool pages) thenumber of buffer poolpages used to writechanges to therecovery log after atransaction iscommitted.
Percentage(%)
None Statistics
Log Pool Wait
Percent *Set by TSMDatabaseCollector.Displays (as apercentage of allrecovery log bufferpool requests) thenumber of requests forbuffer pool pageswhere no pages areavailable because all
pages are in use.
Percentage(%)
None Statistics
Pool Hit Percent * Displays (as apercentage of the totalnumber of requests)the number of requestsfor database pagesthat are already in thebuffer pool.
Percentage(%)
None
Reorg Elapsed * Displays the elapsedtime since the lastdatabasereorganization.
Hours None Statistics
Space Available Monitors the amountof assigned spaceremaining availablefor use by the serverdatabase.
Megabytes(MB)
Warning = 2-5Alarm < 2
Availability
Space Changed * Displays the databasepages (in megabytes)that have changedsince the last backup.
Megabytes(MB)
None Statistics
Space Changed
Percent *Displays thepercentage of databasepages that havechanged since the lastbackup.
Percentage(%)
None Statistics
Space Growth Rate Displays the growthrate of the space usedby the server database.
Megabytesper second(MB/s)
None Statistics
70TSM Database
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
Space MaxExtension
Displays the maximumamount the databasecan be extended by.
Megabytes(MB)
None Statistics
Space MaxReduction
Displays the maximumamount the databasecan be reduced by.
Megabytes(MB)
Warning: 4-8Alarm: less than 4
Statistics
Space Used Displays the amount ofassigned space usedby the serverdatabase.
Megabytes(MB)
None Statistics
Space Used Percent Monitors thepercentage of assignedspace used by theserver database.
The total assignedspace is the usedspace (Space Used)plus the availablespace (SpaceAvailable).
Percentage(%)
None Statistics
* This attribute is only available for the server database (db).
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
71 TSM Database
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM LogsAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMLogCollectorExecTime",
1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximum time.This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMLogCollectorWarn",
3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
72TSM Logs
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM LogAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Alarm MessageCount
Monitors the numberof alarm messages.
Count Alarm > 1 Statistics
File Space GrowthRate*
Displays the growthrate of the amount ofspace used by the logfile.
Kilobytes persecond (KB/s)
None Statistics
File Space Used* Displays the amount ofspace used by the logfile.
Kilobytes(KB)
None Statistics
File System SpaceUsed Percent*
Monitors thepercentage of spaceused by the file system(where the log fileresides).
Percentage(%)
Warning = 95-98Alarm: > 98
Statistics
Space Available* Monitors theavailable space for thelog file to use (this isalso the availablespace on the filesystem).
Megabytes(MB)
Warning = 2-5Alarm < 2
Availability
Space Used Percent* Monitors thepercentage of capacityused by the log file.
The total capacity isthe used space (LogSpace Used) plusavailable space (LogSpace Available).
Percentage(%)
Warning = 95-98Alarm: > 98
Statistics
Warning MessageCount
Monitors the numberof warning messages.
Count Warning > 1 Statistics
*This attribute is not available for the activity log (actlog).
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
73 TSM Log
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM DomainsAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restartthe PATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDomainCollectorExecTi
me", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximumtime. This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDomainCollectorWarn",
3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
74TSM Domains
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM DomainAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Backup Elapsed Displays the elapsedtime since the lastbackup for thisdomain, regardless ofcompletion status ofthe backup.
Hours None Statistics
Backup Throughput Displays thethroughput of the lastsuccessful backup forthis domain.
Gigabytesper second(GB/s)
None Statistics
Full BackupDuration
Displays the durationof the last successfulfull backup for thisdomain.
Seconds None Statistics
Full BackupElapsed
Displays the elapsedtime since the lastsuccessful full backupfor this domain.
Hours None Statistics
Full Backup ObjectCount�
Displays the number ofobjects backed up inthe last successful fullbackup for thisdomain.
Count None Statistics
Full Backup Size Displays the size of thelast successful fullbackup for thisdomain.
Gigabytes(GB)
None Statistics
Incremental BackupDuration
Displays the durationof the last successfulincremental backup forthis domain.
Seconds None Statistics
Incremental BackupElapsed
Displays the elapsedtime since the lastsuccessful incrementalbackup for thisdomain.
Hours None Statistics
Incremental BackupObject Count
Displays the number ofobjects backed up inthe last successfulincremental backup forthis domain.
Count None Statistics
75 TSM Domain
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
Incremental BackupSize�
Displays the size of thelast successfulincremental backup forthis domain.
Gigabytes(GB)
None Statistics
State Displays the state ofthe domain.
0 = Idle1 = Running2 = Runningin RestrictedWindow3 = NotStarted4 = Inactive-1 =Unknown
None Availability
Status Monitors the status ofthe domain. Thefollowing State toStatus mapping rule isused:
Running in restrictedwindow > FailureRunning for morethan 600 minutes >SuspiciousUnknown >SuspiciousAll other states > OK
0 = OK1 =Suspicious2 = Failure
None Availability
Successful BackupElapsed
Displays the elapsedtime since the lastsuccessful backup forthis domain.
hours None Statistics
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
76TSM Domain
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM JobsAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Active BackupCount
Displays the number ofactive backup jobscurrently discoveredand monitored.
Count None Statistics
Active Count Displays the number ofactive jobs currentlydiscovered andmonitored.
Count None Statistics
Active Non-BackupCount
Displays the number ofactive non-backup jobscurrently discoveredand monitored.
Count None Statistics
Exec Time Inactive standardparameter monitorsthe collectorexecution time. Toactivate thisparameter, use thePSL below, andrestart the PATROLAgent:
%PSL
pconfig("REPLA
CE", "/
Runtime/TSM/
<node-id>/
TSMJobCollecto
rExecTime",
1);
When activated itwill run everyminute and trigger awarning when thecollector runs formore than theobserved maximumtime. This maximumtime can beoverridden by apreset value(example: 3600seconds), using thePSL below:
Seconds Warning > preset value orobserved maximum(default)
Collection Status
77 TSM Jobs
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
%PSL
pconfig("REPLA
CE", "/
Runtime/TSM/
<node-id>/
TSMJobCollecto
rWarn", 3600);
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
78TSM Jobs
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM JobAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Duration Displays the durationof the job from thestart.
Seconds None Statistics
Error Count Monitors the numberof client node errorslogged in the serveractivity log during thisjob.
Count Warning when > 100 Statistics
NetworkThroughput
Displays thethroughput of the jobon the network.
Megabytesper second(MB/s)
None Statistics
Object Count Displays the number ofobjects inspected forthis job.
Count None Statistics
Object ExpiredCount
Displays the totalnumber of objects forthis job that haveexpired.
Count None Statistics
Object Failed Count Displays the totalnumber of objects forthis job that havefailed.
Count Warning when > 100 Statistics
Object ProcessedCount
Displays the totalnumber of objects forthis job that have beenprocessed.
Count None Statistics
Object ReboundCount �
Displays the totalnumber of objects forthis job that have beenrebound.
Count None Statistics
Object UpdatedCount
Displays the totalnumber of objects forthis job that have beenupdated.
Count None Statistics
Size Displays the amount ofdata backed up for thejob.
Megabytes(MB)
None Statistics
State Displays the state ofthe job.
0 =Completed1 = Future2 = Pending
None Availability
79 TSM Job
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
3 = InProgress4 = Started5 = Restarted6 =Completed/Errors7 = Started/Errors8 =Restarted/Errors9 = Failed -No Restart10 = Missed11 = Severed12 =Uncertain13 = Failed-1 =Unknown
Status Monitors the status ofthe job. The followingState to Status mappingrule is used:
Missed, Severed, orFailed > FailurePending for morethan 1 hour >SuspiciousStarted for morethan 5 hours >SuspiciousRestarted for morethan 5 hours >SuspiciousCompleted/Errors >SuspiciousStarted/Errors >SuspiciousRestarted/Errors >SuspiciousAll other states > OK
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
Throughput Displays thethroughput of the job.
Megabytesper second(MB/s)
None Statistics
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
80TSM Job
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Mount RequestsAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMRequestCollectorExecT
ime", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximumtime. This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMRequestCollectorWarn"
, 3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
81 TSM Mount Requests
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Mount RequestAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Elapsed Displays the elapsedtime since the mountrequest was issued.
Minutes None Statistics
State Displays the state ofthe mount request asreported in thecommand executed bythe data collector.
0 =Completed1= Pending-1 =Unknown
None Availability
Status Monitors the status ofthe mount request. Thefollowing State toStatus mapping rule isused:
Pending for morethan 30 minutes >FailurePending or Unknown> SuspiciousAll other states > OK
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
Timeout Displays the timeremaining until themount request timesout.
Minutes Alarm = 0-30 Statistics
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
82TSM Mount Request
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Automated LibrariesAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMLibraryCollectorExecT
ime", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximum time.This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMLibraryCollectorWarn"
, 3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
83 TSM Automated Libraries
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Automated LibraryAttributes
Name Description Units Recommended AlertConditions
Attribute Type
State Displays whether thepath for the automatedlibrary is online oroffline. It will notperform any remoteautomated library testcommand on thestorage agent.
0 = Online1 = Offline2 = PathOffline-1 =Unknown
None Availability
Status Monitors the status ofthe automated library.
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
Up Drive Count Displays the numberup / online state drivesin this robotic library.
Count None Statistics
Volume Count Displays the totalnumber of volumeloaded in thisautomated library.
Count None Statistics
Volume PrivateCount
Displays the number ofprivate volumes in theautomated library.
Count None Statistics
Volume ScratchCount
Displays the number ofscratch volumes in theautomated library.
Count None Statistics
Volume ScratchPercent
Monitors thepercentage of scratchvolume against thetotal number of volumeloaded in thisautomated library.
Percentage(%)
None Statistics
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
84TSM Automated Library
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Manual DriveAttributes
Name Description Units Recommended AlertConditions
Attribute Type
State Displays the state ofthe automated librarydrive. This isdetermined from theautomated librarydrive controlinformation.
0 = Online1 = Empty2 = Loaded3 = Unloaded4 = Reserved5 =Unavailable6 = DriveOffline7 = PathOffline-1 =Unknown
None Availability
Status Monitors the status ofthe automated librarydrive.
0 = OK 1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
85 TSM Manual Drive
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Automated DrivesAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDriveCollectorExecTime
", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximum time.This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMDriveCollectorWarn",
3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
86TSM Automated Drives
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Automated DriveAttributes
Name Description Units Recommended AlertConditions
Attribute Type
State Displays the state ofthe automated librarydrive. This isdetermined from theautomated librarydrive controlinformation.
0 = Online1 = Empty2 = Loaded3 =Unloaded4 = Reserved5 =Unavailable6 = DriveOffline7 = PathOffline-1 =Unknown
None Availability
Status Monitors the status ofthe automated librarydrive
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
87 TSM Automated Drive
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Domain Client NodeAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Backup Throughput
Displays thethroughput of the lastsuccessful backup forthis client node.
Megabytesper second(MB/s)
None Statistics
Last Full BackupDuration
Displays the durationof the last successfulfull backup for thisclient node.
Seconds None Statistics
Last Full BackupObject Count �
Displays the number ofobjects backed up inthe last successful fullbackup for this clientnode.
Count None Statistics
Last Full Backup Size�
Displays the size of thelast successful fullbackup for this clientnode.
Megabytes(MB)
None Statistics
Last IncrementalBackup Duration
Displays the durationof the last successfulincremental backupfor this client node.
Seconds None Statistics
Last IncrementalBackup ObjectCount
Displays the number ofobjects backed up inthe last successfulincremental backupfor this client node.
Count None Statistics
Last IncrementalBackup Size
Displays the size of thelast successfulincremental backupfor this client node.
Megabytes(MB)
None Statistics
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
88TSM Domain Client Node
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Storage PoolsAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMPoolCollectorExecTime"
, 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximum time.This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMPoolCollectorWarn",
3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
89 TSM Storage Pools
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM Storage PoolAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Space Available Monitors the availablevolume space for thebackup data to use inthis storage pool.
Gigabytes(GB)
Warning < 1Alarm = 0
Availability
Space Growth Rate Displays the growthrate of the total volumespace used by thebackup data in thisstorage pool.
Gigabytesper second(GB/s)
None Statistics
Space LogicalPercent
Displays the logicaloccupancy of thestorage pool as apercentage of the totaloccupancy.
Percentage(%)
None Statistics
Space Migrated Displays the amount ofdata that has beenmigrated, if migrationis in progress. Ifmigration is not inprogress, this valueindicates the amountof data migratedduring the lastmigration.Note: This attribute isnot available for copystorage pools.
Gigabytes(GB)
None Statistics
Space MigrationPercent
Displays an estimateof the percentage ofdata in the storagepool that can bemigrated.Note: This attribute isnot available for copystorage pools.
Percentage(%)
None Statistics
90TSM Storage Pool
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
Space MigrationElapsed �
Displays the amount oftime that has elapsedsince migration of thestorage pool began, ifmigration is active. Ifmigration is not active,this value indicates theamount of timerequired to completethe last migration.Note: This attribute isnot available for copystorage pools.
Seconds None Statistics
Space Reclaimable Displays the amount ofspace in the storagepool that isreclaimable.
Gigabytes(GB)
None Statistics
Space ReclaimablePercent
Displays the amount ofreclaimable space as apercentage of the totalstorage pool space.
Percentage(%)
None Statistics
Space Used Displays the totalvolume space occupiedby the backup data inthis storage pool.
Gigabytes(GB)
None Statistics
Space Used Percent Monitors thepercentage of totaloccupied volume spaceagainst the totalvolume capacity of thisstorage pool (notincluding any scratchvolumes).
Percentage(%)
Warning > 95Alarm > 98
Statistics
Volumes ActiveCount
Displays the number ofactive volumes in thisstorage pool.
Active volumes areavailable disk volumeswith a status of"Online" or tapevolumes with a statusof "Filling", where datahas been written butthe volume is not yetfull.
Count None Statistics
91 TSM Storage Pool
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
Volume ActivePercent�
Monitors thepercentage of activevolumes against thetotal number ofvolumes in this storagepool.
Percentage(%)
None Statistics
Volume AvailableCount
Displays the number ofvolumes assigned tothis storage pool.
Count None Statistics
Volume AvailablePercent
Monitors thepercentage ofavailable volumesagainst the totalnumber of volumes inthis storage pool.
Percentage(%)
None Statistics
Volume Count Displays the totalnumber of volumes inthis storage pool.
Count None Statistics
Volume EmptyCount
Displays the number ofempty volumes in thisstorage pool.
Empty is a possiblestatus for a tapevolume, indicating thatno data is stored onthat volume.
Count None Statistics
Volume Full Count Displays the number offull volumes in thisstorage pool.
Count None Statistics
Volume Full Percent Monitors thepercentage of fullvolumes against thetotal number ofvolumes in this storagepool.
Percentage(%)
None Statistics
Volume OfflineCount
Displays the number ofoffline volumes in thisstorage pool.
"Offline" is a possiblestatus for a diskvolume.
Count None Statistics
Volume PendingCount
Displays the number ofpending volumes inthis storage pool.
Count None Statistics
92TSM Storage Pool
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Name Description Units Recommended AlertConditions
Attribute Type
"Pending" is a possiblestatus for a tapevolume, where all fileshave been deleted buta delay has beenplaced on the volumebefore reuse.
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
93 TSM Storage Pool
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM ProcessesAttributes
Name Description Units Recommended AlertConditions
Attributes Type
Exec Time Inactive standard parametermonitors the collector executiontime. To activate this parameter,use the PSL below, and restart thePATROL Agent:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMProcessCollectorExecT
ime", 1);
When activated it will run everyminute and trigger a warningwhen the collector runs for morethan the observed maximumtime. This maximum time can beoverridden by a preset value(example: 3600 seconds), usingthe PSL below:
%PSL pconfig("REPLACE",
"/Runtime/TSM/<node-id>/
TSMProcessCollectorWarn"
, 3600);
Seconds Warning > presetvalue orobservedmaximum(default)
CollectionStatus
94TSM Processes
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
TSM ProcessAttributes
Name Description Units Recommended AlertConditions
Attribute Type
Duration Displays the durationof the process.
Seconds None Statistics
Item Count Displays the number ofitems found.
Count None Statistics
Size Displays the processsize.
Megabytes(MB)
None Statistics
State Displays the state ofthe process.
0 = Running1 = Running/Errors2 =Completed/Success3 =Completed /Failure-1 =Unknown
None Availability
Status Monitors the status ofthe process. Thefollowing State toStatus mapping rule isused:
Completed/Failure >FailureRunning/Errors orUnknown >SuspiciousRunning for morethan 10 hours >SuspiciousAll other states > OK.
0 = OK1 =Suspicious2 = Failure
Warning = 1Alarm = 2
Availability
Throughput Displays thethroughput of theprocess.
Megabytesper second(MB/s)
None Statistics
For detailed information about KPI, see Managing Baselines and Key Performance Indicators.
95 TSM Process
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Managing Baselines and KeyPerformance IndicatorsTo detect abnormalities on the monitored environment, BMC TrueSight Operations Managementcalculates baselines per attribute based on values collected over a specified period of time todetermine a normal operating range. When the collected values for these parameters are out ofrange, an alert is triggered. Some attributes are identified by default as Key PerformanceIndicators (identified with the icon) and automatically included in the base lining calculation.
Managing baselines
The baseline is the expected normal operating range for an attribute of a monitor. There are twobaselines: Baseline High and Baseline Low. Baseline High represents the point at which 95% ofthe weighted average of the historical values fall below this value for the selected time period; Baseline Low represents the point at which 90% of the weighted average of historical values forthe selected time period fall above this line.
Baselines are generated for KPI attributes that have an active abnormality thresholds.
Managing Key Performance Indicators
Starting from v9.5 of BPPM, attributes that have not been initially designated in the KM as KeyPerformance Indicators (KPIs) cannot be flagged as KPIs from BPPM/TrueSight. Although enablingbaseline is possible through the Options > Administration > Intelligent Event Thresholds featureavailable in the Infrastructure Management Server operator console, BMC does not recommenddoing it.
For more information, refer to the BMC TrueSight Operations Management documentation available f romdocs.bmc.com.
96
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Index
- A -Abnormalities 95
Access
Permissions 13
User 13Add Monitor Types 27
Attributes
Active Backup Count 76
Active Count 76
Active Non-Backup Count 76
Alarm Message Count 72
Backup Elapsed 68, 74
Backup Throughput 74, 87
Buffer Request Count 68
Cache Hit Percent 68
Cache Wait Percent 68
CPU Duration 65
CPU Utilization 65
Duration 78, 94
Elapsed 81
Error Count 78
Exec Time 62, 64, 67, 71, 73, 76, 80, 82,85, 88, 93
File Space Growth Rate 72
File Space Used 72
File System Space Used Percent 68, 72
Full Backup Duration 74
Full Backup Elapsed 74
Full Backup Object Count 74
Full Backup Size 74
Incremental Backup Duration 74
Incremental Backup Elapsed 74
Incremental Backup Object Count 74
Incremental Backup Size 74
Item Count 94
Last Access Elapsed Time 63
Last Full Backup Duration 87
Last Full Backup Object Count 87
Last Full Backup Size 87
Last Incremental Backup Duration 87
Last Incremental Backup Object Count 87
Last Incremental Backup Size 87
Log Consumed Size 68
Log Pool User Percent 68
Log Pool Wait Percent 68
Login Status 61
Memory Size 65
Monitoring Mode 61
Network Throughput 78
Node Status 61
Object Count 78
Object Expired Count 78
Object Failed Count 78
Object Processed Count 78
Object Rebound Count 78
Object Updated Count 78
Pool Hit Percent 68
Processes Count 65
Reorg Elapsed 68
Size 78, 94
Space Available 68, 72, 89
Space Changed 68
Space Changed Percent 68
Space Growth Rate 68, 89
Space Logical Percent 89
Space Max Extension 68
Space Max Reduction 68
Space Migrated 89
Space Migration Elapsed 89
Space Migration Percent 89
Space Reclaimable 89
Space Reclaimable Percent 89
Space Used 63, 68, 89
Space Used Percent 68, 72, 89
State 65, 74, 78, 81, 83, 84, 86, 94
Status 63, 65, 74, 78, 81, 83, 84, 86, 94
Successful Backup Elapsed 74
Throughput 78, 94
Timeout 81
Up Drive Count 83
Volume Active Percent 89
Volume Available Count 89
Volume Available Percent 89
Volume Count 83, 89
Volume Empty Count 89
Volume Full Count 89
Volume Full Percent 89
Volume Offline Count 89
Volume Pending Count 89
Volume Private Count 83
Volume Scratch Count 83
97
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Attributes
Volume Scratch Percent 83
Volumes Active Count 89
Warning Message Count 72Automated Drive
Maximum Instances 36Automated Drives
Debug 42Automated Libraries
Debug 42Automated Library
Maximum Instances 36
- B -Baseline 59
Baselines
BMC ProactiveNet Performance Management 95
Generation 95
Manage 95
Requirements 95BMC PATROL
Changes 11BMC ProactiveNet Performance Management
Abnormalities 95
Baselines 95
Key Performance Indicators 95
KPI 95Business Value 10
- C -Changes 7
Client
Maximum Instances 36Clients
Debug 42Cluster Application 38
Component Installation package
creating 23
downloading 24Configuration
Tivoli Storage Manager Settings 29Configure
Domains 49
Hostname 51
Jobs 51
Maximum Instances 36
Monitoring Duration 51
Mount Request 54
Multi-node monitoring mode 38
Overrides 33
Processes 55Configuring
monitor settings 27Connection
SSH 18
WMI 18Connection Timeout 35
- D -Daemon
Maximum Instances 36Daemons
Debug 42Databases
Debug 42Debug
Automated Drives 42
Automated Libraries 42
Clients 42
Daemons 42
Databases 42
Directory Path 42
Domains 42
End Time 42
Jobs 42
Logs 42
Mount Requests 42
Processes 42
Server 42
Storage Pools 42Domain
Maximum Instances 36Domain Client Node
Maximum Instances 36Domains
Configure 49
Debug 42Downloading 24
Duration
Duration 54, 55
Monitoring 54, 55
98
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
- F -Failover Group Name 38
Features 9
Filtering Options
TSM Automated Drive 57
TSM Automated Library 57
TSM Client 57
TSM Daemon 57
TSM Domain 57
TSM Domain Client Node 57
TSM Manual Drive 57
TSM Storage Pool 57Filters
TSM Automated Drive 57
TSM Automated Library 57
TSM Client 57
TSM Daemon 57
TSM Domain 57
TSM Domain Client Node 57
TSM Manual Drive 57
TSM Storage Pool 57Fixed Issues 7
- G -Generate
Baselines 95Goals 9
- I -Importing the Monitoring Solution 22
Improvements 7
Installation
configuring 26Installing 24
Installing the Monitoring Solution 21
Instances
Automated Drive 36
Automated Library 36
Client 36
Deamon 36
Domain 36
Domain Client Node 36
Job 36
Log 36
Manual Drive 36
Mount Request 36
Process 36
Storage Pool 36
- J -JAVA 18
Job
Maximum Instances 36Jobs
Active 51
Configure 51
Debug 42
Monitoring 51
- K -Key Concepts 9
Key Performance Indicators 59
BMC ProactiveNet Performance Management 95
Manage 95KPI 59
BMC ProactiveNet Performance Management 95
Manage 95
- L -Log
Maximum Instances 36Logs
Debug 42
- M -Manage
Baselines 95
Key Performance Indicators 95
KPI 95Manual Drive
Maximum Instances 36Maximum Connections 35
Monitor Settings
configuring 27
99
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Monitor Type
TSM Clients 62
TSM Daemons 64
TSM Databases 67
TSM Logs 71Monitor Types
Tivoli Storage Manager KM 59, 61
TSM Automated Drive 86
TSM Automated Drives 85
TSM Automated Libraries 82
TSM Automated Library 83
TSM Automatic Drive 59
TSM Automatic Library 59
TSM Client 59, 63
TSM Daemon 59, 65
TSM Database 59, 68
TSM Domain 59, 74
TSM Domain Client Node 59, 87
TSM Domains 73
TSM Job 59, 78
TSM Jobs 59, 76
TSM Log 59, 72
TSM Manual Drive 59, 84
TSM Mount Request 59, 81
TSM Mount Requests 80
TSM Process 59, 94
TSM Processes 93
TSM Storage Pool 59, 89
TSM Storage Pools 88Monitoring
Configure 54, 55
Duration 54, 55
Remotely 18Monitoring Duration
Jobs 51Monitoring Node Names 38
Mount Request
Configure 54
Maximum Instances 36
Monitoring Duration 54Mount Requests
Debug 42Multi-node monitoring mode
Configure 38
- O -Overrides
Configure 33
DSM_CONFIG File 33
DSM_DIR Directory 33
DSM_LOG Directory 33
Local Temp Directory 33
Node Status Warnings 33
Node Type 33
Remote Temp Directory 33
TSM Installation 33
TSM Server Discovery 33
- P -Package 23, 24
Process
Configure 55
Maximum Instances 36
Monitoring Duration 55Processes
Debug 42
- R -Reference Guide 59
Remote Connection
Settings 18Remote Connection Settings
Connection Timeout 35
Maximum Connections 35Remote PATROL Agent Checking 38
Requirements
Security 13
Software 11
System 11
- S -Security
Requirements 13Server
Debug 42Software
Requirements 11SSH 18
SSH Host Key
Authentication 18Storage Pool
100
BM
C Tr
ueSi
ght
Ope
rati
ons
Man
age
men
t -
Tivo
li St
orag
e M
anag
er
Mon
itor
ing
Ver
sion
3.0
.00
Storage Pool
Maximum Instances 36Storage Pools
Debug 42Sudo 13, 31
System
Requirements 11
- T -Tivoli Storage Manager
Changes 11Tivoli Storage Manager Settings 29
TSM Server Discovery
Overrides 33
- U -UNIX 31
User Account
Configure 31
patrol 31
Privileges 31
Sudo 31
- W -Windows 31
WMI 18
About Sentry Software™Sentry Software, a strategic Technology Alliance Partner of BMC Software, providescomprehensive multi-platform monitoring solutions that enable management of thehardware and software aspects of all servers and SANs and covering up to 100 % ofcustom applications within the BMC TrueSight environment. Sentry Software alsodevelops adapters for BMC Atrium Orchestrator that enables IT administrators toautomate the execution of common requests and tasks that occur in the daily course ofIT operations. Combined with BMC’s servers and network automation tools, theadapters allow IT administrators to implement provisioning and decommissioningworkflows that cover all layers of their IT infrastructure. Finally, Sentry Software designsconnectors that bring storage capacity metrics into BMC TrueSight Capacity Optimizationto ensure IT administrators that their storage infrastructure is properly sized for theircurrent and future needs.
Like us on Facebook:facebook.com/sentrysoftware
Follow us on Twitter:
twitter.com/sentrysoftware
LEARN MORE
To learn more about our solutions, please visit :www.sentrysoftware.com/solutions
© BMC Software, Inc. All rights reserved.
ABOUT MARKETZONE DIRECT PRODUCTS
The BMC MarketZone Directprogram sells and supportsthird-party products thatcomplement and/or augment BMCsolutions. MarketZone Directproducts are available under BMClicense and support terms.
About BMC Software™BMC Software helps leading companies around the world put technology at the forefrontof business transformation, improving the delivery and consumption of digital services.From mainframe to cloud to mobile, BMC delivers innovative IT management solutionsthat have enabled more than 20,000 customers to leverage complex technology intoextraordinary business performance—increasing their agility and exceeding anythingthey previously thought possible. For more information about BMC Software, visit
www.bmc.com.
Bus ines s thrives when IT runs s marter,fas ter and s tronger. That’s why the mos tdemanding IT organizations in the worldrely on BMC Software acros s dis tributed,mainframe, virtual and cloudenvironments . Recognized as the leader inBus ines s Service Management, BMC offersa comprehens ive approach and unifiedplatform that helps IT organizations cutcos t , reduce ris k and drive bus ines sprofit . For the four fis cal quarters endedSeptember 30,2011, BMC revenue wasapproximately $2.2 billion.
BUSINESS RUNS ON I.T .
I.T . RUNS ON BMC SOFT WARE