IBM SVC KM for PATROL 1.2
Transcript of IBM SVC KM for PATROL 1.2
IBM SVC KM for PATROL
STORAGE MONITORING
USER DOCUMENTATION
Version 1.2.01
June 2021
Contacting BMC Software
You can access the BMC Software Web site at http://www.bmc.com. From this Web site, you canobtain information about the company, its products, corporate offices, special events, and careeropportunities.
United States and Canada
Address BMC Software, Inc.2101 CityWest Blvd. Houston TX77042-2827
Telephone 1 (713) 918 8800 or 1 (800) 841 2031 (Toll Free)
Copyright 2015 BMC Software, Inc. or licensors, as an unpublished work. All rights reserved.
BMC Software, the BMC Software logos, and all other BMC Software product or service names areregistered trademarks or trademarks of BMC Software, Inc.
All other trademarks belong to their respective companies.
BMC Software considers information included in this documentation to be proprietary andconfidential. Your use of this information is subject to the terms and conditions of the applicableEnd User License Agreement for the product and the proprietary and restricted rights noticesincluded in this documentation.
Restricted Rights Legend
U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVEDUNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any dataand computer software by the U.S. Government is subject to restrictions, as applicable, set forthin FAR Section 52.227-14, DFARS 252.227-7013, DFARS 252.227-7014, DFARS 252.227-7015, andDFARS 252.227-7025, as amended from time to time. Contractor/Manufacturer is BMC Software,Inc., 2101 CityWest Blvd., Houston, TX 77042-2827, USA. Any contract notices should be sent to thisaddress.
2
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Customer Support
You can obtain technical support by using the Support page on the BMC Software Web site or bycontacting Customer Support by telephone or e-mail.
Support Web Site
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at http://www.bmc.com/support_home. From this Web site, you can:
Read overviews about support services and programs that BMC Software offers
Find the most current information about BMC Software products
Search a database for problems similar to yours and possible solutions
Order or download product documentation
Report a problem or ask a question
Subscribe to receive e-mail notices when new product versions are released
Find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax numbers, and telephone numbers
You can also access product documents and search the Knowledge Base for help with an issue at http://www.sentrysoftware.com
Support by Telephone or E-mail
In the United States and Canada, if you need technical support and do not have access to the Web,call 800 537 1813. Outside the United States and Canada, please contact your local support centerfor assistance. To find telephone and email contact information for the BMC Software supportcenter that services your location, refer to the Contact Customer Support section of the Supportpage on the BMC Software Web site at http://www.bmc.com/support_home.
3
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
4
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Table of Contents.....................................................................................................................................................................................11Product at a Glance
.....................................................................................................................................................................................12Supported Platforms
.....................................................................................................................................................................................14Prerequisites
.....................................................................................................................................................................................19Getting the BMC Software Installation Utility
.....................................................................................................................................................................................19Packages
.....................................................................................................................................................................................20Extracting the Setup Files
.....................................................................................................................................................................................23Installing IBM SVC KM for PATROL
.....................................................................................................................................................................................34Uninstalling IBM SVC KM for PATROL
.....................................................................................................................................................................................43Integrating with BMC Portal
.....................................................................................................................................................................................44Integrating with BMC ProactiveNet Performance Management
.....................................................................................................................................................................................46Configuring the KM
.......................................................................................................................................................................................46Loading the KM on your Console
.......................................................................................................................................................................................47Configuring Java Settings
.......................................................................................................................................................................................52Configuring the Monitoring of an IBM SVC System
.......................................................................................................................................................................................57Editing Connection Settings
.....................................................................................................................................................................................58Monitoring with the KM
.......................................................................................................................................................................................59Detecting Oversubscription Situation (Thin Provisioning)
.......................................................................................................................................................................................59Detecting High Processor Utilization
.......................................................................................................................................................................................61Diagnosing SAN/Network Contention
.......................................................................................................................................................................................63Diagnosing Slow LUNs
.......................................................................................................................................................................................64Finding the Bottleneck in an IBM SVC
.......................................................................................................................................................................................70Identifying the Busiest LUNs
.......................................................................................................................................................................................72Identifying the Hosts that can Access a LUN
.......................................................................................................................................................................................72Identifying LUNs Preferred Node
.......................................................................................................................................................................................73Identifying a Slow Back-end Storage System
.......................................................................................................................................................................................75Monitoring Volume Copy Synchronization
.......................................................................................................................................................................................78Reclaiming Space of Unmapped LUNs
.......................................................................................................................................................................................82Reporting Disk Space Consumption
.......................................................................................................................................................................................86Searching WWN/IQN
.......................................................................................................................................................................................88Viewing the MDisks Activity
.......................................................................................................................................................................................89Reporting
......................................................................................................................................................................89Nodes Activity Report
5
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
......................................................................................................................................................................91Ports Activity Report
......................................................................................................................................................................92Storage Systems Activity Report
......................................................................................................................................................................93MDisks Activity Report
......................................................................................................................................................................94Pools Activity Report
......................................................................................................................................................................96Volumes Activity Report
......................................................................................................................................................................97LUNs Mapping Table
......................................................................................................................................................................98LUNs Preferred Node Table
......................................................................................................................................................................99Per Host Storage Allocation
......................................................................................................................................................................99Per LUN Storage Allocation
......................................................................................................................................................................100Scheduling Reports
.....................................................................................................................................................................................101Administrative Tasks
.......................................................................................................................................................................................101Managing FC Port Parameters
......................................................................................................................................................................102Acknowledging Alerts and Resetting
......................................................................................................................................................................102Setting Automatic Parameter Reset
.......................................................................................................................................................................................103Configuring Java Settings
.......................................................................................................................................................................................107Customizing the Discovery Interval
.......................................................................................................................................................................................107Customizing the Polling Interval
.......................................................................................................................................................................................108Disabling Volumes Monitoring
.......................................................................................................................................................................................110Enabling the Debug Mode
.......................................................................................................................................................................................111Enabling the KM Configuration Menus
.......................................................................................................................................................................................113Pausing/Resuming Monitoring
.......................................................................................................................................................................................113Refreshing Parameters
.......................................................................................................................................................................................113Removing Device Monitoring
.......................................................................................................................................................................................114Restoring Monitoring
.......................................................................................................................................................................................114Reinitializing the KM
.......................................................................................................................................................................................116Triggering a KM Discovery
.....................................................................................................................................................................................116Thresholds, Alerts and Notifications
.......................................................................................................................................................................................117Threshold Mechanism Selection
.......................................................................................................................................................................................118Alert Actions
.......................................................................................................................................................................................119Alert Actions Macros
.......................................................................................................................................................................................120Edit Alert Actions
......................................................................................................................................................................121Trigger a PATROL Event
......................................................................................................................................................................123Annotate the Parameter’s Graph
......................................................................................................................................................................124Execute an OS Command
......................................................................................................................................................................125Execute a PSL Command
......................................................................................................................................................................126Send a Pop-up to the PATROL Consoles
6
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
......................................................................................................................................................................127Write a Line to a LOG File
......................................................................................................................................................................128Send a Basic SNMP Trap
......................................................................................................................................................................129Send a custom SNMP Trap (advanced)
......................................................................................................................................................................130Send an email
.....................................................................................................................................................................................133Classes and Parameters
.......................................................................................................................................................................................134SEN_SVC_MAIN
.......................................................................................................................................................................................137SEN_SVC_SVC
.......................................................................................................................................................................................140SEN_SVC_NODE_CONT
.......................................................................................................................................................................................141SEN_SVC_NODE
.......................................................................................................................................................................................144SEN_SVC_PORT_CONT
.......................................................................................................................................................................................145SEN_SVC_ISCSIPORT
.......................................................................................................................................................................................148SEN_SVC_FCPORT
.......................................................................................................................................................................................152SEN_SVC_POOL_CONT
.......................................................................................................................................................................................153SEN_SVC_POOL
.......................................................................................................................................................................................155SEN_SVC_MDISK_CONT
.......................................................................................................................................................................................156SEN_SVC_MDISK
.......................................................................................................................................................................................159SEN_SVC_STORAGESYSTEM_CONT
.......................................................................................................................................................................................160SEN_SVC_STORAGESYSTEM
.......................................................................................................................................................................................162SEN_SVC_VOLUME_CONT
.......................................................................................................................................................................................163SEN_SVC_VOLUME
.......................................................................................................................................................................................166SEN_SVC_VOLUMEMIRROR
.....................................................................................................................................................................................168Managing Baselines and Key Performance Indicators
.....................................................................................................................................................................................170Configuration Variables
8
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Changes and ImprovementsAlert Actions:
Different types of PATROL events can now be triggered.
Event messages have been improved to provide more meaningful information.
Fixed IssuesIBM SVC KM for PATROL reported an erroneous status on storage systems.
IBM SVC KM for PATROL could not be loaded when using a version of the PATROL Agentlower than v.9.5. This issue is now fixed.
A problem related to the monitoring of Nodes created an abnormal memory usage.
11
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
IBM SVC KM for PATROL monitors all your IBM storage assets within a centralized managementconsole. All the information concerning disk arrays, storage pools, controllers, storage volumes,and ports are directly displayed in your BMC Framework. By monitoring all your IBM storagedevices within a centralized management console, you can respond quickly to performanceproblems, easily determine capacity requirements, and effectively plan for network expansions.
IBM SVC KM for PATROL works in conjunction with Hardware Sentry KM for PATROL. HardwareSentry KM discovers and monitors all the hardware aspects of the IBM disk array: physical disks,temperature sensors,power supplies, LEDs, batteries, enclosure model, etc. IBM SVC KM forPATROL discovers and monitors all the software aspects of the array: overall capacity, spare disks,data traffic, oversubscription, etc.
Product at a GlanceIBM SVC KM for PATROL enables you to monitor their IBM environment from the PATROL consoleavoiding the need to use a separate monitoring solution. The KM collects and brings criticalperformance data and useful metrics into your BMC Framework.
PATROL Console - IBM SVC KM for PATROL
12Supported Platforms
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Supported PlatformsIBM SVC KM for PATROL supports the following versions of the IBM SVC operating system (EOS):
v4.3.x
v5.1.x
v6.1.x
as well as IBM Storwize V7000 systems.
14
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
This chapter provides information about the tasks that must be performed before you startinstalling IBM SVC KM for PATROL. Make sure to carefully read the following sectionsrequirements:
Review the Installation and Configuration Requirements
Get the BMC Software Installation Utility
Download the Installation Packages
Extract the Setup Files.
PrerequisitesIntegrated as a native module for BMC ProactiveNet Performance Management, IBM SVC KM forPATROL is designed to monitor the health and performance of your IBM SVC storageenvironment.
PATROL
Prior to install IBM SVC KM for PATROL, make sure that the following elements are installed andproperly configured:
PATROL Agent, version 3.8 or higher (see BMC PATROL documentation)
PATROL Console (see BMC PATROL documentation)
It is strongly recommended to install the PATROL Agent in a machine located close to the IBM SANController and to have good network performance.
JAVA
IBM SVC KM for PATROL requires Java 1.5 or greater to be installed to connect to an IBM SVCcontroller. You will need to install a Java Runtime Environment (JRE) on the same system thatruns the PATROL Agent and the IBM SVC KM. A Java Runtime Environment package is providedwith IBM SVC KM for PATROL.
Apache JRE is not supported.
The Java Settings wizard lets you define the path of the Java environment to be used by the KM.
Nodes Identification Requirements
Monitoring a SAN Volume Controller requires the device to be identified either by its name or itsIP address. This information is needed when you add an IBM SVC System to the PATROL
15 Prerequisites
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
monitored environment.
User Authentication Configuration Requirements
Users must provide a Secure Shell (SSH) key. Users are authenticated through the authenticationmethods that are located on the SAN Volume Controller system. To access the command-lineinterface (CLI) through SSH, a valid SSH key file is necessary. Refer to IBM SVC documentation fordetailed information.
The SSH key file format must be OpenSSH.
Generating an SSH key using PuTTY
1. Click Start >All Programs > PUTTY > PuTTYgen to start the PuTTY Key Generator.
Generating a SSH Key pair using PuTTY
16Prerequisites
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Click SSH-2 RSA as the type of key to be generated and click Generate
Generating a random number
17 Prerequisites
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. Move the cursor around the blank area of the Key section to generate a random number.
SSH Key Credentials
18Prerequisites
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
4. Enter and confirm the Key passphrase
Generating Private Key
5. Click Save private key
6. Enter the name of the key and click Save.
7. Convert your key into OpenSSH:
Select Conversions > Export OpenSSH key
Enter the name of your key and click Save.
8. Close the PuTTY Key Generator.
Once generated, store this SSH key on the system where the PATROL Agent is running. You willhave to indicate the path to the SSH Key while adding an IBM SVC System to monitor.
Starting Statistics Collections
The collection of cluster statistics must be started to get performance information in the PATROLConsole.
To start the collection of cluster statistics:
19 Prerequisites
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
1. Log in to IBM System SAN Volume Controller interface
2. Click Manage Clusters > Start Statistics Collection in the portfolio.
3. Type the length of the interval to collect statistics.
4. Click OK.
You can also use the startstats command: svctask startstats -interval <time_in_minute>
Getting the BMC Software InstallationUtilityIn order to install IBM SVC KM for PATROL, you need the latest version of the BMC SoftwareInstallation Utility. It can be downloaded from the BMC Software EPD (electronic productdownload) from: http://webapps.bmc.com/signon/content/logon.jsp on the BMC SoftwareWebsite.
Choose the appropriate package depending on the platform you plan to install IBM SVC KM forPATROL on:
For UNIX/Linux systems: ins_ALL_<version>.tar
For Windows systems: ins_WINDOWS_<version>.zip
The packages are valid for all the PATROL components: Agent, Console, Console Server, etc.
Place the Installation Utility package in the same folder as the IBM SVC KM for PATROL packages.
PackagesIBM SVC KM for PATROL Packages
The IBM SVC KM for PATROL packages are available on the Sentry Software Web site and on theBMC Software EPD Web site.
There are two packages, each of which can be used to install the KM on every PATROL component(Agent, Console, etc.) according to the platform you are using.
20Packages
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Downloading from Sentry Software Web site
For Windows systems: sensvc_WINDOWS_<version>.zip
For UNIX and Linux systems: sensvc_UNIX_<version>.tar
Java Runtime Environment Package
Java Runtime Environment version 1.5.00 or higher is required in some cases for the KM tooperate properly.A package with a suitable Java Runtime Environment, designed for use with the BMC SoftwareInstallation Utility, is made available to download on the Sentry Software Web site.
The IBM SVC KM for PATROL packages are designed for use with the BMC Software Installation Utility(formerly known as Thorium). They need to be merged with the latest available version of the BMCSoftware Installation Utility. Please see instructions.
Extracting the Setup FilesLike most Knowledge Modules for PATROL, you need to install IBM SVC KM for PATROL on thefollowing components of your PATROL architecture:
Every managed system with a PATROL Agent
Every PATROL Console (Classic) that will show IBM SVC performance-related information andalerts
The Console Server
PATROL Central – Web Edition
On Windows
The packages for Windows are to be extracted in the consecutive order:
1. First, unzip the BMC Installation Utility: ins_Windows_<version>.zip
2. Next, unzip the IBM SVC KM for PATROL package in the same folder: sensvc_WINDOWS_<version>.zip
3. Then, unzip the senjre_<version>_WINDOWS.zip package if you need to install the latestJava Runtime Environment program
The content of the packages merges into a subfolder named bmc_products.
Apache JRE is not supported.
21 Extracting the Setup Files
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Windows may ask for your conf irmation to overwrite f iles and folders. This is normal behavior and you canaccept all overwrite conf irmation requests.
On UNIX/Linux
The packages for UNIX/Linux are to be extracted with the tar utility:
1. First, double-click the BMC Installation Utility: tar xvf ins_ALL_<version>.tar
2. Next, double-click the IBM SVC KM for PATROL package in the same folder: sensvc_UNIX_<version>.tar if downloaded from the Sentry Software Web site.
The files are extracted into a sub-directory named bmc_products.
23
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Introduction
This chapter describes the installation procedure for IBM SVC KM for PATROL on any PATROLcomponent (Agents, Consoles, Console Server, etc.). As the setup is based on the BMC SoftwareInstallation Utility, this procedure applies to all operating systems supported by IBM SVC KM forPATROL. Although not covered by this section, the installation through the Distribution Server isfully supported. Please refer to the Distribution Server documentation for a detailed descriptionof the deployment procedure.
Installing IBM SVC KM for PATROLInstalling IBM SVC KM for PATROL is an automated process managed by a wizard. The wizard goesthrough the necessary steps to install IBM SVC KM for PATROL and all files associated with it. Youare simply prompt for the product's folder location and the product/components to install.
Browse to the bmc_products folder where the files have been extracted (both IBM SVC KM forPATROL and the Common Installer).
On Windows: Launch the setup.exe program
On UNIX: Launch the setup.sh script
To install IBM SVC KM for PATROL1. Allow the perl.exe program to listen on this port: Click Allow access.
24Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Installation Wizard - Step 1: Windows Security Alert
2. The welcome screen of the installer appears. Click Next to continue.
Installation Wizard - Step 2: Welcome
25 Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. Read the license agreement, click the Accept option and then click Next to continue.
Installation Wizard - Step 3: Reviewing License Agreement
26Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
4. Select Install products on this computer now and click Next to continue.
Installation Wizard - Step 4: Selecting Installation Options
27 Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. Specify the BMC Software products folder. See the BMC Software documentation for moreinformation about the BMC Software products folder. Click Next to continue.
Installation Wizard - Step 5: Selecting the Installation Directory
28Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
6. Select Default. Installing IBM SVC KM for PATROL does not require any customization. ClickNext to continue.
Installation Wizard - Step 6: Selecting an Installation Type
7. Select one or several of the following options:
Managed System to install IBM SVC KM for PATROL on a PATROL Agent.
Console Systems to install IBM SVC KM for PATROL on a PATROL Classic Console.
Common services to install IBM SVC KM for PATROL on the Console Server or on PATROLCentral – Web Edition.
Click Next to continue.
29 Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Installation Wizard - Step 7: Selecting Roles
Select as many options as required.
30Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
8. Check the IBM SVC KM for PATROL box to install the KM (it should be selected by default).Select the Java Runtime Environment program if you want to install it along with the KM (thisoption is only provided when you have previously downloaded the package).Click Next to continue.
Installation Wizard - Step 8: Selecting Products and Components
31 Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
9. Review the installation parameters and click Start Install to launch the installation procedure.
Installation Wizard - Step 9: Reviewing Installation Options
32Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
10. The setup program displays the actions performed and indicates the percentage ofcompletion.Once the installation complete, click Next to view the installation results.
Installation Wizard - Step 10: Installation Status
33 Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
11. The wizard displays the installation results.Click View Log to display a detailed log of the installation procedure. Click Next and thenFinish to exit the setup program.
Installation Wizard - Step 11: Installation Results
12. Click the Finish button to complete and close the installation wizard.
34Installing IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Installation Wizard - Step 12: Completing and closing the Installation Wizard
A Help button is available at each step of the procedure. Click to display the installation online help. TheExit button allows you to stop the installation procedure.
Uninstalling IBM SVC KM for PATROLUninstalling IBM SVC KM for PATROL is an automated process managed by a wizard. The wizardgoes through the necessary steps to remove IBM SVC KM for PATROL and all files associated withit. You are simply prompt for the product's folder location and the product/components touninstall.
To uninstall IBM SVC KM for PATROL1. Locate the Uninstall folder under the BMC products directory (typically under C:\Program
Files\BMC Software, or /opt/bmc):
On Windows systems, launch uninstall.exe
On UNIX, launch uninstall.sh
35 Uninstalling IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Un-install Wizard — Welcome Step
36Uninstalling IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Specify the BMC Software products folder. See the BMC Software documentation for moreinformation about the BMC Software products folder.
Un-install Wizard — Specifying folder
37 Uninstalling IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. To uninstall the KM, select IBM SVC KM for PATROL and click Next.
Un-install Wizard — Selecting Products and Components Directory
38Uninstalling IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
4. Click Start Uninstall.
Un-install Wizard — Reviewing Selected Products & components and start uninstalling
39 Uninstalling IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. A page displays the list of products/components processed and the percentage ofcompletion. Click Next to continue.
Un-install Wizard — Status
40Uninstalling IBM SVC KM for PATROL
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
6. A page displaying SUCCESS indicates that IBM SVC KM for PATROL is now uninstalled.
Un-install Wizard — Uninstall Results
43
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Introduction
This section provides detailed information about the integration of IBM SVC KM for PATROL withBMC ProactiveNet Performance Management.
Integrating with BMC Portal
Integrating with BMC ProactiveNet Performance Management
Integrating with BMC PortalAn integration component for BMC Portal is released along with the Knowledge Module (KM) inthe form of a PAR file: SentrySoftware-PM-PATROL-SENSVC-solution-<version>.par. It enablesvisualization of parameter data of all objects monitored by the KM, in the BMC Portalenvironment.
This integration component is valid on BMC Portal v2.5 upwards.
To integrate IBM SVC KM for PATROL with BMC Portal:
1. Install the KM on top of a PATROL Agent as detailed in the Installation Guide. A PATROLConsole will be required to configure the KM
2. In the PATROL Console, make sure the KM properly discovered the IBM systems and iscollecting data
3. Upload the PAR file in BMC Portal:
Place the SentrySoftware-PM-PATROL-SENSVC-solution-<version>.par file in a knownlocation on your file system.
Login to BMC Portal with the superadmin credentials.
Click on Portal, then under Tasks click Performance Managers.
Click Upload and then click Browse to open a file selection dialog box.
Select BPM-Express-for-IBM-SVC-<version>.par and click Upload.
4. Create a new managed element:
Login to BMC Portal with administrator credentials
Click the Configure tab > Elements > Add
Select Infrastructure Element and click Next
Select an RSM to collect data about the infrastructure element and click Next
Enter the name of the machine on which the PATROL Agent is running, the Host Name andclick Next
Select the group to which your PM will belong and click Next
Select the PATROL category, the Application Classes to add and click Next
Set the Properties and Credentials that the RSM must have to access the specifiedelements and click Next. The list of thresholds is displayed. You can update these settingswithout impacting the values set in PATROL.
44Integrating with BMC Portal
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. Click Finish.
Thresholds are set in the PATROL console. To get the last conf igurations made, click the Refresh PATROLIntegration button available in the Elements page.
Integrating with BMC ProactiveNetPerformance ManagementDepending on the version of BMC ProactiveNet Performance Management used, integrationsteps may need to be performed.
BMC ProactiveNet Performance Management 8.5 or 8.6To integrate IBM SVC KM for PATROL into BMC ProactiveNet Performance Management 8.5 and8.6, you need create a specific adapter. For more information, please refer to Integrating theSentry Software's KMs into BMC ProactiveNet Performance Management (BPPM).
BMC ProactiveNet Performance Management 9.x
No specific integration steps need to be performed.
46
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Introduction
IBM SVC KM for PATROL monitors all of the performance metrics and traffic statistics of your IBMSAN Volume Controller. It continuously monitors the activity of each cluster and is also able tobuild reports on past utilization statistics.
Configuring the KM
Monitoring with the KM
Reporting
Administrative Tasks
Thresholds, Alerts and Notifications
Configuring the KMTo automatically detect all the various IBM SVC storage features and components and displaythem in the PATROL interface, IBM SVC KM for PATROL accesses the IBM SVC Cluster through SSH.This operation is made possible by storing a valid SSH key on the system where the PATROLAgent is running
Loading the KM on your ConsoleIn order to monitor IBM SVC within your PATROL Console, the corresponding IBM SVC KM forPATROL must be loaded on the appropriate managed system. Loading a Knowledge Module inPATROL Central Operator both loads the Knowledge Module on the managed system and addsthe name of the Knowledge Module to your management profile.
Loading IBM SVC KM for PATROL on PATROL Classic
1. In the Console menu bar, click File > Load KM.
2. In the Files of Type list, select KM Files.
3. Select IBM SVC KM for PATROL.
4. Click Open.
Loading IBM SVC KM for PATROL on PATROL Central
47 Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
1. In the Common Tasks tab of the PATROL Central Operator Taskpad, click the Load KnowledgeModules icon.
2. To start the wizard, click Next.
3. Select the check boxes for the managed systems that you want to load IBM SVC KM forPATROL on. Click Next.
4. In the Knowledge Module Lists, select the check box SEN_SVC.kml
5. Click Finish.
Before you can load a Knowledge Module, it must be installed on a managed system. Loading aKnowledge Module loads it on the managed system, if it was not already loaded, and adds it to yourmanagement profile.
Configuring Java SettingsThe Java Settings wizard enables you to define which Java instance is to be used by IBM SVC KMfor PATROL for managing the email alert action only when using a version lower than 3.6.0.11 ofPATROL agent.
You can either use the automatic detection, select a pre-detected java path or enter manuallythe path leading to the Java executable directory to be used.
IBM SVC KM for PATROL requires Java 1.5 or greater to be installed to connect to an IBM SVC controller. Youwill need to install a Java Runtime Environment (JRE) on the same system that runs the PATROL Agent andthe IBM SVC KM. The Java Settings wizard lets you def ine the path of the Java environment to be used bythe KM.
To access the Java Settings wizard, right-click the main IBM SVC KM icon > KM commands > KMSettings > Java Settings.
48Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Java Settings Wizard - Method Selection
Select the Java executable detection method:
Automatic: if you wish IBM SVC KM for PATROL to detect the Java executable directory byitself upon each discovery.
User Selection: if you wish to select a Java executable directory within a list of pre-detectedexecutables.
Manual: if you wish to manually enter the Java executable directory path.
Click Next to continue.
Automatic Detection
If you have selected the automatic detection at the previous step of the wizard, IBM SVC KM forPATROL displays the path of the Java executable directory that will be used when performingcommands requiring Java features.
49 Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Java Settings Wizard — Automatic Detection
Click Finish to save your settings.
User Selection
If you have selected the User Selection option at the previous step of the wizard, IBM SVC KM forPATROL displays a list of all the Java executable directories found on your machine.
50Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Java Settings Wizard — User Selection
Select the Java executable directory you wish IBM SVC KM for PATROL to use when performingcommands requiring Java features and click Finish to save your settings.
Manual
If you have selected the Manual option at the previous step of the wizard, IBM SVC KM forPATROL let you enter the path to the Java executable directory you wish the application to usewhen performing commands requiring Java features.
51 Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Java Settings Wizard — Manual Settings
Click Finish to save your settings.
Once you have modified a java setting, you must restart the PATROL in order to make yourchanges.
Java Settings Wizard — Restart the PATROL Agent
Click OK and restart the PATROL Agent.
52Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Configuring the Monitoring of an IBM SVCSystemTo add an IBM SVC System to your monitored environment:
1. Right-click the KM main icon > KM Commands >Add a Connection to an IBM SVC System...
2. Select the type of system you wish to monitor, SAN Volume Controller or Storwize V7000.
Selecting the type of system to monitor
53 Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Configuring the monitoring of a SAN Volume ControllerA. Enter the Name for the cluster as it will appear in the PATROL Console.
SAN Volume Controller Display Name
B. Click Next to continue.
IBM SVC SAN Volume Controller Credentials
54Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
C. Enter the Username of a valid account to connect to the cluster
D. Indicate the path to the OpenSSH Private Key File. The SSH Key file must be in OpenSSHformat and be stored on the system where the PATROL Agent is running. Open SSH PrivateKey File is mandatory to connect to a SAN Volume Controller.
E. Enter the Key Passphrase if your SSH key was generated with a passphrase, if any.
F. Click Finish to save your settings.
Configuring the monitoring of a Storwize V7000
A. Enter the Name for the cluster as it will appear in the PATROL Console.
Storwize V7000 Display Name
B. Select the Authentication Type you wish to use to establish the connection with the cluster.
55 Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Authentication Type Selection
C. Click Next to continue.
D. According to the authentication type you have selected, enter a Username and Password, or
Authentication with Username and Password
enter the following information:
the admin Username may be required to connect to the cluster
the path to the OpenSSH Private Key File. An Open SSH Private Key File might be required
56Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
to connect to a Storwize v7000 system type. The SSH Key file must be in OpenSSH formatand be stored on the system where the PATROL Agent is running.
the Key Passphrase if your SSH key was generated with a passphrase, if any.
Authentication with Username, OpenSSH Private Key File and/or Passphrase
E. Click Finish to save your settings.
Some information may not be displayed immediately in the PATROL Console as the f irst synchronizationcan sometimes take several minutes.
57 Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Editing Connection SettingsTo edit connection settings:
1. Right-click the IBM SVC System icon > KM Commands >Edit Connection Settings ... 2. Modify the IBM SVC System Identification settings:
Editing Connection Settings
58Configuring the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. Click Next
4. Modify the IBM SVC Cluster Credentials
Editing IBM SVC Cluster Credentials
5. Click Finish.
Monitoring with the KMMonitoring you IBM SAN Volume Controller with IBM SVC KM for PATROL is very simple. Oncethe KM is properly installed, as per the instructions given in the Installation Guide, IBM SVC KMfor PATROL automatically detects all the various IBM SVC storage features and components anddisplays them in the PATROL interface.This section provides detailed information on how to monitor your IBM SVC environment, how toperform usual administrative tasks, and how to manage thresholds and alert actions with IBM
SVC KM for PATROL.�
For details on which performance metrics and traf f ic statistics are detected on each system, please see theReference Guide.
59 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Detecting Oversubscription Situation (ThinProvisioning)We call an oversubscription situation when:
1. The storage pool is configured for thin provisioning (“thin storage pool”)
2. The storage pool is oversubscribed, i.e. the total disk space visible to the hosts (subscribers)is greater than its actual capacity (this situation is normal for a thin pool since it is its verypurpose)
3. The storage pool actual consumed capacity is nearing 100%
Such situation is highly critical because the inability to allocate additional space to a LUN whenrequested by the subscriber host will lead to catastrophic data loss and corruption.
By default, the KM sets a warning threshold at 75% on the ConsumedCapacityPercentageparameter of the storage pool instances only if these conditions are met: the storage pool is“thin” and oversubscribed. When such a warning is issued by the KM, it is highly recommendedthat the SAN administrators add capacity to the storage pool as soon as possible.
Detecting High Processor UtilizationThe ProcessorUtilization parameter of the SEN_SVC_NODE application class can be used to detecthigh processor utilization and thus prevent node overloading and unpredictable performancedegradations.
Because optimum performance will be achieved when the processor utilization and the transferrate are similar for both nodes, it is also wise to monitor the transfer rate of each node by usingthe ReceivedByteRate and SentByteRate parameters of the SEN_SVC_NODE application class. Aproper load balancing will indeed prevent a node from being a bottleneck while the other one isalmost idle. If the collected values are really different for both nodes, administrators shouldsearch for the LUNs preferred node and make sure the load balancing is adequate.
If performance degradations are observed, administrators will have to identify the node that hasbecome a bottleneck.
60Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Verifying the ProcessorUtilization Parameter for a Node
1. In the console, double-click the ProcessorUtilization parameter of a node
2. A graph is automatically displayed in the console's graph pane
Viewing the Node's Processor Utilization as a graph
This parameter should not exceed 50% to prevent one node to become overloaded if the otherone fails. By default, a warning and an alert are triggered when the parameter respectivelyreaches 90% and 99%.
Verifying the Transfer Rate of a Node
1. In the console, double-click the ReceivedByteRate parameter of a node
2. Drag and drop the SentByteRate parameter in the graph window
61 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Comparing Received and Sent Byte Rate
If this value and the overall processor utilization are high, you should then consider:
either adding more nodes to the cluster and move some workload onto the new nodes
or moving volumes to another I/O group.
On the contrary, if this value stays low – while the overall processor utilization is high – itindicates that the node is performing "non productive" tasks. It then may become critical todetermine the source of activity that generates the high processor utilization.
Diagnosing SAN/Network ContentionThe IBM SAN Volume Controller can be considered as a storage proxy. As such, it concentratesthe storage activity from many hosts and many back-end systems. Therefore, its network andfiber connectivity and performance needs to be optimal at all times. The IBM SVC KM monitorsboth the iSCSI and FC ports for the connectivity and the traffic. For the fiber ports, additionalinformation is provided to identify the origin and/or destination of the traffic (internal, othercluster, hosts or storage systems). This allows SAN administrators to precisely understand thecause of any SAN or network contention.
To diagnose SAN / Network Contention:
1. First generate a total activity report on each port:
In the PATROL Console, right-click the Port icon > KM Commands > Port Activity...
62Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Configuring the Ports Activity Report Settings
Build a report of total sent/received bytes for the period of your choice
Click Show Report
Ports Activity Report
63 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. If the activity is high, then look at the most specific parameters to identify where the trafficactually comes from and goes to:
Host Activity Report
3. If the activity is low, you can look at the following errors counters to identify the cause of theissue: BadCRC, InvalidTransmissionWords, LinkFailures, LossOfSynch, ProtocolErrors,LossOfSignal
4. Finally make sure the LinkSpeed actually matches with what is expected for the SANinfrastructure
Diagnosing Slow LUNsIf a system administrator complains that his servers are experiencing slow I/Os performance andthat it is caused by the SAN, you may want to verify the actual response time of the LUNs theserver is relying on.
The ReadResponseTime and WriteResponseTime parameters of the SEN_SVC_VOLUME classrepresent the average time it took to complete the read and write operations on the LUN duringthe collection interval. Typically, the average response time is below 10 milliseconds. You mayalso want to compare this value to the response time of the other LUNs to see whether oneserver is really getting worse I/O performance than another.
If the response time is low, you will need to check the amount of data that is written and read onthis LUN. The bad performance may simply be due to an abnormally large amount of data to
64Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
process. Otherwise, the problem may lie between the IBM SVC and the server, in the fiber links.
Response time parameters, in general, can show sporadic high values. A high response time value does notequal to performance degradation until the problem lasts for a few consecutive collections. The defaultthresholds for the response time parameters trigger an alert only after a certain amount of time.
Finding the Bottleneck in an IBM SVCStorage virtualization adds great flexibility in the provisioning and management of storage butalso adds a lot of complexity when it comes to identifying and diagnosing a performanceproblem: are the nodes themselves the bottleneck, or the fiber ports or the back-end storagesystems?
The IBM SVC KM provides performance metrics for every layer of the SAN infrastructure based onthe IBM SVC. To easily find the reason for a degraded performance or perceived as degraded, werecommend you to verify in this order the performance of:
the nodes
the ports
the storage systems
the MDisks
Verifying the Performance of the Nodes1. First verify the Nodes' response time:
In the console, double-click the ReceivedResponseTime parameter
Drag and drop the SentResponsetime in the graph window
The average response time should be below 10 milliseconds.
Response time parameters, in general, can show sporadic high values. A high response time value does notequal to performance degradation until the problem lasts for a few consecutive collections. The defaultthresholds for the response time parameters trigger an alert only after a certain amount of time.
65 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Right-click the Node main icon > KM Commands > Reporting > Nodes Activity...
Configuring the Nodes Activity Report Settings
Build a report of total sent/received bytes for the period of your choice
Click Show Report
Viewing the Nodes Activity Report
66Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. Finally, double-click the ProcessorUtilization parameter to detect possible high processorutilization
Viewing the Node's Processor Utilization as a graph
Verifying the Activity on Ports1. Start looking at the total activity on each port:
In the PATROL Console, right-click the Port icon > KM Commands > Reporting > PortActivity...
Configuring Ports Activity Report Settings
67 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Build a report of total sent/received bytes for the period of your choice
Click Show Report
Viewing Ports Activity Report
2. Then look at the most specific parameters to identify where the traffic actually comes fromand goes to:
Viewing a Host Activity Report
68Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. If the activity is low, you can look at the following errors counters: BadCRC,InvalidTransmissionWords, LinkFailures, LossOfSynch, ProtocolErrors, LossOfSignal toidentify the cause of the issue
4. Look at the LinkSpeed parameter and make sure it matches with what is expected for theSAN infrastructure
Verifying the Performance of the Storage Systems1. First verify the Storage Systems' response time:
In the console, double-click the ReceivedResponseTime parameter
Drag and drop the SentResponsetime parameter in the graph window
The average response time should be below 10 milliseconds.
Response time parameters, in general, can show sporadic high values. A high response time value does notequal to performance degradation until the problem lasts for a few consecutive collections. The defaultthresholds for the response time parameters trigger an alert only after a certain amount of time.
2. Right-click the Storage Systems main icon > KM Commands > Reporting > Storage SystemsActivity...
Generating a Storage System Activity Report
Build a report of total read/write bytes for the period of your choice
Click Show Report
69 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Verifying the Activity on MDisks1. Right-click the Storage Systems main icon > KM Commands > Reporting > MDisks Activity...
Generating an MDisk Activity Report
2. Build a report of total read/write bytes for the period of your choice
3. Click Show Report.
Viewing the MDisk Activity Report
70Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Identifying the Busiest LUNsTo identify the LUNs that generate the most traffic, use the ReadByteRate and WriteByteRateparameters of the Volume class. IBM SVC KM for PATROL offers you two methods to visuallyrepresent a LUN activity.
Create a multi-parameter graph with the ReadByteRate andWriteByteRate of the LUN objects you are suspecting1. In the console, double-click the ReadByteRate parameter of the LUN you are interested in. A
graph is automatically displayed in the graph pane.
2. Then drag and drop the WriteByteRate in the graph window
Viewing the LUN's ReadByteRate and WriteByteRate parameters
71 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Use the Volume Activity… Command1. Right-click the Volume icon > KM Commands > Reporting > Volumes Activity...
Generating a Volume Activity Report
Build a report of total read/write bytes for the period of your choice
Click Show Report
Viewing the Volume Activity Report
Once you have identified the most busy LUNs, check the infobox of the suspected LUNs to findtheir storage groups and the hosts that generate such activity.
72Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Identifying the Hosts that can Access a LUNIn most SAN configuration, each LUN belongs to a storage group whose host members are theonly ones authorized to access the LUN. This is called LUN masking. For each LUN, the solutiondisplays its WWN, the storage group to which it belongs to as well as the hosts member of thisgroup. In most cases, identifying the storage group of a LUN is sufficient to recognize the serverthat is using it.
To identify the hosts that can Access a LUN, click the IBM SVC icon > KM Commands > Reporting >LUNs Mapping Table...
LUNs Mapping Table
Identifying LUNs Preferred NodesThe preferred node is responsible for I/Os for the volumes and coordinates sending the I/Os tothe alternate node. Because hosts access volumes through the preferred nodes, those nodes canrapidly become overloaded. Identifying the LUNs preferred node will help you ensure theworkload is properly balanced between the nodes and explain some performance issues.
To identify LUNs preferred nodes, click the KM main icon > KM Commands > Reporting > LUNsPreferred Node Table...
73 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
LUNs Preferred Node Table
Identifying a Slow Back-end Storage SystemAs the IBM SVC System relies on other storage systems as back-end, it is important to make surethat the underlying storage infrastructure is responsive. One single slow back-end storagesystem can hamper the overall performance experienced by the host because the IBM SVCcluster virtualizes the storage from several systems as a single pool. The responsiveness of eachback-end storage system is constantly monitored by the IBM SVC KM with the ResponseTimeparameters of the SEN_SVC_STORAGESYSTEM and SEN_SVC_MDisk application classes.
To identify a slow back-end storage system:
74Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
1. In the console, double-click the ReadResponseTime parameter of the storage system you areinterested in.
2. Then drag and drop the WriteResponsetime parameter in the graph window
Viewing the Storage System's Response Time
Response times are generally considered acceptable when less than 10ms. By default the KMtriggers a warning and an alarm when response time is respectively greater than 10ms and100ms.
Response time parameters, in general, can show sporadic high values. A high response time value does notequal to performance degradation until the problem lasts for a few consecutive collections. The defaultthresholds for the response time parameters trigger an alert only after a certain amount of time.
If the back-end storage system shows bad response time, it may be interesting to dig further toidentify which MDisk is the cause of the issue.
75 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
1. In the console, double-click the ReadResponseTime parameter of the MDisk you areinterested in
2. Drag and drop the WriteResponsetime parameter in the graph window.
Read Response Time Graph
Monitoring Volume Mirroring SynchronizationMost organizations rely on volume mirroring to add an extra layer protection for their businesscritical applications. Volume Mirroring consists in maintaining two identical copies of the volumeon two different pools (typically located on different storage back-ends). The Synchronizedparameter of the SEN_SVC_VOLUMEMIRROR application class indicates whether both copies ofthe volume are properly synchronized.
76Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Verifying the Volume Copy is synchronized1. In the main menu bar, click Action > New Query… to create a PATROL Query
PATROL Query - General Tab
77 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Enter the Query name (example: VolumeMirroringSynchronization)
3. Enter the Query description (optional)
4. In the Query Result Filter section, select Show Selected Objects and check the Parametersbox
5. In the Additional Filtering, select the Enable Parameter level filtering option
6. Open the Parameter tab
PATROL Query - Parameter Tab
7. In the Pattern Matching section, select Like and type Synchronized
8. Click OK.
PATROL Query - Results
78Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
A warning is also triggered when both copies are no longer synchronized.
Reclaiming Space of Unmapped LUNsOver time, as servers connected to a SAN get decommissioned, administrators find an increasingnumber of unmapped LUNs, or volumes that are no longer used by any server. These LUNs, whileunused, still occupy disk space. Being able to identify such unmapped LUNs and reclaim the diskspace uselessly consumed by these LUNs will help administrators avoid unnecessary upgradesand extensions of your storage systems.
To list the LUNs in a SAN Volume Controller that are not mapped to any server and therefore safeto remove, right-click the KM main icon > KM Commands > Reporting > LUNs Mapping Table... .
LUNs Mapping Table
Identifying Unused LUNs
When a server is decommissioned or reconfigured, its associated LUNs can stay mappedpreventing storage administrator from accurately identifying unused LUNs. Since the KMmonitors permanently the traffic on each LUN, it becomes easy to detect LUNs for which theactivity is null.
79 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
1. Create a PATROL Query in the PATROL Console to show the value of theTimeSinceLastActivity parameter of the SEN_SVC_VOLUME class; In the main menu bar, clickAction > New Query…
PATROL Query – General Tab
80Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Enter the Query name (example: Unused LUNs)
3. Enter the Query description (optional)
4. In the Query Results Filter section, select Show Selected Objects and check the Parametersbox
5. In the Additional Filtering, select the Application Class level filtering and the EnableParameter level filtering options
6. Open the Application Class tab
PATROL Query – Application Class Tab
7. In the Pattern Matching section, select Like and type SEN_SVC_VOLUME
8. Open the Parameter tab
81 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
PATROL Query – Parameter Tab
9. In the Pattern Matching section, select Like and type TimeSinceLastActivity
10. Click OK to display a list of the monitored LUNs and their respective number of days sincewhen the KM has not recorded any activity.
PATROL Query – Results
82Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
The TimeSinceLastActivity parameter is evaluated from the date the KM was initially started.
Reporting Disk Space ConsumptionMaking sure that an IBM SVC System has enough remaining disk space available is critical forseveral reasons:
SAN administrators want to make sure to be able to provision disk space for new serverswhen requested, as quickly as possible.
The IBM SVC System itself may need additional disk space for specific features to workproperly, like automatic snapshots, mirroring, etc.
If thin provisioning is used, the remaining disk space becomes dramatically critical since theinability to allocate additional space to a LUN when requested by the subscriber host willlead to catastrophic data loss and corruption.
The disk space used is permanently monitored for each pool. The SubscribedCapacity parameterof the SEN_SVC_POOL class represents the amount of disk space that has been made available tothe subscriber hosts, or in other words, the amount of disk space that is seen by the serversconnected to the IBM SVC System.
The ConsumedCapacity parameter of the SEN_SVC_POOL class represents the actual space usagein the pool. For “thin” pools (when thin provisioning is enabled on the IBM SVC System), thisvalue is normally lower than the SubscribedCapacity, as it is the main purpose of thinprovisioning. For traditional pools, the ConsumedCapacity parameter has the same value as theSubscribedCapacity parameter, as the entirety of the subscribed disk space is fully allocated inthe storage pool.
The ConsumedCapacityPercentage parameter is the most critical one as a pool usage nearing100% means that SAN administrators will not be able to create new LUNs. By default, an alarm istriggered if the value of this parameter exceeds 75%.
83 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Verifying the Available Disk space in Several Pools1. In the main menu bar, click Action > New Query… to create a PATROL Query
PATROL Query - General Tab
84Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Enter the Query name (example: DiskSpaceConsumption)
3. Enter the Query description (optional)
4. In the Query Result Filter section, select Show Selected Objects and check the Parametersbox
5. In the Additional Filtering section, select the Enable Application Class level filtering and theEnable Parameter level filtering options
6. Open the Application Class tab
7. In the Pattern Matching section, select Like and type SEN_SVC_POOL
PATROL Query - Application Class Tab
85 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
8. Open the Parameter tab
PATROL Query - Parameter Tab
9. In the Pattern Matching section, select Like and type ConsumedCapacityPercentage
PATROL Query - List of results
86Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
10. Click OK to display a table with the amount of actually consumed capacity in all of the pools.
An alarm is triggered for the oversubscribed pools, i.e pools for which the oversubscribedcapacity is higher than 99%.
Searching WWN/IQNComponents are uniquely identified on the SAN by a WWN or by an iSCSI name. Because WWNare a series of letters and digits and IQN can be up to 255 characters long, retrieving a device orport corresponding to a WWN or IQN found in error logs or any other administration GUI is anightmare for SAN administrators. The Search WWN/IQN feature has been designed to easilyfind any component based on its complete or partial World Wide Name or IQN.
1. In the console, click the SVC icon > KM Commands > Search WWN/IQN...
2. Select a search option
3. Type the value to search for
4. Click Search to display the search results
Search WWN/IQN Setting Panel
87 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. The search results panel lists the WWN/IQN corresponding to the search options you havedefined.
Search WWN/IQN Results
88Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Viewing the MDisks ActivityThe ReadByteRate and WriteByteRate parameters of the SEN_SVC_MDISK class, which representthe overall traffic in megabytes per second for each monitored MDisk, can be used to visualizethe activity of an MDisk.
1. In the console, double-click the ReadByteRate parameter of the MDisk you are interested in.A graph is automatically displayed in the graph pane.
2. Then drag and drop the WriteByteRate parameter in the graph window
Overall Activity of an MDisk
89 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
ReportingThis section deals with the various reports the IBM SVC KM for PATROL enables you to generatefrom the data collected from monitored devices, such as:
Nodes Activity Report
Ports Activity Report
Storage Systems Activity Report
MDisks Activity Report
Pools Activity Report
Volumes Activity Report
LUNs Mapping Table
LUNs Preferred Node Table
Per Host Storage Allocation
Per LUN Storage Allocation
Scheduling Reports
To generate an activity report, right-click the KM icon or the component instance > KMCommands > Reporting and then the report you wish to obtain.
Nodes Activity ReportIBM SVC KM for PATROL enables you to generate a report for your monitored IBM SVC nodes:
1. Click the component instance > KM Commands > Reporting > Nodes Activity...
Generating a Node Activity Report
90Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Select the parameter for which you wish to generate a report for:
sent bytes
received bytes
sent / received bytes
3. Select the report range and interval
4. If you triggered the KM command from the IBM SVC main icon:
Click the Nodes Selection button
Select the specific node(s) you wish to include in the report
Click Accept
5. Click Show Report.
Viewing a Node Activity Report
91 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Ports Activity ReportIBM SVC KM for PATROL enables you to generate a report for your monitored IBM SVC ports:
1. Click the component instance > KM Commands > Reporting > Ports Activity...
Generating a Port Activity Report
2. Select the parameter for which you wish to generate a report
3. Select the report range and interval
4. If you triggered the KM command from the IBM SVC main icon:
Click the Port Selection button
Select the specific port(s) you wish to include in the report
Click Accept
92Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. Click Show Report.
Viewing a Port Activity Report
Storage Systems Activity ReportIBM SVC KM for PATROL enables you to generate a report for your monitored storage system:
1. Click the component instance > KM Commands > Reporting > Storage Systems Activity...
Generating a Storage System Activity Report
2. Select the parameter for which you wish to generate a report for:
read bytes
write bytes
read / write bytes
93 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. Select the report range and interval
4. If you triggered the KM command from the IBM SVC main icon:
Click the Storage Systems Selection button
Select the specific storage system(s) you wish to include in the report
Click Accept
5. Click Show Report.
MDisks Activity ReportIBM SVC KM for PATROL enables you to generate an activity report for your monitored IBM SVCMDisks:
1. Click the component instance > KM Commands > Reporting > MDisks Activity...
Generating a MDisk Activity Report
2. Select the parameter for which you wish to generate a report for:
read bytes
write bytes
read / write bytes
3. Select the report range and interval
4. If you triggered the KM command from the IBM SVC main icon:
Click the MDisk Selections button
Select the specific MDisk(s) you wish to include in the report
Click Accept
94Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. Click Show Report.
Viewing a MDisk Activity Report
Pools Activity ReportIBM SVC KM for PATROL enables you to generate a report for your monitored IBM SVC pools:
1. Click the component instance > KM Commands > Reporting > Pools Activity...
Generating a Pools Activity Report
95 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Select the parameter for which you wish to generate a report for:
read bytes
write bytes
read / write bytes
3. Select the report range and interval
4. If you triggered the KM command from the IBM SVC main icon:
Click the Pools Selection button
Select the specific Pool(s) you wish to include in the report
Click Accept
5. Click Show Report.
Viewing a Pools Activity Report
96Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Volumes Activity ReportIBM SVC KM for PATROL enables you to generate a report for your monitored IBM SVC volumes:
1. Click the component instance > KM Commands > Reporting > Volumes Activity...
Generating a Volume Activity Report
2. Select the parameter for which you wish to generate a report for:
read bytes
write bytes
read / write bytes
3. Select the report range and interval
4. If you triggered the KM command from the IBM SVC main icon:
Click the Volumes Selection button
Select the specific volume(s) you wish to include in the report
Click Accept
97 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
5. Click Show Report.
Viewing a Volume Activity Report
LUNs Mapping TableIn order to facilitate the servers management, administrators can use the LUNs Mapping Table tolist: mapped and/or not mapped LUNs.
1. In the console, right-click the IBM SVC icon > KM Commands > Reporting > LUNs MappingTable...
Set the list parameters
2. Define the setting of the list you wish to create
Select the type of LUNs you wish the list to display: Not mapped, mapped or all
Select the sorting order: Hostname, LUN or Size
Select the format: Standard or CSV
98Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
3. Click Show Report to display a list of LUNs corresponding to your requirements
LUNs Mapping Table
LUNs Preferred Node TableTo list all LUNs preferred nodes, click the KM main icon > KM Commands > Reporting > LUNsPreferred Node Table...
LUNs Preferred Node Table
99 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Per Host Storage AllocationThe Per Host Storage Allocation reports on the volume of storage allocated to each monitoredhost.
1. In the console, right-click the IBM SVC icon > KM Commands > Reporting > Per Host StorageAllocation...
2. The report show the total amount of consumed and subscribed storage capacity for eachmonitored host.
Per Host Storage Allocation Report
Per LUN Storage AllocationThe Per LUN Storage Allocation reports on the volume of storage allocated to each monitoredLUN.
1. In the console, right-click the IBM SVC icon > KM Commands > Reporting > Per LUN StorageAllocation...
2. The report show the total amount of consumed and subscribed storage capacity for eachmonitored LUN.
Per LUN Storage Allocation Report
100Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
The list of results will be truncated in large environments if the buf fer size is not suf f icient to display all theLUNs available. Refer to the BMC documentation to know how to change the buf fer size.
Scheduling ReportsAdministrators can schedule the production of activity reports and LUNs Mapping Table reportsevery day at a specific time. The information retrieved as a text file can later be used by othertools such as BMC Capacity Optimization.
To schedule reports:
1. Right-click the KM main icon > KM Commands > Reporting > Reports Scheduling. The ReportsScheduling wizard appears:
Reports Scheduling
2. Specify the time when the reports are automatically generated
3. Check the Activity report type to automatically generate the following reports:
Nodes Array Activity: Reports on Sent and Received Bytes for all monitored nodes
Ports Activity: Reports on Sent and Received Bytes for all monitored ports
Storage Systems Activity: Reports on Read and Write Bytes for all monitored storagesystems
MDisks Activity: Reports on Read and Write Bytes for all monitored MDisks
Volume Activity: Reports on Read and Write Bytes for all monitored volumes
101 Monitoring with the KM
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
4. Select LUNs Mapping Table to list mapped and unmapped LUNs
5. Click OK.
The generated file(s) are time-stamped and stored in %PATROL_HOME%\log for the specific timeset through the History Retention Period parameter.
The history retention period can be set f rom the PATROL Console or f rom the PATROL Agent using aconf iguration variable. The default collection (retention) period is one day. Whenever a stored parametervalue exceeds its retention period, it is automatically deleted from the parameter history f ile. Refer to BMCdocumentation for details.
Administrative TasksThis section deals with information on basic configuration and administrative tasks such as:
Acknowledging alerts and resetting
Setting automatic parameter reset
Configuring Java settings
Customizing the discovery cycle
Customizing the polling interval
Disabling Volumes Monitoring
Enabling the debug mode
Pausing / Resuming monitoring
Refreshing parameters
Removing device monitoring
Restoring device monitoring
Reinitializing the KM
Triggering a KM discovery.
Managing FC Port ParametersSome parameters of the FC Port instances keep increasing as new errors are encountered. Thecounter starts with the value present at the PATROL Agent start or upon the KM reinitialization.When no error occurs, the parameters remain at zero. Each time an error occurs thecorresponding parameter is increased by 1 (one), and the KM retains this NEW value until it isacknowledged.
The KM provides two KM Commands to acknowledge alerts on a FC Port parameter:
Acknowledge Alerts and Reset
Set Automatic Parameter Reset
102Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Acknowledging Alerts and ResettingThis functionality only applies to the parameters of the FC Port instances. It allows administratorsto manually acknowledge alerts and reset the parameters' counters.
To manually acknowledge and reset a FC Port instance parameters, right-click a FC Port instance >KM Commands > Acknowledge Alerts and Reset.
Setting Automatic Parameter ResetSince the manual acknowledgment of each error can rapidly become time consuming, IBM SVCKM for PATROL can be configured to automatically acknowledge an alert on the FC Portparameters and reset it to zero after a specified period of time. Also, since an alert is onlytriggered upon the first breach of a threshold, subsequent issues, that should be notified, may gounnoticed by the SAN administrator. Setting an automatic reset for parameters ensureadministrators to be notified upon each threshold's breach.
To set the automatic parameter reset:
1. Right-click the KM main icon > KM Commands > KM Settings > Automatic Parameters Reset...
2. Select the period of time after which you want the KM to automatically reset the parametersand click OK.
SettingAutomatic Parameter Reset
103 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
In many cases, an error that does not reoccur after a certain amount of time can be safely ignored.Automatically resetting parameters after a few hours is often considered as a good practice.
Configuring Java SettingsThe Java Settings wizard enables you to define which Java instance is to be used by IBM SVC KMfor PATROL for managing the email alert action only when using a version lower than 3.6.0.11 ofPATROL agent.
You can either use the automatic detection, select a pre-detected java path or enter manuallythe path leading to the Java executable directory to be used.
IBM SVC KM for PATROL requires Java 1.5 or greater to be installed to connect to an IBM SVC controller. Youwill need to install a Java Runtime Environment (JRE) on the same system that runs the PATROL Agent andthe IBM SVC KM. The Java Settings wizard lets you def ine the path of the Java environment to be used bythe KM.
To access the Java Settings wizard, right-click the main IBM SVC KM icon > KM commands > KMSettings > Java Settings.
Java Settings Wizard - Method Selection
Select the Java executable detection method:
104Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Automatic: if you wish IBM SVC KM for PATROL to detect the Java executable directory byitself upon each discovery.
User Selection: if you wish to select a Java executable directory within a list of pre-detectedexecutables.
Manual: if you wish to manually enter the Java executable directory path.
Click Next to continue.
Automatic Detection
If you have selected the automatic detection at the previous step of the wizard, IBM SVC KM forPATROL displays the path of the Java executable directory that will be used when performingcommands requiring Java features.
Java Settings Wizard — Automatic Detection
Click Finish to save your settings.
User Selection
If you have selected the User Selection option at the previous step of the wizard, IBM SVC KM forPATROL displays a list of all the Java executable directories found on your machine.
105 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Java Settings Wizard — User Selection
Select the Java executable directory you wish IBM SVC KM for PATROL to use when performingcommands requiring Java features and click Finish to save your settings.
Manual
If you have selected the Manual option at the previous step of the wizard, IBM SVC KM forPATROL let you enter the path to the Java executable directory you wish the application to usewhen performing commands requiring Java features.
106Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Java Settings Wizard — Manual Settings
Click Finish to save your settings.
Once you have modified a java setting, you must restart the PATROL in order to make yourchanges.
Java Settings Wizard — Restart the PATROL Agent
Click OK and restart the PATROL Agent.
107 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Customizing the Discovery IntervalIBM SVC KM for PATROL periodically performs discoveries to detect new components in yourmonitored environment. By default, the KM runs a discovery every hour, but you can customizethis interval by right-clicking the IBM SVC KM icon > KM Commands > KM Settings > DiscoveryInterval...
Customizing Discovery Interval
Customizing the Polling IntervalA polling interval defines how often new data is collected. A new collection can be performedfrom once every second, to once in a day. IBM SVC KM for PATROL polls the managed systems tocollect performance and statistics data. By default, the polling interval for this "data-collect" isset to 2 minutes.
The lower the polling interval, the more time consuming the collection process might be.
To change the polling interval for the managed system, right-click the IBM SVC KM icon > KMCommands > KM Settings > Polling Interval…
108Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Customizing the Polling Interval
In addition to the polling interval that is a global setting, i.e. it is applicable to the wholemanaged system, you can also manually trigger a poll at any time on individual instances torefresh parameter values by right-clicking the instance icon > Refresh Parameters.
Disabling Volumes MonitoringDiscovering and collecting volumes metrics are resource-intensive actions that can create extraworkload on the PATROL Agent and the targeted system. To limit the number of instancescreated and therefore reduce the system resource consumption, administrators can disable themonitoring of all the volumes of a system.
109 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
To disable volumes monitoring
1. Right-click the Storage Center icon > KM Settings > Disable Volumes Monitoring
Disabling Volumes Monitoring
110Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Check the Disable Volumes Monitoring option and click OK.
To resume volumes monitoring
1. Right-click the Storage Center icon > KM Settings > Disable Volumes Monitoring
Disabling Volumes Monitoring
3. Uncheck the Disable Volumes Monitoring option and click OK.
Enabling the Debug ModeBy default, IBM SVC KM for PATROL sends only the most critical information, warning and errormessages to the System Output Window of the PATROL Consoles. Most often, this information isaccurate enough to ensure that IBM SVC KM for PATROL is working properly.
If you encounter an issue and wish to report it to Sentry Software, you will be asked to enablethe Debug Mode and provide the debug output to the Sentry Software support team.
To enable the debug mode:
111 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
1. Right-click the main IBM SVC KM icon > KM Commands > KM Settings > Debug...
Enabling the Debug Mode
2. Check the Enable Debug Mode option
3. Indicate the date and time at which the system must stop logging debug information.. Therequired format is: YYYY/mm/dd HH:MM:SS
4. Check the Reinitialize IBM SVC KM for PATROL option (optional).
5. Click OK. The debug files will automatically be saved in $PATROL_HOME/log.
Enabling the KM Configuration MenusIBM SVC KM for PATROL can either be used with BMC PATROL (Classic Mode) or BMCProactiveNet Performance Manager (CA Mode). When the KM is used with BMC ProactiveNet, allthe KM configuration menus are disabled in the PATROL Consoles and an error is displayed whenselecting a KM command:
112Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Error Message for Disabled KM Configuration Menus
To enable the KM Configuration Menus, you will then have to force the KM to run in ClassicMode.
1. In the PATROL Console, right-click the KM main icon > KM Commands > Reinitialize KM...:
Forcing the KM to run in Classic Mode
113 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
2. Check the box Force the KM to run in Classic Mode
3. Click Reinitialize.
This action cannot be undone. Once the KM configuration menus are enabled in BMC PATROL, the KMcan no longer be configured through "Central Administration".
Pausing/Resuming MonitoringIn order to perform certain tasks, such as maintenance for example, it is often useful to pausethe monitoring of an element or a group of elements. To pause the monitoring of a specificelement or group of elements, right-click the element (or element container) icon > KMCommands > Pause Monitoring.
When in paused state, the element/group of elements is displayed with an OFFLINE status in thePATROL Console. Additionally, the mention '(Suspended)' appears beside each relatedparameter.To resume the monitoring of the element/group of elements click Resume Monitoring in themenu.
Refreshing ParametersTo manually refresh parameters of the IBM SVC KM for PATROL, without waiting for an automaticpolling cycle, right-click the instance icon > KM Commands > Refresh Parameters.
Because parameters are either collected every 2 or15 minutes, information will not be immediatelyavailable after refresh. To know which parameters are collected every 2 minutes and which every 15minutes, please refer to the Reference Guide.
Removing Device MonitoringWhenever the supervision of an element/group of elements becomes irrelevant, it is possible toterminate its monitoring by right-clicking the element icon > KM Commands > Remove.
Once removed, the element/group of elements is no longer displayed in the PATROL Console.The Remove KM Command only prevents the display of instances in the PATROL Console. Thediscovery and collect processes are still performed in the background.
114Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Restoring MonitoringIt is possible to restore the monitoring of a device with IBM SVC KM for PATROL after it has beenremoved from monitoring environment through the Remove option.
To restore the monitoring of a specific device:
1. Right-click the KM main icon > KM commands > KM Settings > Additional Settings > Restore Monitoring
Restore Monitoring
2. Select:
<All> if you want to restore the monitoring of all the devices that had been previouslyremoved, in the PATROL Console
One or more objects if you only want to restore specific devices (press down the Ctrl-key toallow multiple selection)
3. Click Restore.
Reinitializing the KMIf ever IBM SVC KM for PATROL does not function properly: displays components as missing thatyou know are present, or does not detect several components as it should etc., it is possible toreinitialize the configuration and let IBM SVC KM for PATROL re-start monitoring from scratch.
A backup of the PATROL Agent conf iguration is always performed and saved in the $PATROL_HOME/conf igdirectory before a reinitialization of the KM.
The above cases of malfunction could occur after a configuration change or especially after a
115 Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
software/hardware upgrade etc.
In such a case, you can reinitialize the KM, and the KM will then run a full discovery and re-startthe monitoring of existing and new components. Thresholds will be set to default so allpreviously manually set thresholds will be lost, unless specified otherwise in the Reinitialize KMwizard shown below.
1. To reinitialize IBM SVC KM for PATROL: Right-click the KM main icon > KM Commands >Reinitialize KM:
Reinitializing IBM SVC KM
2. Select the options as per your specific needs:Alert thresholds and actions
Remove manually customized alert thresholds and polling intervals: Selection removes allcustomized thresholds.
Reset the threshold mechanism mode to default: Selection makes the KM revert to thedefault mode i.e. IBM SVC KM for PATROL selects the mechanism that is best suited to the
116Administrative Tasks
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
system.
Reset Alert Actions: Selection removes all manually set Alert Actions and reverts to basicdefault actions i.e. Trigger a PATROL event and Annotate a parameter graph.
Reset other alert and threshold settings: Selection reverts any manually doneconfiguration changes to default IBM SVC KM for PATROL values.
Misc. options
Deactivate the debug mode: Selection deactivates the debug mode if manually enabled.
Restore and resume paused/removed objects: Selection restores all paused or removedobjects.
Remove Java Settings: Selection removes the custom Java Settings (path and credentials).The KM will try to automatically find a suitable JRE.
Save reinitialize settings
Save reinitialize settings: Selection saves the defined settings that will then be consideredas default.
In cases where conf igurations have been manually set in the PATROL Agent, there will be an additionalsection called Internal KM engine options displaying the used conf iguration variables and the optionwhether or not to remove them.
3. Click Reinitialize.
Triggering a KM DiscoveryIBM SVC KM for PATROL automatically executes a discovery every hour of all IBM objects for themonitored system. This enables discovering and then monitoring any new objects added orremoved on the monitored environment.
You can force a discovery manually by right-clicking on the KM main icon > KM Commands >Trigger a Discovery. This forces a discovery for the selected host only.
With a view to optimization, the discovery process is as parallelized as possible. All independent objects areprocessed at the same time.
Thresholds, Alerts and NotificationsDefault alert thresholds are set only once in the agent's configuration the first time the KM runs.These thresholds can be customized using the Event Management KM or PCM (PATROLConfiguration Manager). Administrators can, at any time, revert the configuration changes to thedefault values using the Reinitialize KM command with the Reset other alert and thresholdsettings option enabled or using the Event Management KM or PCM to delete the correspondingconfiguration variables.
The KM also offers you the possibility of selecting the type of notification (Alert actions) to beperformed once an alert is raised.
117 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Alert Actions
Alert Actions Macros
Threshold Mechanism Selection
Threshold Mechanism SelectionManaging thresholds means selecting/modifying the mechanism by which IBM SVC KM forPATROL sets thresholds for all parameters of the monitored components. By default, IBM SVC KMfor PATROL automatically sets alert thresholds on the monitored parameters.
To modify the threshold mechanism:
1. Right-click the KM main icon > KM Commands > KM Settings > Additional Settings > ThresholdMechanism Selection...
Threshold Mechanism Selection
2. Select one of the following options:
Automatic (default): IBM SVC KM for PATROL determines and uses the thresholdmechanism best suited to the managed system
Tuning: If selected, IBM SVC KM for PATROL will manage its thresholds through thestandard internal PATROL mechanism (Override parameters). Thresholds are stored in thePATROL Agent configuration under the /___tuning___ tree.
Event Management: If this option is selected, IBM SVC KM for PATROL will manage itsthresholds through the Event Management mechanism. Thresholds are stored in thePATROL Agent configuration under the /AS tree. This option requires that you set up thePATROL for Event Management KM on your PATROL Agent. PATROL for Event Management (formerly known as EventSpring) has to be enabled and preloaded.
No Thresholds: IBM SVC KM for PATROL will not set any thresholds on the monitoredobjects. You are required to set them manually.
118Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
If you use PATROL for Event Management to manage thresholds in PATROL, it is strongly recommendedthat you use this option in IBM SVC KM for PATROL too.
In order to avoid side effects and unpredictable behavior, if you change the threshold mechanism (from“Event Management” to “Tuning” or the other way around), the KM will automatically recreate thedefault thresholds settings using the new threshold mechanism. Manually customized thresholdshowever are not automatically migrated.
Alert ActionsAlert Actions enable the PATROL administrator to choose specific actions to be executed when ahardware failure is detected. With Alert Actions, it is possible to either:
Customize the way a hardware problem notification is performed, or
Specify a recovery action to be run when a problem occurs.
IBM SVC KM for PATROL can be configured to run one, several, or all types of Alert Actions whenan alert is triggered regarding the monitored hardware.
By default, upon an IBM SVC System failure, the KM triggers a PATROL event and annotates theparameter’s graph with a comprehensive report of the problem, giving details about the failure,the possible consequences and the recommended action to solve the problem.
The Alert Actions that can be performed by IBM SVC KM for PATROL are:
Trigger a PATROL event
Annotate the parameter's graph
Execute an OS command
Execute a PSL command
Send a pop-up to the PATROL consoles
Write a line to a LOG file
Send a basic SNMP trap (using the PATROL MIB)
Send a custom SNMP trap
Send an email
Alert Actions are highly customizable. One can customize the string that is sent through SNMP,set the username/password that is used to execute the OS Command, define the content of thePATROL event sent by IBM SVC KM for PATROL, etc.
Additional information regarding the alert, such as the parameter name or its value, is availablethrough the Alert Actions macros. This information can be used to further customize the AlertAction triggered by IBM SVC KM for PATROL and provide more details about the problem thatoccurs.
119 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Alert Actions MacrosA macro is a variable whose value is replaced when an Alert Action is triggered. Macros can beused to customize the content of each Alert Action.
For example: %{VALUE} is replaced by the actual current value of the parameter that triggeredthe alert. When used in the text field for a PATROL event Alert Action, the percentage value isreplaced by the actual current value of the parameter that triggered the alert.
Each macro listed in the tables below contains information about what triggered the PATROLalert.
Macros Description
%{/…} Recommended for advanced users only.Provides an internal instance variable name to be inserted. The pathis relative to the object triggering the alert.
%{ALARM_TYPE} Type of the alert triggered (ALARM, WARNING or INFORMATION)
%{ASCTIME:…} Current date and time formatted as specified in the macro
%{DATE} Current date in the YYYY-MM-dd format
%{HOSTNAME} Name of the computer on which the PATROL Agent is running
%{NEWLINE} Linefeed. This is useful to produce multi-line information
%{OBJECT_CLASS} Class of the instance that triggered the alert
%{OBJECT_ID} PATROL internal ID of the instance that triggered the alert
%{OBJECT_LABEL} Display name of the instance that triggered the alert
%{PARAMETER_NAME} Name of the parameter that triggered the alert
%{PARENT_...} Gets the parent's object of a macro
%{PARENT_CLASS} Class of the object that the faulty instance is attached to
%{PARENT_ID} PATROL internal ID of the object that the faulty instance is attachedto
%{PARENT_LABEL} Display name of the object that the faulty instance is attached to
%{SEMICOLON} Semicolon character.
%{SVCHOSTNAME} Name of the computer monitored with the PATROL Agent
%{TIME} Current time in the HH:MM:SS format
%{VALUE} Value of the parameter that triggered the alert.
120Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Edit Alert ActionsTo modify the Alert Actions executed by IBM SVC KM for PATROL upon a hardware failure, right-click on the KM main icon > KM Commands > KM Settings > Alert Actions…
Select the Alert Actions to be executed
By default, IBM SVC KM for PATROL triggers a PATROL event and annotates the parameter thatraises the alert, but there are all the actions that can be triggered:
Editing Alert Actions — Selecting Parameters
After selecting and defining Alert Actions, you need to validate your changes by clicking the Finish button.
121 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Editing Alert Actions — Validation
Trigger a PATROL EventIf you select Trigger a PATROL Event:
1. Select the type of PATROL event you wish to trigger when a storage problem occurs:
A STD_41 PATROL Event
A Specific PATROL Event
No Event
These events are generated every time a threshold is exceeded. They contain a full Storage Health Reportdetailing the fault that has occurred.
122Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Editing Alert Actions — Alert Action: Trigger a PATROL Event
2. If needed, modify the event message. You can use alert action macros that will be replacedat runtime.
3. Click Next and Finish.
A PATROL Event can be viewed from:
Standard PATROL Consoles (Classic Console, PATROL Central)
PATROL Enterprise Manager
BMC Impact Manager
Other third-party products that interface with PATROL.
The PATROL event that is triggered is the ‘41’ event f rom the standard PATROL catalog. You can use macrosthat will be replaced at runtime. The Alert Actions Macro Variables states the list of available macros.
123 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Annotate the Parameter’s GraphIf you select the Annotate the parameter’s graph action:
1. Possibly modify the string that will be displayed within the annotation point. You can usealert action macros that will be replaced at runtime.
Editing Alert Actions — Alert Action: Annotate Parameter's Graph
2. Click Next and Finish.
You can use macros that will be replaced at runtime. The Alert Actions Macro Variables states the list ofavailable macros.
124Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Execute an OS CommandIf you select the Execute an OS command action:
Editing Alert Actions — Alert Action: Execute an OS Command
Enter a command line to be executed
Enter the username and password used to run the command.
The command can be a program utility or a script shell, and can have arguments.
The command must be non-interactive (no window, no user input).
You can use macros that will be replaced at runtime. The Alert Actions Macro Variables states the list ofavailable macros.
125 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Execute a PSL CommandIf you select the Execute a PSL command action, you need to enter the PSL statement to beexecuted by the PATROL Agent. Although only a single line is permitted, it can have several PSLinstructions.
Editing Alert Actions — Alert Action: Execute a PSL Command
The PSL command is recommended for advanced user of PATROL.
You can use macros that will be replaced at runtime. The Alert Actions Macro Variables section states the listof all the available macros.
126Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Send a Pop-up to the PATROL ConsolesIf you select the Send a pop-up to the PATROL Consoles action, you need to enter the messagethat will be displayed in the pop-up as well as in the title of the pop-up window.
Editing Alert Actions — Alert Action: Send a Pop-up to the PATROL Consoles
Too many pop-ups could annoy the operators.
You can use macros that will be replaced at runtime. The Alert Actions Macro Variables states the list ofavailable macros.
127 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Write a Line to a LOG FileIf you select the Write a line to a LOG file action:
Editing Alert Actions — Alert Action: Write a Line to a LOG File
Enter the LOG file path and the content of the line.
You can use macros that will be replaced at runtime. The Alert Actions Macro Variables states the list ofavailable macros.
128Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Send a Basic SNMP TrapIf you select the Send a basic SNMP trap action:
Editing Alert Actions — Alert Action: Send a Basic SNMP Trap
Enter the following:
IP address or Hostname of the SNMP trap destination
SNMP port and community string
Text that will be sent in the SNMP trap
Upon a hardware failure, IBM SVC KM for PATROL will send the trap that is def ined in the PATROL MIB(Trap number 11, Enterprise ID: 1.3.6.1.4.1.1031.1.1.2, the text is stored in the 1.3.6.1.4.1.1031.1.1.2.1OID). You can use macros that will be replaced at runtime. The Alert Actions Macro Variables section statesthe list of available macros.
129 Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Send a custom SNMP Trap (advanced)If you select the Send a custom SNMP trap action:
Editing Alert Actions — Alert Action: Send a Custom SNMP Trap
Enter the following:
IP address or Hostname of the SNMP trap destination
SNMP port and community string
All the characteristics of the trap: Enterprise ID, trap number and up to 4 varbinds.
130Thresholds, Alerts and Notifications
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Send an emailIf you select the Send an email action, you need to complete the following panel:
Alert Actions: Send an E-mail
Enter the sender and the recipient email addresses in respectively the From and To fields, andtype the SMTP server name. Finally, enter the email Subject and type the Body of the messageyou wish to send.
133
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Introduction
This chapter provides statistical information about resources, operating status, and performancesmanaged by the IBM SVC KM for PATROL. It contains tables describing the parameters used in theKM, grouped by Application Classes, and provides a brief description of each parameters and itsdefault settings.
The collection of cluster statistics must be started on the IBM SVC System to get performanceinformation on the PATROL Console. For more information, please refer to Starting Statistics Collection.
Some parameters are collected every 2 minutes; others every 15 minutes.
Classes and ParametersThis section lists the application classes of IBM SVC KM for PATROL. It gives you details on theicons that represent the class, Infobox, parameters and the menu commands available for eachapplication class. There are 10 main application classes and 6 “container” classes. The containerclasses have no parameters.
SEN_SVC_MAIN
SEN_SVC_SVC
SEN_SVC_NODE
SEN_SVC_NODE_CONT
SEN_SVC_ISCSIPORT
SEN_SVC_FCPORT
SEN_SVC_PORT_CONT
SEN_SVC_POOL
SEN_SVC_POOL_CONT
SEN_SVC_MDISK
SEN_SVC_MDISK_CONT
SEN_SVC_STORAGESYSTEM
SEN_SVC_STORAGESYSTEM_CONT
SEN_SVC_VOLUME
SEN_SVC_VOLUME_CONT
SEN_SVC_VOLUMEMIRROR
Baselines and Key Performance Indicators
Some parameters are identified by default as Key Performance Indicators (KPIs) and thereforeautomatically included in the base lining calculation. To learn more about auto baselining and
134Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
KPIs, please refer to the Managing Baselines and Key Performance Indicators chapter.
In this guide, parameters flagged as KPIs and included by default in the baseline calculationprocess are respectively identified by the following icons:
Baselining
KPI
SEN_SVC_MAINIcon
Collectors
Name Description
discoveryColl Discovery's collector
Parameters
None.
InfoBox
Name Description
Copyright Provides the name of the company owning the reproduction rights on theproduct.
Product Displays the name of the product.
Release Date Indicates the date on which the product was released.
Support Provides an email address where users can send message to get help on theproduct.
Version Indicates the KM version number.
Website Provides the address of the product's web site
135 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Menu Commands
Function Description
Add a Connection to anIBM SVC System
Enables you to identify the IBM SVC System to be monitored.
Reporting Enables the generation of several activity reports.
Reporting > NodesActivity...
Enables the generation of node activity reports.
Reporting > Ports Activity... Enables the generation of port activity reports.
Reporting > StorageSystems Activity...
Enables the generation of storage system activity reports.
Reporting > MDisksActivity...
Enables the generation of MDisk activity reports.
Reporting > Pools Activity... Enables the generation of pools activity reports.
Reporting > VolumesActivity...
Enables the generation of volume activity reports.
Reporting > LUNs MappingTable...
Lists all mapped and/or not mapped LUNs.
Reporting > LUNs PreferredNode Table
Lists all LUNs preferred nodes.
Reporting > Per HostStorage Allocation
Generates a report on the volume of storage allocated to each monitoredhost.
Reporting > Per LUNStorage Allocation
Generates a report on the volume of storage allocated to each monitored LUN.
Reporting > ReportsScheduling
Generates activity and LUNs Mapping Table reports every day at a specifictime. The information retrieved as a text file can later be used by other toolssuch as BMC Capacity Optimization.
Search WWN/IQN Enables you to find any component based on its complete or partial WorldWide Name or iSCSI Qualified Named.
KM Settings Displays all the command options for different monitoring settings.
KM Settings > Java Settings Enables you to perform additional settings such as restoring devicemonitoring, displaying settings for UNIX Console and enabling/disablingdebug mode
KM Settings > DiscoveryInterval
Enables you to customize the discovery cycle. By default, discovery isperformed every hour.
KM Settings > PollingInterval
Enables you to customize the polling cycle. By default, the polling interval isdone every 2 minutes
KM Settings > Alert Actions Enables you to select the Alert Actions (different methods of notification) tobe executed by the KM when a parameter breaches its threshold.
KM Settings > AutomaticParameter Reset
Allows you to set an automatic reset of the FC Port parameters.
136Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
KM Settings > AdditionalSettings > ThresholdMechanism Selection
Allows you to select the threshold mechanism:Automatic (by default): the KM determines the mode of thresholdmanagement best suited to the system. The different modes are:
Tuning: the KM uses the internal PATROL mechanism to set thresholdsEvent Management: the KM automatically sets thresholds throughEvent ManagementNo thresholds: the KM does not set any thresholds and lets you specifythem manually.
KM Settings > AdditionalSettings > RestoreMonitoring
Brings up the "Restore Monitoring" wizard to restore one or several objectsafter their monitoring has been stopped.
KM Settings > Debug Activates or deactivates the debug mode. The debug Mode displays debugmessages in the PATROL System Output Window or saves it in a file if youenter the file path
Pause All Pauses the monitoring of all objects discovered by IBM SVC KM for PATROL.
Resume All Resumes the monitoring of all objects after IBM SVC KM for PATROL has beenpaused.
Trigger a KM Discovery Enables you to trigger a forced discovery and rediscover the elements of themonitored system.
Reinitialize KM Triggers a complete re-initialization of IBM SVC KM for PATROL. Customizedsettings are lost unless specified otherwise in the Reinitialize wizard.
About States basic product information and BMC Software support contactinformation
137 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_SVCIcon
Collectors
Name Description
fcPortColl FC Ports' collector
iSCSIPortColl iSCSI Ports' collector
mDiskColl mDisks' collector
nodeColl Nodes' collector
poolColl Pools' collector
storageSystemColl Storage Systems' collector
svcColl SAN Volume Controller's collector
volumeColl Volume's collector
Parameters
All parameters are refreshed every 2 minutes.
Name Description Units Default Alert Conditions BMCProactiveNetAttribute Type
CollectionStatus* Indicates thestatus of thecollection.
{0= OK; 1 = Degraded;2= Failed}
1 = Warning2 = Alarm
CollectionStatus
CollectionStatusInformation
Providesadditionalinformationabout theCollectionStatusparameter.
n/a None --
PortCount Number ofFC andEthernetports on theStorageSystem.
Ports None Statistics
138Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default Alert Conditions BMCProactiveNetAttribute Type
Note: Thisvalue can beused to knowthe numberof requiredlicenses forthemonitoringsystem.
TimeSinceLastSatisticsUpdate
Displays thenumber ofminutessince a newstatisticsfile wascreated onthe cluster.
minutes Warning when > 30 Statistics
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID Displays PATROL internal identifier.
IP Indicates the IP address of IBM SVC.
Menu Commands
Function Description
Reporting Enables the generation of several reports.
Reporting > NodesActivitiy...
Enables the generation of node activity reports.
Reporting > Ports Activity... Enables the generation of port activity reports.
Reporting > StorageSystems Activity...
Enables the generation of storage system activity reports.
Reporting > MDisksActivitiy...
Enables the generation of MDisk activity reports.
Reporting > VolumesActivity...
Enables the generation of volume activity reports.
Reporting > Pools Activity... Enables the generation of pools activity reports.
139 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Function Description
Reporting > LUNs MappingTable...
Lists all mapped and/or not mapped LUNs.
Reporting > LUNs PreferredNode Table
Lists all LUNs preferred nodes.
Reporting > Per HostStorage Allocation
Generates a report on the volume of storage allocated to each monitoredhost.
Reporting > Per LUN StorageAllocation
Generates a report on the volume of storage allocated to each monitoredLUN.
Edit Connection Settings Enables you to modify the connection settings of an IBM SVC System.
Search WWN/IQN Enables the user to find any component based on its complete or partialWorld Wide Name or IQN
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
Refresh Parameters Refreshes all parameters of the application class.
140Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_NODE_CONTIcon
Parameters
None.
InfoBox
None.
Menu Commands
Function Description
Reporting Enables the generation of several reports.
Reporting > NodesActivity...
Enables the generation of node activity reports.
Reporting > Ports Activity... Enables the generation of port activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
141 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_NODEIcon
Collectors
None.
Parameters
Parameters Refreshed Every 2 Minutes
Name Description Units Default Alert Conditions BMCProactiveNetAttribute Type
Status Indicates thestatus of thenode.
{0= OK;1 =Degraded; 2=Failed}
1 = Warning2 = Alarm
Availability
StatusInformation Providesadditionalinformationabout thestatusparameter.
n/a n/a --
Parameters Refreshed Every 15 Minutes
Name Description Units Default Alert Conditions BMCProactiveNetAttribute Type
ProcessorUtilization* Indicates thepercentageof utilizationof theprocessor.
Percentage(%)
Warning whengreater than 90%;Alarm when greaterthan 99%
Statistics
ReceivedByteRate Indicates thenumber ofmegabytesreceived persecond.
Megabytesperseconds (MB/s)
None Statistics
142Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default Alert Conditions BMCProactiveNetAttribute Type
ReceivedOperationRate Indicates thenumber ofoperationsreceived persecond.
Operations/s
None Statistics
ReceivedResponseTime Indicates theaverage timetaken tocompletereceiverequests.
Milliseconds(ms)
Warning whengreater than 10 ms;Alarm when greaterthan 100ms
Response Time
SentByteRate Indicates themegabytessent.
Megabytespersecond(MB/s)
None Statistics
SentOperationRate Indicates thenumber ofoperationssent.
Operations/s
None Statistics
SentResponseTime Indicates theaverage timetaken tocompletesendrequests.
Milliseconds(ms)
Warning whengreater than 10 ms;Alarm when greaterthan 100ms
Response Time
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
Name Name of the node.
WWN World Wide Name address of the device.
IO Group ID Identifier of the input/output group.
IO Group Name Name of the input/ouput group the node belongs to.
Partner ID Identifier of the partner node.
Partner Name Name of the partner node.
Failover Failure status (active/inactive).
Failover Node Identifier of the failover node.
Hardware Model information (CF8, 8F2, 8F4, 8G4, Other.)
143 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description
iSCSI Name Name of the iSCSI port.
Failover iSCSI alias iSCSI alias for failover.
Menu Commands
Function Description
Reporting Enables the generation of several reports.
Reporting > Node Activity... Enables the generation of a node activity report.
Reporting > Ports Activity... Enables the generation of port activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment..
Refresh Parameters Refreshes all parameters of the application class.
144Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_PORT_CONTIcon
Parameters
None.
InfoBox
None.
Menu Commands
Function Description
Ports Activity... Enables the generation of port activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System from the monitoring environment.
145 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_ISCSIPORTIcon
iSCSI port
Collectors
None.
Parameters
Parameters Refreshed Every 2 Minutes
Name Description Units DefaultAlertConditions
BMCProactiveNetAttributeType
LinkSpeed Indicates the iSCSI interfacelink speed.
Megabytesperseconds(MB/s)
None Statistics
Status Indicates the status of theiSCSI port.
{0= OK; 1 =Degraded;2= Failed}
1 =Warning2 =Alarm
Availability
StatusInformation Provides additionalinformation about the statusparameter.
n/a n/a --
Parameters Refreshed Every 15 Minutes
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
BandwidthUtilization* Percentage used ofthe availablebandwidth.
Percentage(%)
None Statistics
146Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ReceivedByteRate Indicates thenumber ofmegabytesreceived persecond.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromHostsByteRate Indicates thenumber ofmegabytesreceived fromhosts per second.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromOtherClustByteRate Indicates thenumber ofmegabytesreceived fromother nodes.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromSameClustByteRate Indicates thenumber ofmegabytesreceived from thesame cluster.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromStorageByteRate Indicates thenumber ofmegabytesreceived fromstorage.
Megabytesperseconds(MB/s)
None Statistics
SentByteRate Indicates thenumber ofmegabytes sent tohost, diskcontrollers, andother nodes in thesame and otherclusters.
Megabytesperseconds(MB/s)
None Statistics
SentToHostsByteRate Indicates thenumber ofmegabytestransmitted tohost.
Megabytesperseconds(MB/s)
None Statistics
SentToOtherClustByteRate Indicates thenumber ofmegabytestransmitted toother nodes in theother clusters.
Megabytesperseconds(MB/s)
None Statistics
147 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
SentToSameClustByteRate Indicates thenumber ofmegabytestransmitted toother nodes in thesame cluster.
Megabytesperseconds(MB/s)
None Statistics
SentToStorageByteRate Indicates thenumber ofmegabytestransmitted tostorage.
Megabytesperseconds(MB/s)
None Statistics
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
IQN iSCSI Qualified Name.
Menu Commands
Function Description
Port Activity... Enables the generation of port activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
Refresh parameters Refreshes all parameters of the application class.
148Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_FCPORTIcon
FC port
Collectors
None
Parameters
Parameters Refreshed Every 2 Minutes
Name Description Units DefaultAlertConditions
BMCProactiveNetAttributeType
LinkSpeed Indicates the FC interface linkspeed.
Megabytesperseconds(MB/s)
None Statistics
Status Indicates the status of the FCport.
{0= OK; 1 =Degraded;2= Failed}
1 =Warning2 =Alarm
Availability
StatusInformation Provides additionalinformation about the statusparameter.
n/a n/a --
Parameters Refreshed Every 15 Minutes
Name Description Units DefaultAlertConditions
BMCProactiveNetAttributeType
BadCRC Indicates the number of CRCthat are not valid.
Errors Warning if≥1
Statistics
149 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units DefaultAlertConditions
BMCProactiveNetAttributeType
BandwidthUtilization* Percentage used of theavailable bandwidth.
Percentage(%)
None Statistics
InvalidTransmissionWords Indicates the number oftransmission word countsthat are not valid.
Words Warning if≥1
Statistics
LinkFailures Indicates a link failure count. Failures Warning if≥1
Statistics
LossOfSignal Indicates the loss-of-signalcount.
Losses Warning if≥1
Statistics
LossOfSynch Indicates the loss-of-synchronization count.
Losses Warning if≥1
Statistics
ProtocolErrors Indicates the protocol errorcount.
Errors Warning if≥1
Statistics
ReceivedByteRate Indicates the number of bytessent from host, diskcontrollers, and other nodesin the same and otherclusters.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromHostsWriteRate Indicates the number ofmegabytes received fromhosts per second.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromOtherClustByteRate Indicates the number ofmegabytes received fromother nodes.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromSameClustByteRate Indicates the number ofmegabytes received from thesame cluster.
Megabytesperseconds(MB/s)
None Statistics
ReceivedFromStorageByteRate Indicates the number ofmegabytes received fromstorage.
Megabytesperseconds(MB/s)
None Statistics
SentByteRate Indicates the number ofmegabytes sent to host, diskcontrollers, and other nodesin the same and otherclusters.
Megabytesperseconds(MB/s)
None Statistics
150Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units DefaultAlertConditions
BMCProactiveNetAttributeType
SentToHostsByteRate Indicates the number ofmegabytes transmitted tohost.
Megabytesperseconds(MB/s)
None Statistics
SentToOtherClustByteRate Indicates the number ofmegabytes transmitted toother nodes in the otherclusters.
Megabytesperseconds(MB/s)
None Statistics
SentToSameClustByteRate Indicates the number ofmegabytes transmitted toother nodes in the samecluster.
Megabytesperseconds(MB/s)
None Statistics
SentToStorageByteRate Indicates the number ofmegabytes transmitted tostorage.
Megabytesperseconds(MB/s)
None Statistics
ZeroBufferTimePercentage Percentage of time where theport was unable to send datadue to lack of buffer credit inthe switch.
Percentage(%)
None Statistics
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
WWN World Wide Name of the Fibre Channel.
Menu Commands
Function Description
Port Activitiy... Enables the generation of port activity reports.
Acknowledge Alerts andReset
Resets error counts.
Pause Monitoring Pauses the monitoring of the IBM SVC System
Resume Monitoring Resumes the monitoring of the IBM SVC System
Remove Removes the IBM SVC System components from the monitoring environment.
151 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Function Description
Refresh Parameters Refreshes all parameters of the application class.
152Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_POOL_CONTIcon
Parameters
None.
InfoBox
None.
Menu Commands
Function Description
Pools Activity... Enables the generation of pools activity reports.
MDisks Activity... Enables the generation of MDisk activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System
Resume Monitoring Resumes the monitoring of the IBM SVC System
Remove Removes the IBM SVC System components from the monitoring environment.
153 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_POOLIcon
Collectors
None.
Parameters
All parameters are refreshed every 2 minutes.
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ConsumedCapacity Indicates thetotal size of thespace actuallyallocated orreserved.
Gigabytes(GB)
None Statistics
ConsumedCapacityPercentage* Indicates thepercentage of thepool that isactuallyallocated orreserved.
Percentage(%)
Alarm if ≥ 75% Statistics
Status Indicates thestatus of thepool.
{0=OK; 1 =Degraded; 2= Failed}
1 = Warning2 = Alarm
Availability
StatusInformation Providesadditionalinformationabout the statusparameter.
n/a n/a --
SubscribedCapacity Indicates thetotal host visiblecapacity.
Gigabytes(GB)
None Statistics
SubscribedCapacityPercentage* Indicates thepercentage of thepool that issubscribed.
Percentage(%)
None Statistics
154Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ReadByteRate Indicates theamount of dataread from thedisk.
Megabytesper seconds(MB/s)
None Statistics
WriteByteRate Indicates theamount of datawritten persecond.
Megabytesper seconds(MB/s)
None Statistics
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
Capacity Pool capacity.
MDisks Number of managed disks attached to the pool.
Volumes Number of logical disks.
Menu Commands
Function Description
Pools Activity... Enables the generation of pools activity reports
MDisks Activity... Enables the generation of MDisk activity reports
Pause Monitoring Pauses the monitoring of the IBM SVC System
Resume Monitoring Resumes the monitoring of the IBM SVC System
Remove Removes the IBM SVC System components from the monitoring environment.
Refresh Parameters Refreshes all parameters of the application class.
155 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_MDISK_CONTIcon
Parameters
None.
InfoBox
None.
Menu Commands
Function Description
MDisks Activitiy... Enables the generation of MDisk activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
156Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_MDISKIcon
Collectors
None.
Parameters
Parameters Refreshed Every 2 Minutes
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
AvailablePathCount Indicates the number ofnodes that have access tothe managed disk.
Paths 0 = Alarm Statistics
Status Indicates the status of themanaged disk.
{0=OK; 1 =Degraded; 2 =Failed}
1 = Warning2 = Alarm
Availability
StatusInformation Provides additionalinformation about the statusparameter.
n/a n/a --
Parameters Refreshed Every 15 Minutes
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ReadByteRate* Indicates the amount of dataread from the disk.
Megabytes perseconds (MB/s)
None Statistics
ReadOperationRate Indicates the amount ofoperations read per second
Operations/s None Statistics
ReadResponseTime Indicates the average timefor a disk to complete a readrequest
Milliseconds(ms)
Warning ≥ 10ms Alarm ≥ 100ms
ResponseTime
157 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
WriteByteRate* Indicates the amount of datawritten per second.
Megabytes perseconds (MB/s)
None Statistics
WriteOperationRate Indicates the amount ofoperations written persecond.
Operations/s None Statistics
WriteResponseTime Indicates the average timefor a disk to complete awrite request.
Milliseconds(ms)
Warning ≥ 10ms Alarm ≥ 100ms
ResponseTime
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
Mode MDisk access mode (managed, unmanaged, array,image). According to themode of the disk, some infobox information may not be available.
Pool ID Identifier of the pool the MDisk is attached to.
Pool Name Name of the pool the MDisk is attached to.
Capacity Size of the MDisk.
Preferred WWPN Preferred World Wide Port Name for the MDisk.
Active WWPN Active World Wide Port Name for the MDisk.
Tier Underlying disks tier level.
Storage System Information (Section separator)
Name Name of the MDisk.
Vendor Name of the vendor.
Model Model of the MDisk.
WWNN World Wide Name address of the disk.
Menu Commands
Name Description
MDisk Activity... Enables the generation of MDisk activity reports.
158Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
Refresh Parameters Refreshes all parameters of the application class.
159 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_STORAGESYSTEM_CONTIcon
Parameters
None.
InfoBox
None.
Menu Commands
Function Description
Reporting Enables the generation of several activity reports.
Reporting > StorageSystems Activity...
Enables the generation of storage system activity reports.
Reporting > MDisksActivitiy
Enables the generation of MDisk activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove .Removes the IBM SVC System components from the monitoring environment.
160Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_STORAGESYSTEMIcon
Collectors
None.
Parameters
All parameters are refreshed every 2 minutes.
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ReadByteRate* Indicates the amount of dataread per second.
Megabytesperseconds(MB/s)
None Statistics
ReadOperationRate Indicates the amount ofoperations read per second
Operations/s
None Statistics
ReadResponseTime Indicates the average time takento complete a read request
Milliseconds (ms)
Warning if > 10msAlarm if > 100ms
Response Time
Status Indicates the status of thestorage system.
{0 = OK ; 1= Degraded; 2 =Failed}
1 = Warning2 = Alarm
Availability
StatusInformation Provides additional informationabout the status parameter.
n/a n/a --
WriteByteRate* Indicates the amount of datawritten per second.
Megabytesperseconds(MB/s)
None Statistics
WriteOperationRate Indicates the amount ofoperations written per second.
Operations/s
None Statistics
WriteResponseTime Indicates the average time takento complete a write request.
Milliseconds (ms)
Warning if > 10msAlarm if > 100ms
Response Time
161 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
MDisks Lists the MDisks originatingfrom this Storage System.
n/a n/a --
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
Name Name of the storage system.
Vendor Name of the storage system vendor.
Model Model of the storage system.
WWNN World Wide Node Name.
WWPNs List of World Wide Port Names.
MDisks Total Size Sum of the size of all MDisks originating from this storage system
Menu Commands
Function Description
Reporting Enables the generation of several activity reports.
Reporting > Storage SystemActivity...
Enables the generation of storage system activity reports.
Reporting > MDisksActivitiy...
Enables the generation of MDisk activity reports.
PauseMonitoring
Pauses the monitoring of the IBM SVC System.
ResumeMonitoring
Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
RefreshParameters
Refreshes all parameters of the application class.
162Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_VOLUME_CONTIcon
Parameters
None.
InfoBox
None.
Menu Commands
Function Description
Reporting Enables the generation of several activity reports.
Reporting > VolumesActivity...
Enables the generation of volume activity reports.
Reporting > LUNs MappingTable
Lists all mapped and/or not mapped LUNs.
Reporting > LUNs PreferredNode Table
Lists all LUNs preferred nodes.
Pause Monitoring Pauses the monitoring of the IBM SVC System.
Resume Monitoring Resumes the monitoring of the IBM SVC System.
Remove Removes the IBM SVC System components from the monitoring environment.
163 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_VOLUMEIcon
Parameters
Parameters Refreshed Every 2 Minutes
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ConsumedCapacity Indicates thetotal size of thespace actuallyallocated orreserved.
Gigabytes (GB)
None Statistics
ConsumedCapacityPercentage Indicates thepercentage ofthe volume thatis actuallyallocated orreserved.
Percentage (%)
None Statistics
Hosts Indicates thehosts thevolume isattached to.
n/a n/a --
HostVisibleCapacity Indicates thereal capacity ofthe volumeprimary copy.
Gigabytes (GB)
None Statistics
Pool Indicates thepool the volumebelongs to.
n/a n/a --
Status Indicates thestatus of thevolume.
{0=OK;1=Degraded;2=Failed}
1 = Warning2 = Alarm
Availability
StatusInformation Providesadditionalinformationabout the statusparameter.
n/a n/a --
164Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
TimeSinceLastActivity Number of dayssince anyactivityoccurred on theLUN.
Days None Statistics
Parameters Refreshed Every 15 Minutes
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
ReadByteRate* Indicates theamount of dataread per second.
Megabytes perseconds(MB/s)
None Statistics
ReadOperationRate Indicates theamount ofoperations readper second.
Operations/s
None Statistics
ReadResponseTime Indicates theaverage timetaken tocomplete a readrequest
Milliseconds(ms)
Warning if ≥10msAlarm if ≥100ms
ResponseTime
WriteByteRate* Indicates theamount of datawritten persecond.
Megabytes perseconds(MB/s)
None Statistics
WriteOperationRate Indicates theamount ofoperationswritten persecond.
Operations/s
None Statistics
WriteResponseTime Indicates theaverage timetaken tocomplete a writerequest.
Milliseconds(ms)
Warning if ≥10msAlarm if ≥100ms
ResponseTime
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
165 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
ID Identifier of the volume.
Name Name of the volume.
IO Group ID Identifier of the I/O group the volume belongs to.
IO Group Name Name of the I/O group the volume belongs to.
Preferred Node Name of the preferred node.
Pool Name Name of the pool the volume belongs to.
Capacity Volume Capacity.
IO Throttling Status of the I/O throttling (Enable|Disable).
Mirror Sync Rate Percentage of the synchronization for mirrored copies.
Cache Mode Cache mode (ReadWrite, None)
Cache State Indicates if the VDisk has data in the cache. The possible values are: empty,not_empty, corrupt, repairing.
Number of Copies Number of volume copies.
Menu Commands
Function Description
Volume Activity... Enables the generation of volume activity reports.
Pause Monitoring Pauses the monitoring of the IBM SVC System
Resume Monitoring Resumes the monitoring of the IBM SVC System
Remove Removes the IBM SVC System components from the monitoring environment.
Refresh Parameters Refreshes all parameters of the application class.
166Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
SEN_SVC_VOLUMEMIRRORIcon
Collectors
None.
Parameters
All parameters are refreshed every 2 minutes.
Name Description Units Default AlertConditions
BMCProactiveNetAttributeType
Pool Indicates thepool the volumemirror belongsto.
n/a n/a --
Status Indicates thestatus of thevolume mirror.
{0=OK;1=Degraded;2=Failed}
1 = Warning2 = Alarm
Availability
StatusInformation Providesadditionalinformationabout the statusparameter.
n/a n/a --
Synchronized* Indicateswhether theVolume Mirroris synchronizedwith the volumeit belongs to.
{0 = No;1 = Yes}
0 = Warning Statistics
* Parameters marked with an asterisk are used by default when visualizing the corresponding monitor instance inTrueSight Operations Management.
InfoBox
Name Description
PATROL ID The PATROL internal identifier.
167 Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Menu Commands
Function Description
Pause Monitoring Pauses the monitoring of the IBM SVC System
Resume Monitoring Resumes the monitoring of the IBM SVC System
Remove Removes the IBM SVC System components from the monitoring environment.
Refresh Parameters Refreshes all parameters of the application class.
168Classes and Parameters
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Managing Baselines and KeyPerformance IndicatorsIn order to facilitate the detection of abnormalities on your monitored environment, BMCProactiveNet calculates baselines per parameter (metrics or attributes) based on valuescollected over a specified period of time to determine a normal operating range. When thecollected values for these parameters are out of range, an alert is triggered.
Some parameters are identified by default as Key Performance Indicators and thereforeautomatically included in the base lining calculation.
Managing baselines
The baseline is the expected normal operating range for a metric or attribute of a monitor.
The baseline is calculated by collecting the values for a monitor’s attributes and metrics over aspecified time period and establishing a low baseline value (consisting of the 10th percentile ofall the values for a given time period) and a high baseline value (consisting of the 90th percentileof all the values for a given time period), taking a weighted average of these values over time. Ahigher weight is given to the latest data being factored into the baseline average. The accuracy ofthe baseline improves over time.
Requirements for baseline generation
For baselines to be generated for an attribute, that abnormality threshold means that thethreshold exists and is not suppressed. Additionally, if the Key Performance Indicator (KPI) mode is active, only those attributes thathave an active abnormality threshold and are also KPI attributes will have baselines generatedfor them.
Absolute thresholds (with "outside baseline") or signature thresholds do not satisfy these requirements.
Managing Key Performance Indicators
The KPI attribute of a parameter can be activated or deactivated manually through the BMCProactiveNet Administration Console. In this KM, some parameters or attributes have beendesignated as important indicators of performance (KPIs). We do not recommend that thesedefault settings are modified.
169 Managing Baselines and Key PerformanceIndicators
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
However, advanced users may activate or deactivate KPIs from the BMC ProactiveNetAdministration Console.
To add or remove Key Performance Indicator (KPI) attributes for a monitor type
1. In the Administration Console, from the menu bar, choose Tools > KPI Administration. TheKPI Administration dialog box is displayed.
2. From the Monitor Type list, choose the monitor type for which you want to add or removeKPI attributes. A list of attributes for the selected monitor type is displayed.
3. In the KPI column for the attributes that you want to add or remove as Key PerformanceIndicators:
select the KPI check box to add the corresponding attribute as a KPI
deselect the KPI check box to remove the corresponding attribute from the KPIs for thatmonitor type
For complete and detailed information on this procedure, please refer to the BMC ProactiveNetdocumentation available f rom BMC Web site.
Parameters for which the system by default calculates baselines as well as parametersconsidered as KPIs are respectively identified by the following icons:
Baselining
KPI
170Managing Baselines and Key PerformanceIndicators
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Configuration VariablesThis section lists the configuration variables used by IBM SVC KM for PATROL. Configurationvariables are stored in the PATROL Agent configuration and can be managed through:
PATROL Configuration Manager (PCM)
wpconfig (Windows)
xpconfig (UNIX/Linux)
The following tables recapitulate the configuration variables used by the KM, i.e that apply to allof the monitored hosts.
These following configuration variables are stored under /SENTRY/SEN_SVC in the PATROLAgent’s configuration.
Variables DefaultValue
Description
AlertActions n/a List of alert actions to be executed by IBM SVC KM forPATROL upon a problem with the managed SVC systems.
collectionHubHeapSizeMax n/a Maximum heap size in megabytes allocated to the JavaCollection Hub.Default: Not set
collectionHubHeapSizeMin n/a Minimum heap size in megabytes allocated to JavaCollection Hub.Default: Not set
collectionHubOverrideJavaCommandLine
n/a Command line used by the KM to launch the JavaCollection Hub. Default: Not setThis variable should only be set if instructed by SentrySupport.
debugEndTime None Specifies when the debug mode will be disabled. Format required: YYYY/MM/DD HH:MM:SS
debugMode 0 = disabled When set to '1', enables the debug mode of the KM.Default: Not set
defaultReinitializationOptions None List of default options to be executed by IBM SVC KM forPATROL on reinitialization. The default values are:0=unchecked; 1=checked
resetThresholds
resetThresholdManagementMode
resetAlertActions
resetOtherAlertSettings
resetDebugMode
resetRemovedPausedObjectList
resetReport
resetSecuritySettings
171 Configuration Variables
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
resetJavaSettings
Insert a colon “;” between the variable and its value:“resetThresholds;1”. If you enter multiple variables, they needto be separated by a carriage return.Example: “resetThresholds;1” will display the remove thresholdsoption selected by default in the Reinitialize KM wizard.
disableJavaInformationMessage
0 = activated When set to ‘1’, disables the pop-up information messagedisplayed when the java settings are modified.Default: Not set
disableJRECheck 0 When set to ‘1’, disables the validation tests of the JREused by the KM to run Java code and therefore force theKM to use a non-Sun or non-Oracle JRE
disablePslExecuteBugWorkaround
0 = activated When set to ‘1’, deactivates the workaround in the KMfor a bug in the PslExecute() PSL function. If the KM detects that the version of the PATROL Agent isaffected by the PslExecute() bug, it uses an alternatetechnique to create asynchronous threads with theevent_trigger() function and the RemPsl standard event.The disablePslExecuteBugWorkaround variable disablesthis workaround.
disableVolumeMonitoring 0 = disabled Disable the volumes monitoring, the discovery andcollection of metrics for all volumes.
exportActivityReports None When set to 1, the SEN_SVC_activity*.csv report isautomatically generated and stored in the %PATROL_HOME%\log folder.
exportLUNsMappingTable None When set to 1, the SEN_SVC_LUNS_mapping_table*.csvreport is automatically generated and stored in the %PATROL_HOME%\log folder.
exportScheduling None Time when the activity and/or LUNs Mapping Tablereports will be generated. Format required: HH:MM:SS
forceClassicConfigMode 0 = disabled When the KM is used with BMC ProactiveNet, all the KMconfiguration menus are disabled in the PATROLConsoles. To enable them, set theforceClassicConfigMode variable to 1.
javaPassword None Password associated to the javaUsername variable.
javaPath None Path to the folder containing the Java executable usedby the Collection Hub.Default: Not set (The KM will search for a suitable JREautomatically).
javaUsername None Username used to launch the Java Collection Hub.Default: Not set. variable.
parametersAutoResetTimeout None Indicate the time in seconds after which the incrementalparameters should be automatically reset when an erroris detected.
pausedObjectList n/a List of the PATROL object path of the paused objects. (i.e. forwhich no collection will be performed).
pemMessages All How much internal information should be sent as PATROLevents.
172Configuration Variables
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
When set to ‘all’, all internal KM messages (problems andinformational messages).
When set to ‘problems’, only errors and problems.
When set to ‘none’, no internal message at all.
This doesn’t affect the reporting of actual hardware problems.
pollingInterval 120 Interval in seconds at which the KM gathers thestatistics files from the IBM SVC nodes.
removedObjectList n/a List of instances that have been removed from the monitoringenvironment through the Remove KM Command.
sowMessages All How much internal information should be displayed in the SystemOutput Window in the PATROL Console.
When set to ‘all’, all internal KM messages (problems andinformational messages).
When set to ‘problems’, only errors and problems.
When set to ‘none’, no internal message at all.
This doesn’t affect the reporting of actual hardware problems.
staticThresholdsParameterList None List of parameters for which custom thresholds have been setthrough the Modify Thresholds KM command.
temporaryFolder None Path to the folder where temporary files used by the KM tocompute statistics will be stored.Default: Not set (assumed PATROL Agent’s own temporaryfolder)
ThresholdsManagementMode Retrievedfrom the KMconfiguration
Specifies how the KM should manage the alert thresholds onparameters. Please read carefully the User Guide chapter formore information on this topic.Possible values:
'empty' (automatic detection of the suitable thresholdmanagement)
‘as’ (through PATROL for Event Management)
‘tuning’ (through the standard "Override parameter"mechanism)
‘none’ (No threshold is set by the KM)
Default: Not set (automatic)
unexpectedStatusInternalIssueNotification
0 =deactivated
When set to 1, the KM will inform you of any internalproblems or of any special operations it may perform.
unexpectedStatusManagement None Specifies the action to be performed when the product is unableto interpret a status value.Format: <alarm type>;<internal issue notification>
Possible alarm type values:
ALARM
OK
WARN
Default: OK
Possible internal issue notification values:
1: trigger an internal issue notification
0: do not trigger an internal issue notification
Default: 0
173 Configuration Variables
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Configuration variables specific to each IBM SVC Cluster are listed in the table below. Theseconfiguration variables are stored under /SENTRY/SEN_SVC/<SVC Cluster ID> in the PATROLAgent’s configuration.
Variable Description
<SVC ID>/IP IP address or hostname of the IBM SVC Cluster.
<SVC ID>/keyFile Path to the SSH key file used to connect to the IBM SVC Cluster SSH interface.
<SVC ID>/keyPassphrase
Passphrase used to connect to the IBM SVC Cluster SSH interface.
<SVC ID>/name Display name of the IBM SVC Cluster as shown in the console interface.
<SVC ID>/password
Passphrase used to connect to the IBM SVC Cluster SSH interface.
<SVC ID>/username
Username associated to the passphrase (and optionally the key file) to connect to the IBM SVCCluster SSH interface.
174
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Index
- A -Abnormalities 168
Acknowledge
Alerts 101, 102Activity
MDisks 88
View 88Activity Reports 89
Add
IBM SVC System 52Administrative
Tasks 101Alert Actions 116, 118, 119, 121, 123, 124,125, 126, 127, 128, 129, 130
Annotate the Parameter’s Graph 123
Edit 120
Execute a PSL Command 125
Execute an OS Command 124
Send a Basic SNMP Trap 128
Send a Custom SNMP Trap 129
Send a Pop-up to the PATROL Consoles 126
Send an email 130
Trigger a PATROL Event 121
Write a Line to a LOG File 127Alerts 116
Acknowledge 101, 102
Reset 101, 102Allocation
Per Host Storage 99
Per LUN Storage 99Application Classes
SEN_SVC_MDisk 73
SEN_SVC_NODE 59
SEN_SVC_POOL 82
SEN_SVC_STORAGESYSTEM 73
SEN_SVC_VOLUME 63
- B -Baselines
BMC ProactiveNet Performance Management 168
Generation 168
Manage 168
Requirements 168BMC ProactiveNet Performance Management
Abnormalities 168
Baselines 168
Key Performance Indicators 168
KPI 168Bottleneck
Find 64
- C -CA
Mode 111Classes 133
Classic
Mode 111Collector
discoveryColl 134
fcPortColl 137
iSCSIPortColl 137
mDiskColl 137
nodeColl 137
poolColl 137
storageSystemColl 137
svcColl 137
volumeColl 137Commands
Edit Connection Settings 137
LUNs Mapping Table 137
LUNs Preferred Node Table 137
MDisks Activitiy 137
Nodes Activitiy 137
Pause Monitoring 137
Per Host Storage Allocation 137
Per LUN Storage Allocation 137
Ports Activity 137
Refresh Parameters 137
Remove 137
Reporting 137
Resume Monitoring 137
Search WWN/IQN 137
Storage Systems Activity 137
Volumes Activity 137Configuration
175
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Configuration
Automatic 47, 103
Manual 47, 103
Selection 47, 103Configuration Variables
<SVC ID>/IP 170
<SVC ID>/keyFile 170
<SVC ID>/keyPassphrase 170
<SVC ID>/name 170
<SVC ID>/username 170
AlertActions 170
collectionHubHeapSizeMin 170
collectionHubOverrideJavaCommandLine 170
debugEndTime 170
debugMode 170
defaultReinitializationOptions 170
disableJavaInformationMessage 170
disableJRECheck 170
disablePslExecuteBugWorkaround 170
exportActivityReports 170
exportLUNsMappingTable 170
exportScheduling 170
forceClassicConfigMode 170
javaPassword 170
javaPath 170
javaUsername 170
parametersAutoResetTimeout 170
pausedObjectList 170
pemMessages 170
pollingInterval 170
removedObjectList 170
sowMessages 170
staticThresholdsParameterList 170
temporaryFolder 170
ThresholdsManagementMode 170
unexpectedStatusInternalIssueNotification 170
unexpectedStatusManagement 170Configure
Java Settings 47, 103Configuring
KM 46Connection Settings
Edit 57Console Administration 111
Contention
Diagnose 61Customize
Discovery Interval 107
Polling Interval 107
- D -Deactivate
Debug Mode 114Debug
Enable 110Debug Mode
Deactivate 114Detect
High Processor Utilization 59Device
All 114
Restore monitoring 114
Specific 114Device Monitoring
Remove 113Diagnose
SAN/Network Contention 61
Slow LUNs 63Discovery
Interval 107
Trigger 116Discovery Interval
Customize 107Disk Space
Consumption 82
Report 82
- E -Edit
Connection Settings 57Email
Send 130Enable
Debug 110
KM Configuration Menus 111
KM debug mode 110Execute
OS Command 124
PSL Command 125
176
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
- F -Files 19
ins_ALL_<version>.tar 19
ins_WINDOWS_<version>.exe 19
Setup 20
setup.exe 23
setup.sh 23
uninstall.exe 34
uninstall.sh 34Fixed Issues 8
Force
Classic Mode 111Force Classic Mode 114
- G -Generate
Baselines 168
SSH Key 14
- H -Hosts
LUNs 72
- I -IBM SVC System
Add 52IBM SVC Systems
Monitor 58Identify
LUNs Preferred Node 72InfoBox 141, 145, 148, 153, 156, 160, 163,166
Active WWPN 156
Cache Mode 163
Cache State 163
Capacity 153, 156, 163
Copyright 134
Failover 141
Failover iSCSI alias 141
Failover Node 141
Hardware 141
ID 163
IO Group ID 141, 163
IO Group Name 141, 163
IO Throttling 163
IP 137
IQN 145
iSCSI Name 141
MDisks 153
MDisks Total Size 160
Mirror Sync Rate 163
Mode 156
Model 156, 160
Name 141, 156, 160, 163
Number of Copies 163
Partner ID 141
Partner Name 141
PATROL ID 137, 141, 145, 148, 153, 156,160, 163
Pool ID 156
Pool Name 156, 163
Preferred Node 163
Preferred WWPN 156
Product 134
Release Date 134
Support 134
Tier 156
Vendor 156, 160
Version 134
Volumes 153
Website 134
WWN 141, 148
WWNN 156, 160
WWPNs 160Install
Introduction 23Install / Un-install 34
BMC Software Installation Utility 19
Log 23
Packages 19
Procedure 23
Setup Files 20Installation
Preparing 14Integrating with BMC ProactiveNet PerformanceManagement 44
Integration
BMC Portal 43
BMC ProactiveNet Performance Management 43
IQN
177
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
IQN
Search 86
- J -JAVA
Requirements 14Java Settings
Configure 47, 103
- K -Key Performance Indicators
BMC ProactiveNet Performance Management 168
Manage 168KM
Debug Mode 110
Reinitialize 114KM Configuration Menus
Enable 111KPI
BMC ProactiveNet Performance Management 168
Manage 168
- L -Loading
KM 46LOG File 127
LUN
Not mapped 78
Unmapped 78
Unused 78LUNs
Busiest 70
Hosts 72
Identify 70
Mapping Table 97
Preferred Node 72
Preferred Node Table 98
Slow 63LUNs Preferred Node
Identity 72
- M -Macros
%{/…} 119
%{ALARM_TYPE} 119
%{ASCTIME:…} 119
%{DATE} 119
%{NEWLINE} 119
%{OBJECT_CLASS} 119
%{OBJECT_ID} 119
%{OBJECT_LABEL} 119
%{PARAMETER_NAME} 119
%{PARENT_...} 119
%{PARENT_CLASS} 119
%{PARENT_ID} 119
%{PARENT_LABEL} 119
%{SVCHOSTNAME} 119
%{TIME} 119
%{VALUE} 119Manage
Baselines 168
Key Performance Indicators 168
KPI 168
Port Status Parameters 101, 102MDisk
Activitiy Report 93MDisks
Activity 88Menu Commands 140, 141, 145, 148, 152,153, 155, 156, 159, 160, 162, 163, 166
About 134
Acknowledge Alerts and Reset 148
Add a Connection to an IBM SVC System 134
Alert Actions 134
Automatic Parameter Reset 134
Debug 134
Discovery Interval 134
Java Settings 134
KM Settings 134
LUNs Mapping Table 134, 162
LUNs Preferred Node Table 134, 162
MDisk Activity 156
MDisks Activity 134, 152, 153, 155, 159,160
Nodes Activity 134, 140, 141
Pause All 134
178
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Menu Commands 140, 141, 145, 148, 152,153, 155, 156, 159, 160, 162, 163, 166
Pause Monitoring 140, 141, 144, 145, 148,152, 153, 155, 156, 159, 160, 162, 163, 166
Per Host Storage Allocation 134
Per LUN Storage Allocation 134
Polling Interval 134
Port Activity 145, 148
Ports Activity 134, 140, 141, 144
Refresh Parameters 141, 148, 153, 156,160, 163, 166
Reinitialize KM 134
Remove 140, 141, 144, 145, 148, 152, 153,155, 156, 159, 160, 162, 163, 166
Reporting 134, 140, 141, 159, 162
Reports Scheduling 134
Restore Monitoring 134
Resume All 134
Resume Monitoring 140, 141, 144, 145,148, 152, 153, 155, 156, 159, 160, 162, 163,166
Search WWN/IQN 134
Storage System Activity 160
Storage System Traffic Report 159
Storage Systems Activity 134
Threshold Mechanism Selection 134
Trigger a KM Discovery 134
Volume Activity 163
Volumes Activity 134Mode
CA 111
Classic 111Monitor
IBM SVC Systems 58Monitoring
Pause 113
Remove 113
Restore 114
Resume 113
Volume Mirroring Synchronization 75
- N -Network
Contention 61Node
Activity Report 89Nodes
Performance 64
Nodes Identification
Requirements 14Notifications 116
- O -Operating Systems
Linux 19, 23, 34
Unix 19, 34
Windows 19, 23, 34Options
Common services 23
Console Systems role 23
Managed System 23
View Log 23OS Command
Execute 124Oversubscription 59
- P -Parameter
Reset 102Parameter’s Graph
Annotate 123Parameters 133
AvailablePathCount 156
BadCRC 148
BandwidthUtilization 145, 148
CollectionStatus 137
CollectionStatusInformation 137
ConsumedCapacity 82, 153, 163
ConsumedCapacityPercentage 59, 82, 153,163
Hosts 163
HostVisibleCapacity 163
InvalidTransmissionWords 148
LinkFailures 148
LinkSpeed 145, 148
LossOfSignal 148
LossOfSynch 148
MDisks 160
Pool 163, 166
PortCount 137
ProcessorUtilization 59, 141
ProtocolErrors 148
ReadByteRate 70, 156, 160, 163
ReadOperationRate 156, 160, 163
179
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Parameters 133
ReadResponseTime 63, 156, 160, 163
ReceivedByteRate 59, 141, 145, 148
ReceivedFromHostsByteRate 145
ReceivedFromHostsWriteRate 148
ReceivedFromOtherClustByteRate 145, 148
ReceivedFromSameClustByteRate 145, 148
ReceivedFromStorageByteRate 145, 148
ReceivedOperationRate 141
ReceivedResponseTime 64, 141
Reset 101
ResponseTime 73
SentByteRate 59, 141, 145, 148
SentOperationRate 141
SentResponseTime 64, 141
SentToHostsByteRate 145, 148
SentToOtherClustByteRate 145, 148
SentToSameClustByteRate 145, 148
SentToStorageByteRate 145, 148
Status 141, 145, 148, 153, 156, 160, 163,166
StatusInformation 141, 145, 148, 153, 156,160, 163, 166
SubscribedCapacity 82, 153
SubscribedCapacityPercentage 153
Synchronized 166
TimeSinceLastActivity 163
TimeSinceLastSatisticsUpdate 137
WriteByteRate 70, 156, 160, 163
WriteOperationRate 156, 160, 163
WriteResponseTime 63, 156, 160, 163
ZeroBufferTimePercentage 148PATROL
Agent 43
Console 43
Event 121
Requirements 14PATROL Consoles
Pop-up 126PATROL Event
Specific 121
Standard 121
STD_41 121Pause
Monitoring 113Performance
MDisks 64
Nodes 64
Ports 64
Storage System 64Platforms
IBM SVC 12
Supported 12Polling Interval
Customize 107Pools
Activitiy Report 94Pop-up 126
Port
Activity Report 91Port Status
Manage 101, 102
Parameters 101, 102Prerequisites
JAVA 14
Nodes Identification 14
PATROL 14
SSH key 14
User Authentication 14Processor
High utilization 59Product at a glance 11
PSL Command
Execute 125PuTTY
Generate 14
SSH Key 14
- R -Reinitialize
KM 114Release Notes 8
Remove
Device Monitoring 113Reporting 64
Disk space consumption 82
LUNs Mapping Table 89, 97
LUNs Preferred Node 72, 98
LUNs Preferred Node Table 89
MDisks Activitiy Report 89
MDisks Activity Report 93
Nodes Activity Report 89
Pools Activity Report 94
Ports Activity Report 89, 91
Storage Systems Activity Report 89, 92
Volume Activity Report 96
180
IBM
SV
C K
M f
or
PA
TRO
L V
ersi
on 1
.2.0
1
Reporting 64
Volumes Activity Report 89Reports
Scheduling 100Reset
Alerts 101, 102
Automatic 101, 102Restore
All 114
Monitoring 114
Specific device 114Resume
Monitoring 113
- S -Scheduling
Reports 100Search
IQN 86
WWN 86Set
Automatic Parameter Reset 101
Automatic Parameters Reset 102SNMP Trap
Basic 128
Custom 129
Send 128, 129SSH Key
Generate 14
PuTTY 14Storage pool 59
Storage System
Acitivity Report 92
Back-end 73
Slow 73Supported
IBM SVC 12
Platforms 12
- T -Tasks
Administrative 101Thin Provisioning 59
Threshold Mechanism Selection
Automatic 117
Event Management 117
Tuning 117Thresholds 116
Mechanism Selection 117
Remove 114
Reset 114Trigger
KM Discovery 116
PATROL Event 121
- U -User Authentication
Requirements 14User Guide 46
- V -Verify
Processor utilization 59
Transfer rate 59View
MDisks Activity 88Volume
Activity Report 96Volume Mirroring
Monitoring 75
Synchronization 75
- W -What's New 8
WWN
Search 86
About Sentry Software™Sentry Software, a strategic Technology Alliance Partner of BMC Software, providescomprehensive multi-platform monitoring solutions that enable management of thehardware and software aspects of all servers and SANs and covering up to 100 % ofcustom applications within the BMC TrueSight environment. Sentry Software alsodevelops adapters for BMC Atrium Orchestrator that enables IT administrators toautomate the execution of common requests and tasks that occur in the daily course ofIT operations. Combined with BMC’s servers and network automation tools, theadapters allow IT administrators to implement provisioning and decommissioningworkflows that cover all layers of their IT infrastructure. Finally, Sentry Software designsconnectors that bring storage capacity metrics into BMC TrueSight Capacity Optimizationto ensure IT administrators that their storage infrastructure is properly sized for theircurrent and future needs.
Like us on Facebook:facebook.com/sentrysoftware
Follow us on Twitter:
twitter.com/sentrysoftware
LEARN MORE
To learn more about our solutions, please visit :www.sentrysoftware.com/solutions
© BMC Software, Inc. All rights reserved.
ABOUT MARKETZONE DIRECT PRODUCTS
The BMC MarketZone Directprogram sells and supportsthird-party products thatcomplement and/or augment BMCsolutions. MarketZone Directproducts are available under BMClicense and support terms.
About BMC Software™BMC Software helps leading companies around the world put technology at the forefrontof business transformation, improving the delivery and consumption of digital services.From mainframe to cloud to mobile, BMC delivers innovative IT management solutionsthat have enabled more than 20,000 customers to leverage complex technology intoextraordinary business performance—increasing their agility and exceeding anythingthey previously thought possible. For more information about BMC Software, visit
www.bmc.com.
Bus ines s thrives when IT runs s marter,fas ter and s tronger. That’s why the mos tdemanding IT organizations in the worldrely on BMC Software acros s dis tributed,mainframe, virtual and cloudenvironments . Recognized as the leader inBus ines s Service Management, BMC offersa comprehens ive approach and unifiedplatform that helps IT organizations cutcos t , reduce ris k and drive bus ines sprofit . For the four fis cal quarters endedSeptember 30,2011, BMC revenue wasapproximately $2.2 billion.
BUSINESS RUNS ON I.T .
I.T . RUNS ON BMC SOFT WARE